Windows Analysis Report
Quote.docx

Overview

General Information

Sample Name: Quote.docx
Analysis ID: 612092
MD5: a9db621289520e80a617c7891c429b9d
SHA1: f29021a40143a82146e4e6ad489f5c07d1d3397e
SHA256: 06e0f6dac1e68b97b671c7e8f7a7e378d3ea2908d42fa119610902fd8a0e6fbc
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Contains an external reference to another file
Potential document exploit detected (unknown TCP traffic)
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
IP address seen in connection with other malware
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: unknown HTTPS traffic detected: 3.221.148.222:443 -> 192.168.2.22:49171 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.112.193:443 -> 192.168.2.22:49214 version: TLS 1.2
Source: unknown HTTPS traffic detected: 91.198.174.208:443 -> 192.168.2.22:49215 version: TLS 1.2
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 3.221.148.222:443
Source: global traffic DNS query: name: oldmacdonald.had-a.phish.farm
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 3.221.148.222:443
Source: Joe Sandbox View JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: Joe Sandbox View IP Address: 91.198.174.208 91.198.174.208
Source: Joe Sandbox View IP Address: 239.255.255.250 239.255.255.250
Source: unknown Network traffic detected: HTTP traffic on port 49185 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49189
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49188
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49187
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49186
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49185
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49184
Source: unknown Network traffic detected: HTTP traffic on port 49189 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49207 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49172 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49176 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49191 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49199 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49214 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49233 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49184 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49215
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49214
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49179
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49178
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49176
Source: unknown Network traffic detected: HTTP traffic on port 49190 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49175
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49173
Source: unknown Network traffic detected: HTTP traffic on port 49188 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49172
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49171
Source: unknown Network traffic detected: HTTP traffic on port 49194 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49173 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49208
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49207
Source: unknown Network traffic detected: HTTP traffic on port 49187 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49193 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49178 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49186 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49233
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49199
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49194
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49193
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49192
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49191
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49190
Source: unknown Network traffic detected: HTTP traffic on port 49208 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49229 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49175 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49171 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49192 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49179 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49229
Source: unknown Network traffic detected: HTTP traffic on port 49215 -> 443
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Apr 2022 13:06:46 GMTContent-Type: text/html; charset=utf-8Content-Length: 1913Connection: closeX-Request-Id: 05125406-eae7-4a7e-9799-fe0cbcb0472aX-Protected-By: SqreenX-Runtime: 0.005327Strict-Transport-Security: max-age=63113904; includeSubDomains; preload
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Apr 2022 13:06:59 GMTContent-Type: text/html; charset=utf-8Content-Length: 1913Connection: closeX-Request-Id: f7e5497c-759e-4301-90ab-537b321143b2X-Protected-By: SqreenX-Runtime: 0.004796Strict-Transport-Security: max-age=63113904; includeSubDomains; preload
Source: angular.js.3.dr String found in binary or memory: http://angularjs.org
Source: angular.js.3.dr String found in binary or memory: http://errors.angularjs.org/1.6.4-local
Source: mirroring_hangouts.js.3.dr String found in binary or memory: http://tools.ietf.org/html/rfc1950
Source: mirroring_hangouts.js.3.dr String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: mirroring_hangouts.js.3.dr String found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions
Source: mirroring_hangouts.js.3.dr String found in binary or memory: http://www.ietf.org/id/draft-holmer-rmcat-transport-wide-cc-extensions-01
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr, addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, manifest.json.3.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://accounts.google.com
Source: craw_window.js.3.dr String found in binary or memory: https://accounts.google.com/MergeSession
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr, addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://adservice.google.com
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr, addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, manifest.json.3.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://apis.google.com
Source: mirroring_common.js.3.dr String found in binary or memory: https://apis.google.com/js/client.js
Source: mirroring_common.js.3.dr String found in binary or memory: https://castedumessaging-pa.googleapis.com/v1
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr String found in binary or memory: https://clients2.google.com
Source: mirroring_hangouts.js.3.dr String found in binary or memory: https://clients2.google.com/cr/report
Source: manifest.json0.3.dr, manifest.json.3.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr, addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: mirroring_hangouts.js.3.dr String found in binary or memory: https://clients6.google.com
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr, addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://consent.google.com
Source: manifest.json.3.dr String found in binary or memory: https://content.googleapis.com
Source: common.js.3.dr, mirroring_cast_streaming.js.3.dr String found in binary or memory: https://crash.corp.google.com/samples?reportid=&q=
Source: mirroring_hangouts.js.3.dr String found in binary or memory: https://creativecommons.org/publicdomain/zero/1.0/.
Source: mirroring_common.js.3.dr String found in binary or memory: https://docs.google.com
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr, addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://encrypted-tbn0.gstatic.com
Source: manifest.json.3.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr, addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json.3.dr String found in binary or memory: https://fonts.googleapis.com;
Source: manifest.json.3.dr String found in binary or memory: https://fonts.gstatic.com;
Source: material_css_min.css.3.dr, angular.js.3.dr String found in binary or memory: https://github.com/angular/material
Source: craw_window.js.3.dr, craw_background.js.3.dr String found in binary or memory: https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.p
Source: mirroring_hangouts.js.3.dr String found in binary or memory: https://github.com/madler/zlib/blob/master/zlib.h
Source: mirroring_hangouts.js.3.dr String found in binary or memory: https://hangouts.clients6.google.com
Source: manifest.json.3.dr String found in binary or memory: https://hangouts.google.com/
Source: mirroring_hangouts.js.3.dr String found in binary or memory: https://hangouts.google.com/hangouts/_/logpref
Source: mirroring_common.js.3.dr String found in binary or memory: https://meet.google.com
Source: mirroring_hangouts.js.3.dr String found in binary or memory: https://meetings.clients6.google.com
Source: mirroring_common.js.3.dr String found in binary or memory: https://networktraversal.googleapis.com/v1alpha
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr, addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://ogs.google.com
Source: ~WRS{1020FCC3-ABBD-4B9A-9F3F-9D2AD4D8E8F1}.tmp.0.dr String found in binary or memory: https://oldmacdonald.had-a.phish.farm/XU0RWNVJFcHNUV2x4WTIweFFXTTVUbFZqU1ZOdldVaExaMkYxT1dOalRWWm9ka
Source: ~WRS{1020FCC3-ABBD-4B9A-9F3F-9D2AD4D8E8F1}.tmp.0.dr String found in binary or memory: https://oldmacdonald.had-a.phish.farm/XUjFWa2JraHZTRk5aTDJaRGFGaE9iRmQzVmtwa2JTdERNM1pKUTFoclV6TkJWM
Source: ~WRS{1020FCC3-ABBD-4B9A-9F3F-9D2AD4D8E8F1}.tmp.0.dr String found in binary or memory: https://oldmacdonald.had-a.phish.farm/XUzJzMFltNVhNa3RVZEZOWlZrSkhORkp0WlVoNGVVbFBTRkJNUld0UWJIUnhPQ
Source: History Provider Cache.3.dr String found in binary or memory: https://oldmacdonald.had-a.phish.farm/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPR
Source: ~WRS{1020FCC3-ABBD-4B9A-9F3F-9D2AD4D8E8F1}.tmp.0.dr String found in binary or memory: https://oldmacdonald.had-a.phish.farm/XVWxsRGRHSklkSFZ4U0ZsNU1HcG5ja2RyV2s4MFZFSjNNMFI2UXpCdU9XNUNSb
Source: ~WRS{1020FCC3-ABBD-4B9A-9F3F-9D2AD4D8E8F1}.tmp.0.dr String found in binary or memory: https://oldmacdonald.had-a.phish.farm/XYW05NU1UZFVNVEpXVWxGNFNsTjNPVXh5TWpsUE9WQnZRa3hDY1RSc2EybERPW
Source: ~WRS{1020FCC3-ABBD-4B9A-9F3F-9D2AD4D8E8F1}.tmp.0.dr String found in binary or memory: https://oldmacdonald.had-a.phish.farm/XYkZob05YQlhlRzl1Tld0dFYyUlRjVWg2ZERaUk1uUkRjRlI1VmxoM2VEYzVjR
Source: ~WRS{1020FCC3-ABBD-4B9A-9F3F-9D2AD4D8E8F1}.tmp.0.dr String found in binary or memory: https://oldmacdonald.had-a.phish.farm/XZEhoUlZFUjJkRlJsYTFCSE1VeFRiR0pUYnpScVN6QnZSMFZoZG10aFJWRk1Wa
Source: ~WRS{1020FCC3-ABBD-4B9A-9F3F-9D2AD4D8E8F1}.tmp.0.dr String found in binary or memory: https://oldmacdonald.had-a.phish.farm/XZVhBdlpDOVhVWHByUldGcE0zRnljVnBMTVhaaFJ6UmpjMDFDTWxGUk0wMXZhM
Source: craw_window.js.3.dr, manifest.json0.3.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: mirroring_hangouts.js.3.dr String found in binary or memory: https://play.google.com/log?format=json&hasfast=true
Source: mirroring_hangouts.js.3.dr String found in binary or memory: https://preprod-hangouts-googleapis.sandbox.google.com
Source: addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://r3---sn-4g5ednz7.gvt1.com
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr, addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://redirector.gvt1.com
Source: craw_window.js.3.dr, manifest.json0.3.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: History Provider Cache.3.dr String found in binary or memory: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob
Source: messages.json58.3.dr, messages.json5.3.dr, messages.json65.3.dr, messages.json6.3.dr, messages.json30.3.dr, messages.json45.3.dr, messages.json2.3.dr, messages.json42.3.dr, messages.json16.3.dr, messages.json47.3.dr, messages.json8.3.dr, messages.json31.3.dr, messages.json33.3.dr, messages.json46.3.dr, messages.json48.3.dr, messages.json64.3.dr, messages.json28.3.dr, messages.json43.3.dr, messages.json1.3.dr, messages.json0.3.dr, messages.json3.3.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json58.3.dr, messages.json5.3.dr, messages.json65.3.dr, messages.json6.3.dr, messages.json30.3.dr, messages.json45.3.dr, messages.json2.3.dr, messages.json42.3.dr, messages.json16.3.dr, messages.json47.3.dr, messages.json8.3.dr, messages.json31.3.dr, messages.json33.3.dr, messages.json46.3.dr, messages.json48.3.dr, messages.json64.3.dr, messages.json28.3.dr, messages.json43.3.dr, messages.json1.3.dr, messages.json0.3.dr, messages.json3.3.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr, addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://update.googleapis.com
Source: craw_window.js.3.dr, craw_background.js.3.dr String found in binary or memory: https://www-googleapis-staging.sandbox.google.com
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr, addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, manifest.json.3.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://www.google.com
Source: manifest.json0.3.dr String found in binary or memory: https://www.google.com/
Source: craw_window.js.3.dr String found in binary or memory: https://www.google.com/accounts/OAuthLogin?issueuberauth=1
Source: craw_window.js.3.dr String found in binary or memory: https://www.google.com/images/cleardot.gif
Source: craw_window.js.3.dr String found in binary or memory: https://www.google.com/images/dot2.gif
Source: craw_window.js.3.dr String found in binary or memory: https://www.google.com/images/x2.gif
Source: craw_background.js.3.dr String found in binary or memory: https://www.google.com/intl/en-US/chrome/blank.html
Source: mirroring_hangouts.js.3.dr String found in binary or memory: https://www.google.com/log?format=json&hasfast=true
Source: feedback_script.js.3.dr String found in binary or memory: https://www.google.com/tools/feedback
Source: manifest.json.3.dr String found in binary or memory: https://www.google.com;
Source: craw_window.js.3.dr, craw_background.js.3.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json0.3.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json.3.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json.3.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json0.3.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json0.3.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json.3.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json.3.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json.3.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json.3.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json.3.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json0.3.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json0.3.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json.3.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: mirroring_common.js.3.dr String found in binary or memory: https://www.googleapis.com/calendar/v3
Source: mirroring_common.js.3.dr String found in binary or memory: https://www.googleapis.com/hangouts/v1
Source: 324c5fd2-9b59-4efc-bd72-db915a3ed90c.tmp.4.dr, addccecd-8da7-4b0e-90e0-13d5c87a6b5a.tmp.4.dr, 461bedee-acac-4bd4-9261-fa41b4943a1e.tmp.4.dr String found in binary or memory: https://www.gstatic.com
Source: common.js.3.dr String found in binary or memory: https://www.gstatic.com/hangouts_echo_detector/release/%
Source: manifest.json.3.dr String found in binary or memory: https://www.gstatic.com;
Source: unknown HTTP traffic detected: POST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1Host: accounts.google.comConnection: keep-aliveContent-Length: 1Origin: https://www.google.comContent-Type: application/x-www-form-urlencodedSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: CONSENT=WP.289365
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A99EA44A-DACF-46CE-8CD4-E40B0EE13B56}.tmp Jump to behavior
Source: unknown DNS traffic detected: queries for: oldmacdonald.had-a.phish.farm
Source: global traffic HTTP traffic detected: GET /XYkZob05YQlhlRzl1Tld0dFYyUlRjVWg2ZERaUk1uUkRjRlI1VmxoM2VEYzVjRXQyWTJSbVFTOTRaamxRVmpkdk1qQktVR2szVWxOV1ltRXZSelZTUldwcVprcG5ValpPWTJGSk5FaExkbk5FWm5CSU56VnlVWFJZWXk5M1NXMU9ja0pqV1UxamNucEdWMVU5TFMxR1IwWmlabE4wTkZNd1RHbEpWa3MyWjI5eVppdG5QVDA9LS00ZTQwMmQzNjJhYzNmNGVmZWI3NDZiOGQzNTE2MjBmYjBhMDYxODFj?cid=1156173281 HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: oldmacdonald.had-a.phish.farmConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=84.0.4147.135&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1&x=id%3Dpkedcjkdefgpdelpbcmbmeomcjbeemfm%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1Host: clients2.google.comConnection: keep-aliveX-Goog-Update-Interactivity: fgX-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmieda,pkedcjkdefgpdelpbcmbmeomcjbeemfmX-Goog-Update-Updater: chromecrx-84.0.4147.135Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3Mjlk?cid=1156173281 HTTP/1.1Host: oldmacdonald.had-a.phish.farmConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3Mjlk HTTP/1.1Host: secured-login.netConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-Dest: documentReferer: https://oldmacdonald.had-a.phish.farm/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3Mjlk?cid=1156173281Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /assets/application-04a96146efb6193a4fb9ccb60b99fa33c679e346e15d7cea0a2e9e8e54397acb.js HTTP/1.1Host: secured-login.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3MjlkAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /assets/landing-watermark-8487e36eef1bec74f06631f19fea0aa171c208e2976373cda5bd0a4b9e230903.css HTTP/1.1Host: secured-login.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: text/css,*/*;q=0.1Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3MjlkAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /assets/sei-modal-298c1edd0166bef9cbaf6b85083b95d5819753f027d6a841658c738f21e84e49.css HTTP/1.1Host: secured-login.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: text/css,*/*;q=0.1Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3MjlkAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /assets/sei-tooltip-1ae0d1e9729436272a0cdfaf2325f9aacea7d6f89787d08056eda54a1910752d.css HTTP/1.1Host: secured-login.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: text/css,*/*;q=0.1Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3MjlkAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /assets/sei-flag-68d13d784ca9a21935d3004d873a9d547a5992deb153f1069c517f83cb514c7a.css HTTP/1.1Host: secured-login.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: text/css,*/*;q=0.1Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3MjlkAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /packs/js/vendor-2207a81ec738c3300f3e.js HTTP/1.1Host: secured-login.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3MjlkAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /helpimg/landing_pages/css/dd.css HTTP/1.1Host: s3.amazonaws.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3MjlkAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /helpimg/landing_pages/css/flags.css HTTP/1.1Host: s3.amazonaws.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: styleReferer: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3MjlkAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /assets/modernizr-79e0181ec91aff04bb01d87cba546535ede843f75d19f5c60f66b8dd6546971f.js HTTP/1.1Host: secured-login.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptReferer: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3MjlkAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /wikipedia/commons/thumb/2/22/Milliman_logo.svg/301px-Milliman_logo.svg.png HTTP/1.1Host: upload.wikimedia.orgConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: image/webp,image/apng,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3MjlkAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /QRF01zv.png HTTP/1.1Host: i.imgur.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: image/webp,image/apng,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3MjlkAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /assets/sei-flag-90af55d793544fe1893f26677661a4252761afbe811fab0eced85c67bc82f984.png HTTP/1.1Host: secured-login.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: image/webp,image/apng,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://secured-login.net/assets/sei-flag-68d13d784ca9a21935d3004d873a9d547a5992deb153f1069c517f83cb514c7a.cssAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Host: secured-login.netConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept: image/webp,image/apng,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://secured-login.net/pages/9c8d1a532ce0b/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3MjlkAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /crx/blobs/Acy1k0bLIjHsvnKaKN_oRpVaYYvFs25d7GKYF1WXrT6yizCMksBO0c_ggE0B6tx6HPRHe6q1GOEe3_NcIbSiGG8kXeLMUY0sAKVvC6R89zvKM13s5VqoAMZSmuUgjQL5vlygJuArQghXXE_qTL7NlQ/extension_8520_615_0_5.crx HTTP/1.1Host: clients2.googleusercontent.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /QRF01zv.png HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.183 Safari/537.36Host: i.imgur.com
Source: global traffic HTTP traffic detected: GET /wikipedia/commons/thumb/2/22/Milliman_logo.svg/301px-Milliman_logo.svg.png HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.183 Safari/537.36Host: upload.wikimedia.org
Source: global traffic HTTP traffic detected: GET /XYkZob05YQlhlRzl1Tld0dFYyUlRjVWg2ZERaUk1uUkRjRlI1VmxoM2VEYzVjRXQyWTJSbVFTOTRaamxRVmpkdk1qQktVR2szVWxOV1ltRXZSelZTUldwcVprcG5ValpPWTJGSk5FaExkbk5FWm5CSU56VnlVWFJZWXk5M1NXMU9ja0pqV1UxamNucEdWMVU5TFMxR1IwWmlabE4wTkZNd1RHbEpWa3MyWjI5eVppdG5QVDA9LS00ZTQwMmQzNjJhYzNmNGVmZWI3NDZiOGQzNTE2MjBmYjBhMDYxODFj?cid=1156173281 HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: oldmacdonald.had-a.phish.farmConnection: Keep-Alive
Source: unknown HTTPS traffic detected: 3.221.148.222:443 -> 192.168.2.22:49171 version: TLS 1.2
Source: unknown HTTPS traffic detected: 151.101.112.193:443 -> 192.168.2.22:49214 version: TLS 1.2
Source: unknown HTTPS traffic detected: 91.198.174.208:443 -> 192.168.2.22:49215 version: TLS 1.2

System Summary

barindex
Source: Screenshot number: 12 Screenshot OCR: Enable editing" button in the top yellow bar, and then "Enable content". Or click the below button
Source: Screenshot number: 12 Screenshot OCR: Enable content". Or click the below button to load content in browser View Document O Please
Source: ~WRF{651978B4-4A43-457C-A7AD-2D669B25A072}.tmp.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: unknown Process created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: unknown Process created: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --start-maximized --enable-automation "https://oldmacdonald.had-a.phish.farm/XVDBaVFRVNVdjRmd5Wm5WWWNWUlhTVkJuYlc0d09HMW9hMU5PTDJob05rNVZPRzFpWkdFdlJpOTRTMjlFT1ZsSVJYbEVXRnBKTkd4T1ZIcHhhRXhOYVVnME0wZFdNbkpFTmtaellXMU5NMHBLY1RaTlVpczFRWGhPTWpkTlJUbHhVbkJqY2tSU00zSjVibkZyYzJOMVQwNVNPVkJZZUhOV1psWlJSbFJxTUhZMlJ6Vk9ZbkpHYTNCT01XdFRVR3hUVUdoUVRrMXZMMEZMU2xCWlUyOHJlbXhMUldwd1VFVldZVGRCUFMwdFRHdFllbU5WZEdsMEszQnBObGxDT0RSTlF6TkxVVDA5LS0xYjU0YTc1MGRkYmVmMzUxYjM1MzM3Nzc1ZTcyYjc5ODE2OTU3Mjlk?cid=1156173281
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1028,11011485947330513052,11238533169344121473,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1416 /prefetch:8
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1028,11011485947330513052,11238533169344121473,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1416 /prefetch:8 Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\Desktop\~$Quote.docx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\AppData\Local\Temp\CVR6D14.tmp Jump to behavior
Source: classification engine Classification label: mal52.evad.winDOCX@32/205@11/15
Source: ~WRF{651978B4-4A43-457C-A7AD-2D669B25A072}.tmp.0.dr OLE document summary: title field not present or empty
Source: ~WRF{651978B4-4A43-457C-A7AD-2D669B25A072}.tmp.0.dr OLE document summary: author field not present or empty
Source: ~WRF{651978B4-4A43-457C-A7AD-2D669B25A072}.tmp.0.dr OLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: ~WRF{651978B4-4A43-457C-A7AD-2D669B25A072}.tmp.0.dr Initial sample: OLE indicators vbamacros = False

Persistence and Installation Behavior

barindex
Source: document.xml.rels Extracted files from sample: https://oldmacdonald.had-a.phish.farm/xykzob05yqlhlrzl1tld0dfyyulrjvwg2zerauk1uukrjrli1vmxom2veyzvjrxqywtjsbvftotraamxrvmpkdk1qqktvr2szvwxov1ltrxzselztuldwcvprcg5valppwtjgsk5faexkbk5fwm5csu56vnlvwfjzwxk5m1nxmu9ja0pqv1uxamnucedwmvu5tfmxr1iwwmlabe4wtkznd1rhbepwa3mywji5evppdg5qvda9ls00ztqwmmqznjjhyznmngvmzwi3ndziogqznte2mjbmyjbhmdyxodfj?cid=1156173281
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs