Windows Analysis Report
dl18aYTBo5

Overview

General Information

Sample Name: dl18aYTBo5 (renamed file extension from none to docx)
Analysis ID: 686004
MD5: b91615355a11f5bb8b7c381a8bc4485a
SHA1: 7950b1730e05a2dcdd19f1a98a697798a9edbf77
SHA256: 3fdd30eb0961c98259d58327745ec253588b1553d9822d613d45d076c4b07ec1
Infos:

Detection

Score: 72
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Contains an external reference to another file
Detected suspicious Microsoft Office reference URL
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
IP address seen in connection with other malware
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

AV Detection

barindex
Source: dl18aYTBo5.docx Avira: detected
Source: dl18aYTBo5.docx Metadefender: Detection: 20% Perma Link
Source: dl18aYTBo5.docx ReversingLabs: Detection: 27%

Exploits

barindex
Source: document.xml.rels Extracted files from sample: https://raw.githubusercontent.com/drgreenthumb93/cve-2022-30190-follina/main/bad.html!
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: unknown HTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.22:49171 version: TLS 1.2
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 185.199.108.133:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic DNS query: name: raw.githubusercontent.com
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 185.199.108.133:443
Source: Joe Sandbox View ASN Name: FASTLYUS FASTLYUS
Source: Joe Sandbox View JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: Joe Sandbox View IP Address: 185.199.108.133 185.199.108.133
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49172
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49171
Source: unknown Network traffic detected: HTTP traffic on port 49172 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49171 -> 443
Source: global traffic HTTP traffic detected: HTTP/1.1 403 ForbiddenConnection: closeCache-Control: no-cacheContent-Type: text/html; charset=utf-8Strict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 0Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'Accept-Ranges: bytesDate: Thu, 18 Aug 2022 01:51:10 GMTVia: 1.1 varnishX-Served-By: cache-mxp6935-MXPX-Cache: MISSX-Cache-Hits: 0X-Timer: S1660787471.831212,VS0,VE9Access-Control-Allow-Origin: *X-Fastly-Request-ID: 0038ae362210300c11e8b16daefe6a458ddf6fd4Expires: Thu, 18 Aug 2022 01:56:10 GMTVary: Authorization,Accept-Encodingtransfer-encoding: chunked
Source: global traffic HTTP traffic detected: HTTP/1.1 403 ForbiddenConnection: closeCache-Control: no-cacheContent-Type: text/html; charset=utf-8Strict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 0Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'Accept-Ranges: bytesDate: Thu, 18 Aug 2022 01:51:16 GMTVia: 1.1 varnishX-Served-By: cache-mxp6942-MXPX-Cache: MISSX-Cache-Hits: 0X-Timer: S1660787477.934296,VS0,VE9Access-Control-Allow-Origin: *X-Fastly-Request-ID: 86ac34f2a7f5281d6f97d13ae2197222c90618afExpires: Thu, 18 Aug 2022 01:56:16 GMTVary: Authorization,Accept-Encodingtransfer-encoding: chunked
Source: ~WRS{FEC6DCA0-7354-46DE-A8FC-629874E35853}.tmp.0.dr String found in binary or memory: https://raw.githubusercontent.com/drgreenthumb93/CVE-2022-30190-follina/main/bad.html
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{40655C52-0542-4D1D-95A6-44AB7A44DEAF}.tmp Jump to behavior
Source: unknown DNS traffic detected: queries for: raw.githubusercontent.com
Source: unknown HTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.22:49171 version: TLS 1.2

System Summary

barindex
Source: document.xml.rels, type: SAMPLE Matched rule: Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents Author: ditekSHen
Source: document.xml.rels, type: SAMPLE Matched rule: SUSP_Doc_WordXMLRels_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, Wojciech Cieslak, description = Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-06-20, hash = 62f262d180a5a48f89be19369a8425bec596bc6a02ed23100424930791ae3df0
Source: document.xml.rels, type: SAMPLE Matched rule: INDICATOR_OLE_RemoteTemplate author = ditekSHen, description = Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents
Source: ~WRF{24DDD834-E6C7-483D-822D-9FEFD1EF961E}.tmp.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: dl18aYTBo5.docx Metadefender: Detection: 20%
Source: dl18aYTBo5.docx ReversingLabs: Detection: 27%
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: dl18aYTBo5.LNK.0.dr LNK file: ..\..\..\..\..\Desktop\dl18aYTBo5.docx
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\Desktop\~$18aYTBo5.docx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\AppData\Local\Temp\CVR4E00.tmp Jump to behavior
Source: classification engine Classification label: mal72.expl.evad.winDOCX@1/15@1/1
Source: ~WRF{24DDD834-E6C7-483D-822D-9FEFD1EF961E}.tmp.0.dr OLE document summary: title field not present or empty
Source: ~WRF{24DDD834-E6C7-483D-822D-9FEFD1EF961E}.tmp.0.dr OLE document summary: author field not present or empty
Source: ~WRF{24DDD834-E6C7-483D-822D-9FEFD1EF961E}.tmp.0.dr OLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: ~WRF{24DDD834-E6C7-483D-822D-9FEFD1EF961E}.tmp.0.dr Initial sample: OLE indicators vbamacros = False

Persistence and Installation Behavior

barindex
Source: document.xml.rels Extracted files from sample: https://raw.githubusercontent.com/drgreenthumb93/cve-2022-30190-follina/main/bad.html!
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs