Windows
Analysis Report
PO#4500550389.xla.xlsx
Overview
General Information
Detection
Score: | 60 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w11x64_office
EXCEL.EXE (PID: 5228 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Root\ Office16\E XCEL.EXE" /automatio n -Embeddi ng MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77) mshta.exe (PID: 7808 cmdline:
C:\Windows \System32\ mshta.exe -Embedding MD5: 36D15DDE6D71802D9588CC0D48EDF8EA) splwow64.exe (PID: 7940 cmdline:
C:\Windows \splwow64. exe 12288 MD5: AF4A7EBF6114EE9E6FBCC910EC3C96E6)
EXCEL.EXE (PID: 2240 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Root\ Office16\E XCEL.EXE" "C:\Users\ user\Deskt op\PO#4500 550389.xla .xlsx" MD5: F9F7B6C42211B06E7AC3E4B60AA8FB77)
- cleanup
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: |
Source: | Author: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: |
Source: | Author: X__Junior (Nextron Systems): |
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Directory created: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Software Vulnerabilities |
---|
Source: | Process created: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | OLE: | ||
Source: | OLE: | ||
Source: | OLE: |
Source: | Stream path 'MBD00D3132F/\x1Ole' : | ||
Source: | Stream path 'MBD00D3132F/\x1Ole' : |
Source: | OLE stream indicators for Word, Excel, PowerPoint, and Visio: |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Window title found: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | OLE indicator, Workbook stream: | ||
Source: | OLE indicator, Workbook stream: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Directory created: | Jump to behavior |
Source: | Static file information: |
Source: | File opened: | Jump to behavior |
Source: | Initial sample: |
Source: | Initial sample: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Stream path 'MBD00D3132E/Package' entropy: | ||
Source: | Stream path 'Workbook' entropy: | ||
Source: | Stream path 'Package' entropy: | ||
Source: | Stream path 'MBD00D3132E/Package' entropy: | ||
Source: | Stream path 'Workbook' entropy: |
Source: | Window / User API: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 13 Exploitation for Client Execution | 1 DLL Side-Loading | 1 Process Injection | 3 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | 1 Email Collection | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | 13 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 2 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
29% | Virustotal | Browse | ||
22% | ReversingLabs | Document-Excel.Exploit.CVE-2017-0199 |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.210.172 | true | false | high | |
s-part-0044.t-0009.fb-t-msedge.net | 13.107.253.72 | true | false | high | |
edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | 84.201.210.23 | true | false | high | |
a726.dscd.akamai.net | 95.101.54.235 | true | false | high | |
kryx.ru | 188.225.72.170 | true | false | high | |
s-0005.dual-s-msedge.net | 52.123.128.14 | true | false | high | |
otelrules.svc.static.microsoft | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false |
| unknown | |
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
13.107.253.72 | s-part-0044.t-0009.fb-t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
198.12.89.24 | unknown | United States | 36352 | AS-COLOCROSSINGUS | false | |
188.225.72.170 | kryx.ru | Russian Federation | 9123 | TIMEWEB-ASRU | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1640396 |
Start date and time: | 2025-03-17 09:40:41 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 19s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09 |
Run name: | Potential for more IOCs and behavior |
Number of analysed new started processes analysed: | 22 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | PO#4500550389.xla.xlsx |
Detection: | MAL |
Classification: | mal60.expl.winXLSX@6/14@2/3 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, sppsvc.exe, SystemSettingsBroker.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.109.32.97, 52.109.76.243, 199.232.210.172, 52.109.76.144, 51.104.15.252, 13.89.178.27, 52.123.128.14, 20.190.160.66, 4.175.87.197, 95.101.54.235, 95.101.54.226
- Excluded domains from analysis (whitelisted): neu-azsc-000.odc.officeapps.live.com, odc.officeapps.live.com, slscr.update.microsoft.com, europe.odcsm1.live.com.akadns.net, res-1.cdn.office.net, eur.roaming1.live.com.akadns.net, neu-azsc-000.roaming.officeapps.live.com, mobile.events.data.microsoft.com, roaming.officeapps.live.com, dual-s-0005-office.config.skype.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, login.live.com, officeclient.microsoft.com, ukw-azsc-config.officeapps.live.com, c.pki.goog, wu-b-net.trafficmanager.net, osiprod-neu-bronze-azsc-000.northeurope.cloudapp.azure.com, ecs.office.com, ctldl.windowsupdate.com.delivery.microsoft.com, prod.configsvc1.live.com.akadns.net, onedscolprdcus03.centralus.cloudapp.azure.com, uci.cdn.office.net, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, res-stls-prod.edgesuite.net, fe3cr.delivery.mp.microsoft.com, onedscolprduks01.uksouth.cloudapp.azure.com, res-prod.trafficmanager.net, config.officeapps.live.com, osipro
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- Report size getting too big, too many NtSetValueKey calls found.
Time | Type | Description |
---|---|---|
04:43:01 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
13.107.253.72 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Hancitor | Browse | |||
198.12.89.24 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Cobalt Strike, MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Babadeda | Browse |
| ||
Get hash | malicious | Sality | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer, Xmrig | Browse |
| ||
bg.microsoft.map.fastly.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | GuLoader, HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Sality | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Babadeda | Browse |
| ||
Get hash | malicious | Sality | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
s-part-0044.t-0009.fb-t-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DanaBot | Browse |
| ||
Get hash | malicious | NovaSentinel | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AS-COLOCROSSINGUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AveMaria, PrivateLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Cobalt Strike, FormBook | Browse |
| ||
Get hash | malicious | Cobalt Strike, MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Cobalt Strike, MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Cobalt Strike, MSIL Logger, MassLogger RAT | Browse |
| ||
TIMEWEB-ASRU | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
MICROSOFT-CORP-MSN-AS-BLOCKUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
258a5a1e95b8a911872bae9081526644 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\Heartbeat\HeartbeatCache.xml
Download File
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 118 |
Entropy (8bit): | 3.5700810731231707 |
Encrypted: | false |
SSDEEP: | 3:QaklTlAlXMLLmHlIlFLlmIK/5lTn84vlJlhlXlDHlA6l3l6Als:QFulcLk04/5p8GVz6QRq |
MD5: | 573220372DA4ED487441611079B623CD |
SHA1: | 8F9D967AC6EF34640F1F0845214FBC6994C0CB80 |
SHA-256: | BE84B842025E4241BFE0C9F7B8F86A322E4396D893EF87EA1E29C74F47B6A22D |
SHA-512: | F19FA3583668C3AF92A9CEF7010BD6ECEC7285F9C8665F2E9528DBA606F105D9AF9B1DB0CF6E7F77EF2E395943DC0D5CB37149E773319078688979E4024F9DD7 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\Additional\Additional1742200919606740200_E2A30740-38D4-4D8E-A2A2-5B97A97B55BB.log
Download File
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 8.112143835430977E-5 |
Encrypted: | false |
SSDEEP: | 3:Tuekk9NJtHFfs1XsExe/t:qeVJ8 |
MD5: | AFDEAC461EEC32D754D8E6017E845D21 |
SHA1: | 5D0874C19B70638A0737696AEEE55BFCC80D7ED8 |
SHA-256: | 3A96B02F6A09F6A6FAC2A44A5842FF9AEB17EB4D633E48ABF6ADDF6FB447C7E2 |
SHA-512: | CAB6B8F9FFDBD80210F42219BAC8F1124D6C0B6995C5128995F7F48CED8EF0F2159EA06A2CD09B1FDCD409719F94A7DB437C708D3B1FDA01FDC80141A4595FC7 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\Additional\Additional1742200919607087200_E2A30740-38D4-4D8E-A2A2-5B97A97B55BB.log
Download File
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | 8F4E33F3DC3E414FF94E5FB6905CBA8C |
SHA1: | 9674344C90C2F0646F0B78026E127C9B86E3AD77 |
SHA-256: | CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC |
SHA-512: | 7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\Additional\Additional1742200995068673200_E841F783-C2A1-4C7A-8754-63D6119297FB.log
Download File
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 71 |
Entropy (8bit): | 4.3462513114457515 |
Encrypted: | false |
SSDEEP: | 3:Tuekk9NJtHFfs1XsExen:qeVJ8u |
MD5: | 8F4510F128F81A8BAF2A345D00F7E30C |
SHA1: | 8C711E6C484881ECDC83B6BDAC41C7A19EDE9C37 |
SHA-256: | 15AA8B35FC5F139EF0B0FBC641CAA862AED19674625B81D1DC63467BC0AAFED9 |
SHA-512: | 78695E5E2337703757903B8452E31A98F860022B04972651212C3004FEBE29017380A8BCA9FCCFD935DE00D8BD73AA556C30A3CEA5FC76E7ADF7E7763D68E78F |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\Primary1742200919595002900_E2A30740-38D4-4D8E-A2A2-5B97A97B55BB.log
Download File
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.21800675974525263 |
Encrypted: | false |
SSDEEP: | 1536:MWtfm4Hr9ZlZhlw9/+t9/QQhomhlPbYxC+W9xxOCto+ZOmjs4a3JpBY05ZT7MFRn:rPHvRxOUZOiY5Zx2FYBO/45aG |
MD5: | 164A4C667A2B5A22A9E86FD987736164 |
SHA1: | B5647F5273D9ADF57146F99831B14934EFB272F6 |
SHA-256: | FC72523474E085065FE3561572ED58214E44C67F56901F5E2EE4E1864DBC45F3 |
SHA-512: | 948665CA879D35D6B38F442D6F0A01C3197FAD9091E9ED8641E05879CBC7CADE9C8B23DFC043496C8FF22235165A3BEAE7112223F51809B3DBB708671A847145 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\Primary1742200919595389500_E2A30740-38D4-4D8E-A2A2-5B97A97B55BB.log
Download File
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | 8F4E33F3DC3E414FF94E5FB6905CBA8C |
SHA1: | 9674344C90C2F0646F0B78026E127C9B86E3AD77 |
SHA-256: | CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC |
SHA-512: | 7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\EXCEL\Primary1742200995067346700_E841F783-C2A1-4C7A-8754-63D6119297FB.log
Download File
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 262824 |
Entropy (8bit): | 5.152697990380378 |
Encrypted: | false |
SSDEEP: | 1536:CNP7VXyBojCeoOWFFOT3XEGWEBhjQXT9VSGJ56LBvstjhkjHNFH8BBuVt/4Vqpal:MzV9oOaY3XEd2FYBO/i0e |
MD5: | AC44C6CD951A360B3251A7E4C2DB834F |
SHA1: | 15BB7F6F51CE30D6C39F6E629E21CE2058468A70 |
SHA-256: | 12AD142796890A3F79C468EEBA2F235529700BB3D4723D40F78E773241926090 |
SHA-512: | 0558BF0BE1530D496F005BD92F2C10BD13F2F614F88B6CB8F99151CC49CAAB30F0825A8AA59F532B8D97FC75B1D7F5B3166CDB032E3A774792A8E4BB4CF836C8 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 662528 |
Entropy (8bit): | 7.982013203126156 |
Encrypted: | false |
SSDEEP: | 12288:RUCec9/QlJ3e10bEuhJEqDcKvF0Mx8CSHkfJ08pzb2wswYl6IU5cqH:Rjec9olNd3hR96CBJfpHjBYGu |
MD5: | 697F18C58B8E126B7585C592C2EF0584 |
SHA1: | B128F477388DD6F9E9530434B87639F56F120DDA |
SHA-256: | 94BE231F56D93E7E456C13813C620AFD2C8375429E83DF751646BC558EBCBB91 |
SHA-512: | B4EFF2A17552DA9BB67FA8EBD67E34C59DF438C88AD1C5BA0F22B03C666858B40EF2CC4B34D636A8219470893C9ADF45A3A7C719BE8481FD5775D8F213AC1D49 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 671744 |
Entropy (8bit): | 7.931241234859872 |
Encrypted: | false |
SSDEEP: | 12288:lUCec9/QlJ3e10bEuhJEqDcKvF0Mx8CSHkfJ08pzb2wswYl6IU5cqH:ljec9olNd3hR96CBJfpHjBYGu |
MD5: | 6E532C6F4FDBC4005D4322667D05FEED |
SHA1: | 080D54DC8778CE5D3C91B05CC876C7E9B850218A |
SHA-256: | 6FFA9D67C6133EC28FF20DCD65894D39C8E0FD40BAB5EC1702FDA54F13DA04A6 |
SHA-512: | 2A4A9C9A23ED6A07C04C850F1A596BFF1570D9FCCA059AB91385E720E7F4B1577A343A353ED361B2B1A9CAF66A49E6FFFF860174C91CB0523E71BE1BDFC9DFD5 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1256960 |
Entropy (8bit): | 7.98963587902483 |
Encrypted: | false |
SSDEEP: | 24576:djec9olNd3hR96CBJfpHjBYGusBRtrq4vocNDglX7Y8e5Bf/Q:VeOKHdVg2oBY8e5Bf4 |
MD5: | AE93C8AEE768EA0A7417ED713B58DF16 |
SHA1: | 193C703EC7D2D9CB4685CFE11FE1841C40C6BB61 |
SHA-256: | 478257BF7F97932F7FB8DF4E543686DE848EB5A4F38B50EEC3ADE75554739CFE |
SHA-512: | A236C27F5C93D9E190460EF6904F410C6FEE38FC8C1AF033599A1090996747680175179DCA6C451BBF1264EB1858674387B003BC95B444B0C781C5CBA6DEF41E |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1256960 |
Entropy (8bit): | 7.98963587902483 |
Encrypted: | false |
SSDEEP: | 24576:djec9olNd3hR96CBJfpHjBYGusBRtrq4vocNDglX7Y8e5Bf/Q:VeOKHdVg2oBY8e5Bf4 |
MD5: | AE93C8AEE768EA0A7417ED713B58DF16 |
SHA1: | 193C703EC7D2D9CB4685CFE11FE1841C40C6BB61 |
SHA-256: | 478257BF7F97932F7FB8DF4E543686DE848EB5A4F38B50EEC3ADE75554739CFE |
SHA-512: | A236C27F5C93D9E190460EF6904F410C6FEE38FC8C1AF033599A1090996747680175179DCA6C451BBF1264EB1858674387B003BC95B444B0C781C5CBA6DEF41E |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 165 |
Entropy (8bit): | 1.4134958568691696 |
Encrypted: | false |
SSDEEP: | 3:D//nEwmM:DXEwmM |
MD5: | 8B6F49EF043D1AF562C216108A13E0F2 |
SHA1: | 0106337F6D46E83B30CA7C1563C3FC3AF4209AF3 |
SHA-256: | C80D5433620A06CF252C9489F9A46BA091A5DAA239AAC3A98DB918627DEFF314 |
SHA-512: | 241592FDA43D686AF92D22B2B451C51E70B742A5C33FA94307613155906396A53501E05719DD568C3D3C8088B95B83D7E98393B3692EB4B01907FE8BD927E896 |
Malicious: | true |
Preview: |
File type: | |
Entropy (8bit): | 7.98997085995464 |
TrID: |
|
File name: | PO#4500550389.xla.xlsx |
File size: | 1'318'912 bytes |
MD5: | 9395f29bf9aa98cdfc7be58656b0c436 |
SHA1: | bb011d3f299d379fe2e55fb9afc34ed29b89f484 |
SHA256: | 45971f014df6d607611e96131089cf154c8842aa2154bd8382badf844dbe96b1 |
SHA512: | 51ff64ef30795dd1f8a9bb3299e3818c06d04cf11df9bac73f2edd902aa45d23c9a473a8406fc9d7a9ba1fea1bcdfb2220a124d8a6277214792fdb587f1bc11e |
SSDEEP: | 24576:DeFTQS093d6OBMlvDvZR3ogYaGW8J9Hi82vfaCgeg5qCsXD7aeC:K3093d60XeGXW1gr5AXDOe |
TLSH: | 7255231AAA805737E19F5374092B407E0939DC4EB92BBC06999CF53633F13F62AD3649 |
File Content Preview: | ........................>...................................V...........................................................Y.......{.......}...............a...................................................................................................... |
Icon Hash: | 35e58a8c0c8a85b9 |
Document Type: | OLE |
Number of OLE Files: | 1 |
Has Summary Info: | |
Application Name: | Microsoft Excel |
Encrypted Document: | True |
Contains Word Document Stream: | False |
Contains Workbook/Book Stream: | True |
Contains PowerPoint Document Stream: | False |
Contains Visio Document Stream: | False |
Contains ObjectPool Stream: | False |
Flash Objects Count: | 0 |
Contains VBA Macros: | False |
Code Page: | 1252 |
Author: | |
Last Saved By: | |
Create Time: | 2006-09-16 00:00:00 |
Last Saved Time: | 2025-03-17 05:45:47 |
Creating Application: | |
Security: | 1 |
Document Code Page: | 1252 |
Thumbnail Scaling Desired: | False |
Contains Dirty Links: | False |
Shared Document: | False |
Changed Hyperlinks: | False |
Application Version: | 786432 |
General | |
Stream Path: | \x1CompObj |
CLSID: | |
File Type: | data |
Stream Size: | 114 |
Entropy: | 4.25248375192737 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . . |
Data Raw: | 01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00 |
General | |
Stream Path: | \x5DocumentSummaryInformation |
CLSID: | |
File Type: | data |
Stream Size: | 244 |
Entropy: | 2.889430592781307 |
Base64 Encoded: | False |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . . |
Data Raw: | fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00 |
General | |
Stream Path: | \x5SummaryInformation |
CLSID: | |
File Type: | data |
Stream Size: | 200 |
Entropy: | 3.2920681057018664 |
Base64 Encoded: | False |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . w . . . . . . . . . |
Data Raw: | fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00 |
General | |
Stream Path: | MBD00D3132E/\x1CompObj |
CLSID: | |
File Type: | data |
Stream Size: | 99 |
Entropy: | 3.631242196770981 |
Base64 Encoded: | False |
Data ASCII: | . . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . . |
Data Raw: | 01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00 |
General | |
Stream Path: | MBD00D3132E/Package |
CLSID: | |
File Type: | Microsoft Excel 2007+ |
Stream Size: | 692551 |
Entropy: | 7.992424429220616 |
Base64 Encoded: | True |
Data ASCII: | P K . . . . . . . . . . ! . 9 | . . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
Data Raw: | 50 4b 03 04 14 00 06 00 08 00 00 00 21 00 db 39 7c be ae 01 00 00 0e 06 00 00 13 00 d4 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 d0 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
General | |
Stream Path: | MBD00D3132F/\x1Ole |
CLSID: | |
File Type: | data |
Stream Size: | 886 |
Entropy: | 5.39573268809116 |
Base64 Encoded: | False |
Data ASCII: | . . . . q ` ( . Q . . . . . . . . . . . . n . . . y . . . K . j . . . h . t . t . p . s . : . / . / . k . r . y . x . . . r . u . / . e . 3 . E . P . l . 0 . ? . & . b . i . r . d . c . a . g . e . = . l . o . n . g . & . m . a . i . l . = . s . u . p . e . r . & . h . e . l . i . u . m . = . h . e . a . r . t . b . r . e . a . k . i . n . g . & . s . u . p . p . o . r . t . . . . v N . s V h n & 2 . . s . = . T . E Q \\ ' i . h . x 5 . r , . F u 3 a o . . ; . 5 . & . \\ 7 5 j j ( ] B f . . _ J . J . k U |
Data Raw: | 01 00 00 02 71 cd c8 60 c9 28 16 51 00 00 00 00 00 00 00 00 00 00 00 00 6e 01 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b 6a 01 00 00 68 00 74 00 74 00 70 00 73 00 3a 00 2f 00 2f 00 6b 00 72 00 79 00 78 00 2e 00 72 00 75 00 2f 00 65 00 33 00 45 00 50 00 6c 00 30 00 3f 00 26 00 62 00 69 00 72 00 64 00 63 00 61 00 67 00 65 00 3d 00 6c 00 6f 00 6e 00 67 00 26 00 6d 00 61 00 |
General | |
Stream Path: | Workbook |
CLSID: | |
File Type: | Applesoft BASIC program data, first line number 16 |
Stream Size: | 610391 |
Entropy: | 7.99946707998373 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . . . . . . . . . . / . 6 . . . . . . . . ] 5 . . Y & ( h p . . ' . . ^ H D | ! . T . . S . . . . . . . . . . . M * . . . \\ . p . < x 1 3 . . . . . \\ > k r D Y 5 4 . V . Q h 2 . . . 4 . > : . e D _ . . . N P W 0 . P . B . H . O s . L . n ! . j . i B . . . . . a . . . D . . . = . . . . . . . . ? c i & N N I . 8 . . . . v . . . . . . . . . . . . . h . . . . . . . . ! = . . . % V . b . . ) o . ^ @ . . . ( . . . . " . . . . K . . . . U . . . . . . . % 1 . . . O / . p . v . . O $ ( + . 1 . . . # |
Data Raw: | 09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 1a 5d d3 cf 35 d4 d8 9c 06 59 f2 26 fd 28 68 fb b7 70 cc 89 d6 1f 27 8d 95 b9 db 97 d4 0d 81 5e 48 b6 44 7c 94 21 1a 54 de 8e 1a 53 c2 c8 99 f4 87 00 00 00 e1 00 02 00 b0 04 c1 00 02 00 4d 2a e2 00 00 00 5c 00 70 00 3c 8c 78 c4 ed ae bb 31 33 ce ad fb e8 d8 a0 d3 05 1e bb 0a a6 d7 5c 3e 6b d1 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 17, 2025 09:42:34.145075083 CET | 55215 | 53 | 192.168.2.24 | 162.159.36.2 |
Mar 17, 2025 09:42:34.150626898 CET | 53 | 55215 | 162.159.36.2 | 192.168.2.24 |
Mar 17, 2025 09:42:34.150759935 CET | 55215 | 53 | 192.168.2.24 | 162.159.36.2 |
Mar 17, 2025 09:42:34.156388044 CET | 53 | 55215 | 162.159.36.2 | 192.168.2.24 |
Mar 17, 2025 09:42:34.609970093 CET | 55215 | 53 | 192.168.2.24 | 162.159.36.2 |
Mar 17, 2025 09:42:34.653362036 CET | 53 | 55215 | 162.159.36.2 | 192.168.2.24 |
Mar 17, 2025 09:42:34.653423071 CET | 55215 | 53 | 192.168.2.24 | 162.159.36.2 |
Mar 17, 2025 09:42:51.463613033 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:51.463654995 CET | 443 | 55218 | 188.225.72.170 | 192.168.2.24 |
Mar 17, 2025 09:42:51.463743925 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:51.464685917 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:51.464699984 CET | 443 | 55218 | 188.225.72.170 | 192.168.2.24 |
Mar 17, 2025 09:42:52.169289112 CET | 443 | 55218 | 188.225.72.170 | 192.168.2.24 |
Mar 17, 2025 09:42:52.169373035 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:52.170799017 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:52.170825958 CET | 443 | 55218 | 188.225.72.170 | 192.168.2.24 |
Mar 17, 2025 09:42:52.171952009 CET | 443 | 55218 | 188.225.72.170 | 192.168.2.24 |
Mar 17, 2025 09:42:52.172013044 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:52.173758984 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:52.173849106 CET | 443 | 55218 | 188.225.72.170 | 192.168.2.24 |
Mar 17, 2025 09:42:52.173908949 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:52.173926115 CET | 443 | 55218 | 188.225.72.170 | 192.168.2.24 |
Mar 17, 2025 09:42:52.173966885 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:52.175801992 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:52.220324993 CET | 443 | 55218 | 188.225.72.170 | 192.168.2.24 |
Mar 17, 2025 09:42:52.494265079 CET | 443 | 55218 | 188.225.72.170 | 192.168.2.24 |
Mar 17, 2025 09:42:52.494364023 CET | 443 | 55218 | 188.225.72.170 | 192.168.2.24 |
Mar 17, 2025 09:42:52.494370937 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:52.494415045 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:52.497657061 CET | 55218 | 443 | 192.168.2.24 | 188.225.72.170 |
Mar 17, 2025 09:42:52.497674942 CET | 443 | 55218 | 188.225.72.170 | 192.168.2.24 |
Mar 17, 2025 09:42:52.499150991 CET | 55219 | 80 | 192.168.2.24 | 198.12.89.24 |
Mar 17, 2025 09:42:52.504128933 CET | 80 | 55219 | 198.12.89.24 | 192.168.2.24 |
Mar 17, 2025 09:42:52.504215002 CET | 55219 | 80 | 192.168.2.24 | 198.12.89.24 |
Mar 17, 2025 09:42:52.504369020 CET | 55219 | 80 | 192.168.2.24 | 198.12.89.24 |
Mar 17, 2025 09:42:52.509702921 CET | 80 | 55219 | 198.12.89.24 | 192.168.2.24 |
Mar 17, 2025 09:42:52.978606939 CET | 80 | 55219 | 198.12.89.24 | 192.168.2.24 |
Mar 17, 2025 09:42:52.978651047 CET | 80 | 55219 | 198.12.89.24 | 192.168.2.24 |
Mar 17, 2025 09:42:52.978662968 CET | 80 | 55219 | 198.12.89.24 | 192.168.2.24 |
Mar 17, 2025 09:42:52.978820086 CET | 55219 | 80 | 192.168.2.24 | 198.12.89.24 |
Mar 17, 2025 09:42:57.974914074 CET | 80 | 55219 | 198.12.89.24 | 192.168.2.24 |
Mar 17, 2025 09:42:57.975084066 CET | 55219 | 80 | 192.168.2.24 | 198.12.89.24 |
Mar 17, 2025 09:43:06.457772970 CET | 55223 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:06.457823992 CET | 443 | 55223 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:06.457997084 CET | 55224 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:06.458096027 CET | 443 | 55224 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:06.458115101 CET | 55223 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:06.458206892 CET | 55224 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:06.458622932 CET | 55223 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:06.458636999 CET | 443 | 55223 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:06.458718061 CET | 55224 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:06.458734035 CET | 443 | 55224 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.129956007 CET | 443 | 55224 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.130089045 CET | 55224 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.131673098 CET | 443 | 55223 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.131854057 CET | 55223 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.135261059 CET | 55224 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.135268927 CET | 443 | 55224 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.135565042 CET | 443 | 55224 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.137387991 CET | 55223 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.137417078 CET | 443 | 55223 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.137680054 CET | 443 | 55223 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.148442030 CET | 55223 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.149132967 CET | 55224 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.192336082 CET | 443 | 55224 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.196340084 CET | 443 | 55223 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.253603935 CET | 443 | 55224 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.253693104 CET | 443 | 55224 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.253890991 CET | 55224 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.255218029 CET | 55224 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.255234003 CET | 443 | 55224 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.255394936 CET | 55224 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.255400896 CET | 443 | 55224 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.268548012 CET | 443 | 55223 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.268582106 CET | 443 | 55223 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.268651962 CET | 443 | 55223 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.268676996 CET | 55223 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.269046068 CET | 55223 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.269326925 CET | 55223 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.269356966 CET | 443 | 55223 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:07.269752026 CET | 55223 | 443 | 192.168.2.24 | 13.107.253.72 |
Mar 17, 2025 09:43:07.269769907 CET | 443 | 55223 | 13.107.253.72 | 192.168.2.24 |
Mar 17, 2025 09:43:50.044606924 CET | 55219 | 80 | 192.168.2.24 | 198.12.89.24 |
Mar 17, 2025 09:43:50.049371004 CET | 80 | 55219 | 198.12.89.24 | 192.168.2.24 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 17, 2025 09:42:34.144541979 CET | 53 | 64438 | 162.159.36.2 | 192.168.2.24 |
Mar 17, 2025 09:42:34.653378963 CET | 53 | 52945 | 1.1.1.1 | 192.168.2.24 |
Mar 17, 2025 09:42:51.363815069 CET | 52945 | 53 | 192.168.2.24 | 1.1.1.1 |
Mar 17, 2025 09:42:51.462840080 CET | 53 | 52945 | 1.1.1.1 | 192.168.2.24 |
Mar 17, 2025 09:43:06.447721004 CET | 52945 | 53 | 192.168.2.24 | 1.1.1.1 |
Mar 17, 2025 09:43:06.456486940 CET | 53 | 52945 | 1.1.1.1 | 192.168.2.24 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 17, 2025 09:42:51.363815069 CET | 192.168.2.24 | 1.1.1.1 | 0x659b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 17, 2025 09:43:06.447721004 CET | 192.168.2.24 | 1.1.1.1 | 0xa3aa | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 17, 2025 09:42:01.892172098 CET | 1.1.1.1 | 192.168.2.24 | 0xa561 | No error (0) | s-0005.dual-s-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 17, 2025 09:42:01.892172098 CET | 1.1.1.1 | 192.168.2.24 | 0xa561 | No error (0) | 52.123.128.14 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:42:01.892172098 CET | 1.1.1.1 | 192.168.2.24 | 0xa561 | No error (0) | 52.123.129.14 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:42:02.721993923 CET | 1.1.1.1 | 192.168.2.24 | 0x27f1 | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:42:02.721993923 CET | 1.1.1.1 | 192.168.2.24 | 0x27f1 | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:42:51.462840080 CET | 1.1.1.1 | 192.168.2.24 | 0x659b | No error (0) | 188.225.72.170 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:42:59.359150887 CET | 1.1.1.1 | 192.168.2.24 | 0x846e | No error (0) | a726.dscd.akamai.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 17, 2025 09:42:59.359150887 CET | 1.1.1.1 | 192.168.2.24 | 0x846e | No error (0) | 95.101.54.235 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:42:59.359150887 CET | 1.1.1.1 | 192.168.2.24 | 0x846e | No error (0) | 2.16.202.10 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:04.213052034 CET | 1.1.1.1 | 192.168.2.24 | 0xcb9c | No error (0) | 84.201.210.23 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:04.213052034 CET | 1.1.1.1 | 192.168.2.24 | 0xcb9c | No error (0) | 217.20.57.36 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:04.213052034 CET | 1.1.1.1 | 192.168.2.24 | 0xcb9c | No error (0) | 217.20.57.35 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:04.213052034 CET | 1.1.1.1 | 192.168.2.24 | 0xcb9c | No error (0) | 217.20.57.34 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:04.213052034 CET | 1.1.1.1 | 192.168.2.24 | 0xcb9c | No error (0) | 84.201.210.39 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:04.213052034 CET | 1.1.1.1 | 192.168.2.24 | 0xcb9c | No error (0) | 217.20.57.18 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:04.213052034 CET | 1.1.1.1 | 192.168.2.24 | 0xcb9c | No error (0) | 217.20.57.19 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:04.213052034 CET | 1.1.1.1 | 192.168.2.24 | 0xcb9c | No error (0) | 217.20.57.20 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:06.456486940 CET | 1.1.1.1 | 192.168.2.24 | 0xa3aa | No error (0) | otelrules-bzhndjfje8dvh5fd.z01.azurefd.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:06.456486940 CET | 1.1.1.1 | 192.168.2.24 | 0xa3aa | No error (0) | star-azurefd-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:06.456486940 CET | 1.1.1.1 | 192.168.2.24 | 0xa3aa | No error (0) | shed.dual-low.s-part-0032.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:06.456486940 CET | 1.1.1.1 | 192.168.2.24 | 0xa3aa | No error (0) | azurefd-t-fb-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:06.456486940 CET | 1.1.1.1 | 192.168.2.24 | 0xa3aa | No error (0) | dual.s-part-0044.t-0009.fb-t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:06.456486940 CET | 1.1.1.1 | 192.168.2.24 | 0xa3aa | No error (0) | s-part-0044.t-0009.fb-t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:06.456486940 CET | 1.1.1.1 | 192.168.2.24 | 0xa3aa | No error (0) | 13.107.253.72 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:15.972908020 CET | 1.1.1.1 | 192.168.2.24 | 0xc311 | No error (0) | a726.dscd.akamai.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:15.972908020 CET | 1.1.1.1 | 192.168.2.24 | 0xc311 | No error (0) | 95.101.54.226 | A (IP address) | IN (0x0001) | false | ||
Mar 17, 2025 09:43:15.972908020 CET | 1.1.1.1 | 192.168.2.24 | 0xc311 | No error (0) | 95.101.54.235 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.24 | 55219 | 198.12.89.24 | 80 | 5228 | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Mar 17, 2025 09:42:52.504369020 CET | 286 | OUT | |
Mar 17, 2025 09:42:52.978606939 CET | 1236 | IN | |
Mar 17, 2025 09:42:52.978651047 CET | 224 | IN | |
Mar 17, 2025 09:42:52.978662968 CET | 785 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.24 | 55218 | 188.225.72.170 | 443 | 5228 | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-17 08:42:52 UTC | 266 | OUT | |
2025-03-17 08:42:52 UTC | 509 | IN | |
2025-03-17 08:42:52 UTC | 118 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.24 | 55223 | 13.107.253.72 | 443 | 5228 | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-17 08:43:07 UTC | 215 | OUT | |
2025-03-17 08:43:07 UTC | 515 | IN | |
2025-03-17 08:43:07 UTC | 2781 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.24 | 55224 | 13.107.253.72 | 443 | 5228 | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-17 08:43:07 UTC | 214 | OUT | |
2025-03-17 08:43:07 UTC | 491 | IN | |
2025-03-17 08:43:07 UTC | 461 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 04:41:57 |
Start date: | 17/03/2025 |
Path: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7e0a80000 |
File size: | 70'082'712 bytes |
MD5 hash: | F9F7B6C42211B06E7AC3E4B60AA8FB77 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | false |
Target ID: | 12 |
Start time: | 04:42:52 |
Start date: | 17/03/2025 |
Path: | C:\Windows\System32\mshta.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6f1bb0000 |
File size: | 32'768 bytes |
MD5 hash: | 36D15DDE6D71802D9588CC0D48EDF8EA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | false |
Target ID: | 13 |
Start time: | 04:43:01 |
Start date: | 17/03/2025 |
Path: | C:\Windows\splwow64.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff73c840000 |
File size: | 192'512 bytes |
MD5 hash: | AF4A7EBF6114EE9E6FBCC910EC3C96E6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | false |
Target ID: | 16 |
Start time: | 04:43:14 |
Start date: | 17/03/2025 |
Path: | C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7e0a80000 |
File size: | 70'082'712 bytes |
MD5 hash: | F9F7B6C42211B06E7AC3E4B60AA8FB77 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |