Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CY SEC AUDIT PLAN 2025.docx.doc

Overview

General Information

Sample name:CY SEC AUDIT PLAN 2025.docx.doc
Analysis ID:1587391
MD5:0ffd99b46024863228e14efea8265ff2
SHA1:274b3cdab333bce3309d7444b2cb82fd7c0b1926
SHA256:896ddb35cde29b51ec5cf0da0197605d5fd754c1f9f45e97d40cd287fb5a2d25
Tags:aptdocSidewinderuser-smica83
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Contains an external reference to another file
Office viewer loads remote template
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Office Outbound Connections
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

  • System is w11x64_office
  • WINWORD.EXE (PID: 7628 cmdline: "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding MD5: A9F0EC89897AC6C878D217DFB64CA752)
    • FLTLDR.EXE (PID: 7852 cmdline: "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT MD5: 036423B15211CC7D2E83A271709049F6)
    • FLTLDR.EXE (PID: 8184 cmdline: "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT MD5: 036423B15211CC7D2E83A271709049F6)
    • FLTLDR.EXE (PID: 4456 cmdline: "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT MD5: 036423B15211CC7D2E83A271709049F6)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
_rels\document.xml.relsINDICATOR_OLE_RemoteTemplateDetects XML relations where an OLE object is refrencing an external target in dropper OOXML documentsditekSHen
  • 0x27a:$olerel: relationships/oleObject
  • 0x293:$target1: Target="http
  • 0x2d3:$mode: TargetMode="External

System Summary

barindex
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.24, DestinationIsIpv6: false, DestinationPort: 49744, EventID: 3, Image: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE, Initiated: true, ProcessId: 7628, Protocol: tcp, SourceIp: 151.236.12.150, SourceIsIpv6: false, SourcePort: 443
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T10:30:25.385343+010020551291A Network Trojan was detected151.236.12.150443192.168.2.2449746TCP
2025-01-10T10:30:29.309410+010020551291A Network Trojan was detected151.236.12.150443192.168.2.2449752TCP
2025-01-10T10:30:35.065073+010020551291A Network Trojan was detected151.236.12.150443192.168.2.2449763TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T10:30:25.384196+010020338581Malware Command and Control Activity Detected192.168.2.2449746151.236.12.150443TCP
2025-01-10T10:30:29.308344+010020338581Malware Command and Control Activity Detected192.168.2.2449752151.236.12.150443TCP
2025-01-10T10:30:35.064526+010020338581Malware Command and Control Activity Detected192.168.2.2449763151.236.12.150443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T10:30:24.195859+010020550801Malware Command and Control Activity Detected192.168.2.2449745151.236.12.150443TCP
2025-01-10T10:30:28.193838+010020550801Malware Command and Control Activity Detected192.168.2.2449751151.236.12.150443TCP
2025-01-10T10:30:33.933417+010020550801Malware Command and Control Activity Detected192.168.2.2449759151.236.12.150443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T10:30:25.384196+010018100041Potentially Bad Traffic192.168.2.2449746151.236.12.150443TCP
2025-01-10T10:30:29.308344+010018100041Potentially Bad Traffic192.168.2.2449752151.236.12.150443TCP
2025-01-10T10:30:35.064526+010018100041Potentially Bad Traffic192.168.2.2449763151.236.12.150443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-10T10:30:31.732689+010018100051Potentially Bad Traffic192.168.2.2449755151.236.12.150443TCP

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 151.236.12.150:443 -> 192.168.2.24:49744 version: TLS 1.2
Source: unknownHTTPS traffic detected: 151.236.12.150:443 -> 192.168.2.24:49764 version: TLS 1.2
Source: global trafficDNS query: name: paknavy.modpak.live
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49758 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49758 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49758 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49758 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49758 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49758 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49744
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49744
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49744
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49744
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49744
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49744
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49744
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49744
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49744 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49744
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49745
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49745
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49745
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49745
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49745
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49745
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49745 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49745
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49745
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49745
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49746 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49748
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49748
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49749
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49749
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49748
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49748
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49748
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49748
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49748
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49749
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49749
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49749
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49748
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49748
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49748
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49748 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49748
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49749
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49749
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49749 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49751
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49751
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49751
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49751
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49751
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49751
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49751
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49751
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49751
Source: global trafficTCP traffic: 192.168.2.24:49751 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49752
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49752
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49752
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49752
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49752
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49752
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49752
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49752
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49752
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49752
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49752
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49752 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49752
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49754
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49754
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49754
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49754
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49754
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49753
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49753 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49754
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49754
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49754 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49754
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49755
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49755
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49755
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49755
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49755
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49755
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49755
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49755
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49755
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49755
Source: global trafficTCP traffic: 192.168.2.24:49755 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49757
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49757
Source: global trafficTCP traffic: 192.168.2.24:49758 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49758
Source: global trafficTCP traffic: 192.168.2.24:49758 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49758 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49758
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49758
Source: global trafficTCP traffic: 192.168.2.24:49758 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49758
Source: global trafficTCP traffic: 192.168.2.24:49758 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49758
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49757
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49757
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49757
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49758
Source: global trafficTCP traffic: 192.168.2.24:49758 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49759
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49759
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49757
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49757
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49757 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49761
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49761
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49759
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49759
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49759
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49761
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49761
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49761
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49759
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49759
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49759 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49759
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49759
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49763
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49763
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49761
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49761
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49761
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49761
Source: global trafficTCP traffic: 192.168.2.24:49761 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49764
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49764
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49763
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49763
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49763
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49763
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49764
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49764
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49764
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49764
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49763
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49763
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49763 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49763
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49764
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49764
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49764 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49764
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49767
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49767
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49767
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49767
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49767
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49767
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49767
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49767
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49767
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49767
Source: global trafficTCP traffic: 192.168.2.24:49767 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49769
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49769
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49769
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49769
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49769
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49769
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49769
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49769
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443
Source: global trafficTCP traffic: 151.236.12.150:443 -> 192.168.2.24:49769
Source: global trafficTCP traffic: 192.168.2.24:49769 -> 151.236.12.150:443

Networking

barindex
Source: Network trafficSuricata IDS: 2055080 - Severity 1 - ET MALWARE TA399/Sidewinder Activity Payload Request M3, Microsoft Word UA Request for .rtf : 192.168.2.24:49745 -> 151.236.12.150:443
Source: Network trafficSuricata IDS: 1810004 - Severity 1 - Joe Security ANOMALY Microsoft Office HTTP activity : 192.168.2.24:49752 -> 151.236.12.150:443
Source: Network trafficSuricata IDS: 2033858 - Severity 1 - ET MALWARE TA399/Sidewinder Activity Payload Request M2, Microsoft Office UA Request for .rtf : 192.168.2.24:49752 -> 151.236.12.150:443
Source: Network trafficSuricata IDS: 1810004 - Severity 1 - Joe Security ANOMALY Microsoft Office HTTP activity : 192.168.2.24:49763 -> 151.236.12.150:443
Source: Network trafficSuricata IDS: 2055080 - Severity 1 - ET MALWARE TA399/Sidewinder Activity Payload Request M3, Microsoft Word UA Request for .rtf : 192.168.2.24:49759 -> 151.236.12.150:443
Source: Network trafficSuricata IDS: 1810005 - Severity 1 - Joe Security ANOMALY Microsoft Office WebDAV Discovery : 192.168.2.24:49755 -> 151.236.12.150:443
Source: Network trafficSuricata IDS: 1810004 - Severity 1 - Joe Security ANOMALY Microsoft Office HTTP activity : 192.168.2.24:49746 -> 151.236.12.150:443
Source: Network trafficSuricata IDS: 2033858 - Severity 1 - ET MALWARE TA399/Sidewinder Activity Payload Request M2, Microsoft Office UA Request for .rtf : 192.168.2.24:49746 -> 151.236.12.150:443
Source: Network trafficSuricata IDS: 2033858 - Severity 1 - ET MALWARE TA399/Sidewinder Activity Payload Request M2, Microsoft Office UA Request for .rtf : 192.168.2.24:49763 -> 151.236.12.150:443
Source: Network trafficSuricata IDS: 2055080 - Severity 1 - ET MALWARE TA399/Sidewinder Activity Payload Request M3, Microsoft Word UA Request for .rtf : 192.168.2.24:49751 -> 151.236.12.150:443
Source: Joe Sandbox ViewASN Name: EDIS-AS-EUAT EDIS-AS-EUAT
Source: Joe Sandbox ViewJA3 fingerprint: 258a5a1e95b8a911872bae9081526644
Source: Network trafficSuricata IDS: 2055129 - Severity 1 - ET MALWARE Possible TA399/SideWinder Related Empty .rtf Inbound : 151.236.12.150:443 -> 192.168.2.24:49752
Source: Network trafficSuricata IDS: 2055129 - Severity 1 - ET MALWARE Possible TA399/SideWinder Related Empty .rtf Inbound : 151.236.12.150:443 -> 192.168.2.24:49763
Source: Network trafficSuricata IDS: 2055129 - Severity 1 - ET MALWARE Possible TA399/SideWinder Related Empty .rtf Inbound : 151.236.12.150:443 -> 192.168.2.24:49746
Source: global trafficHTTP traffic detected: GET /70137347_audit/Profile.rtf HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: paknavy.modpak.liveConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /70137347_audit/Profile.rtf HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: paknavy.modpak.liveConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /70137347_audit/Profile.rtf HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: paknavy.modpak.liveConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /70137347_audit/Profile.rtf HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: paknavy.modpak.liveConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /70137347_audit/Profile.rtf HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: paknavy.modpak.liveConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /70137347_audit/Profile.rtf HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: paknavy.modpak.liveConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: paknavy.modpak.live
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownHTTPS traffic detected: 151.236.12.150:443 -> 192.168.2.24:49744 version: TLS 1.2
Source: unknownHTTPS traffic detected: 151.236.12.150:443 -> 192.168.2.24:49764 version: TLS 1.2

System Summary

barindex
Source: _rels\document.xml.rels, type: SAMPLEMatched rule: Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents Author: ditekSHen
Source: _rels\document.xml.rels, type: SAMPLEMatched rule: INDICATOR_OLE_RemoteTemplate author = ditekSHen, description = Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents
Source: classification engineClassification label: mal64.evad.winDOC@8/7@1/1
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\Desktop\~$ SEC AUDIT PLAN 2025.docx.docJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{208E7C2E-5BFF-425E-AED7-1FC1ABC3B53F} - OProcSessId.datJump to behavior
Source: CY SEC AUDIT PLAN 2025.docx.docOLE indicator, Word Document stream: true
Source: ~WRD0000.tmp.1.drOLE indicator, Word Document stream: true
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLTJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLTJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLTJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: apphelp.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: c2r64.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: msvcp140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: msvcp140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: windows.storage.onecore.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: c2r64.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: msvcp140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: msvcp140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: windows.storage.onecore.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: uxtheme.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: c2r64.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: msvcp140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: msvcp140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: vcruntime140.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: windows.storage.onecore.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXESection loaded: uxtheme.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: CY SEC AUDIT PLAN 2025.docx.docInitial sample: OLE zip file path = word/media/image2.jpg
Source: ~WRD0000.tmp.1.drInitial sample: OLE zip file path = word/media/image5.emf
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: CY SEC AUDIT PLAN 2025.docx.docStatic file information: File size 1960592 > 1048576
Source: CY SEC AUDIT PLAN 2025.docx.docInitial sample: OLE indicators vbamacros = False

Persistence and Installation Behavior

barindex
Source: _rels\document.xml.relsExtracted files from sample: https://paknavy.modpak.live/70137347_audit/profile.rtf
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
Source: CY SEC AUDIT PLAN 2025.docx.doc, ~WRD0000.tmp.1.dr, image3.pngBinary or memory string: qeMUFVz
Source: C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXEProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEQueries volume information: C:\Users\user\AppData\Local\Packages\oice_16_974fa576_32c1d314_3267\AC\Temp\FLFE95.tmp VolumeInformationJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEQueries volume information: C:\Users\user\AppData\Local\Packages\oice_16_974fa576_32c1d314_8f4\AC\Temp\FL2008.tmp VolumeInformationJump to behavior
Source: C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXEQueries volume information: C:\Users\user\AppData\Local\Packages\oice_16_974fa576_32c1d314_2e78\AC\Temp\FL49F8.tmp VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
Exploitation for Client Execution
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
CY SEC AUDIT PLAN 2025.docx.doc0%ReversingLabs
CY SEC AUDIT PLAN 2025.docx.doc5%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://paknavy.modpak.live/70137347_audit/Profile.rtf0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
paknavy.modpak.live
151.236.12.150
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://paknavy.modpak.live/70137347_audit/Profile.rtftrue
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    151.236.12.150
    paknavy.modpak.liveEuropean Union
    57169EDIS-AS-EUATtrue
    Joe Sandbox version:42.0.0 Malachite
    Analysis ID:1587391
    Start date and time:2025-01-10 10:29:15 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 9s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
    Run name:Potential for more IOCs and behavior
    Number of analysed new started processes analysed:21
    Number of new started drivers analysed:1
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:CY SEC AUDIT PLAN 2025.docx.doc
    Detection:MAL
    Classification:mal64.evad.winDOC@8/7@1/1
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .doc
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, sppsvc.exe, RuntimeBroker.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.109.89.18, 52.109.89.119, 52.113.194.132, 52.109.89.19, 20.189.173.28, 95.100.110.68, 95.100.110.78, 2.23.240.50, 95.100.110.74, 95.100.110.77, 52.111.236.34, 52.111.236.35, 52.111.236.33, 52.111.236.32, 20.190.159.75, 52.149.20.212
    • Excluded domains from analysis (whitelisted): e1324.dscd.akamaiedge.net, odc.officeapps.live.com, slscr.update.microsoft.com, europe.odcsm1.live.com.akadns.net, templatesmetadata.office.net.edgekey.net, weu-azsc-000.roaming.officeapps.live.com, weu-azsc-config.officeapps.live.com, eur.roaming1.live.com.akadns.net, mobile.events.data.microsoft.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, osiprod-weu-buff-azsc-000.westeurope.cloudapp.azure.com, osiprod-weu-bronze-azsc-000.westeurope.cloudapp.azure.com, onedscolprdwus18.westus.cloudapp.azure.com, login.live.com, officeclient.microsoft.com, templatesmetadata.office.net, c.pki.goog, res-1-tls.cdn.office.net, ecs.office.com, e40491.dscg.akamaiedge.net, client.wns.windows.com, prod.configsvc1.live.com.akadns.net, uci.cdn.office.net, ctldl.windowsupdate.com, weu-azsc-000.odc.officeapps.live.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, prod1.naturallanguageeditorservice.osi.office.net.akadns.net, x1.c.lencr.org, e26769.d
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtCreateFile calls found.
    • Report size getting too big, too many NtQueryAttributesFile calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Report size getting too big, too many NtReadVirtualMemory calls found.
    • Report size getting too big, too many NtSetValueKey calls found.
    No simulations
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    EDIS-AS-EUATfile.exeGet hashmaliciousFormBook, PureLog StealerBrowse
    • 185.26.237.170
    Acrobat_DC_x64_VIP_v10.12.msiGet hashmaliciousBumbleBeeBrowse
    • 149.154.153.2
    otis.exeGet hashmaliciousUnknownBrowse
    • 192.121.170.106
    ssowoface.dllGet hashmaliciousUnknownBrowse
    • 192.36.61.122
    ssowoface.dllGet hashmaliciousUnknownBrowse
    • 192.36.61.122
    msws.msiGet hashmaliciousORPCBackdoorBrowse
    • 151.236.9.174
    msws.msiGet hashmaliciousORPCBackdoorBrowse
    • 151.236.9.174
    Mcb5K3TOWT.exeGet hashmaliciousUnknownBrowse
    • 192.36.38.33
    987123.exeGet hashmaliciousLummaC, Eternity Stealer, LummaC Stealer, SmokeLoader, Stealc, zgRATBrowse
    • 192.36.38.33
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    258a5a1e95b8a911872bae9081526644H565rymIuO.docGet hashmaliciousUnknownBrowse
    • 151.236.12.150
    Sample_Order_000000991.xlsGet hashmaliciousUnknownBrowse
    • 151.236.12.150
    Payment_swift_copy.xlsGet hashmaliciousUnknownBrowse
    • 151.236.12.150
    No context
    Process:C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):50
    Entropy (8bit):4.46146788019945
    Encrypted:false
    SSDEEP:3:wcek9LRAlxkAMvtEKb:wJcexJC
    MD5:A471D39C02EE8428702B468C843C62E3
    SHA1:91E6F53C4DCE4D7822F120DA20A75113E5A7DCED
    SHA-256:0C9A8CE9516EDB686FAF2BEE4BD9DC3285207031FE5F2F742ACCF4A525518D8E
    SHA-512:806DD530CE299B765554BB6AE827506D63B9D8A24294DF4E827CA8B808894C2B8845009239F80282F522177DE483D95099E74EF797E6F3B15A2B54F92DFFC03B
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:<Default Extension="jpg" ContentType="image/jpg"/>
    Process:C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):50
    Entropy (8bit):4.46146788019945
    Encrypted:false
    SSDEEP:3:wcek9LRAlxkAMvtEKb:wJcexJC
    MD5:A471D39C02EE8428702B468C843C62E3
    SHA1:91E6F53C4DCE4D7822F120DA20A75113E5A7DCED
    SHA-256:0C9A8CE9516EDB686FAF2BEE4BD9DC3285207031FE5F2F742ACCF4A525518D8E
    SHA-512:806DD530CE299B765554BB6AE827506D63B9D8A24294DF4E827CA8B808894C2B8845009239F80282F522177DE483D95099E74EF797E6F3B15A2B54F92DFFC03B
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:<Default Extension="jpg" ContentType="image/jpg"/>
    Process:C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):50
    Entropy (8bit):4.46146788019945
    Encrypted:false
    SSDEEP:3:wcek9LRAlxkAMvtEKb:wJcexJC
    MD5:A471D39C02EE8428702B468C843C62E3
    SHA1:91E6F53C4DCE4D7822F120DA20A75113E5A7DCED
    SHA-256:0C9A8CE9516EDB686FAF2BEE4BD9DC3285207031FE5F2F742ACCF4A525518D8E
    SHA-512:806DD530CE299B765554BB6AE827506D63B9D8A24294DF4E827CA8B808894C2B8845009239F80282F522177DE483D95099E74EF797E6F3B15A2B54F92DFFC03B
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:<Default Extension="jpg" ContentType="image/jpg"/>
    Process:C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    File Type:Microsoft Word 2007+
    Category:dropped
    Size (bytes):1972021
    Entropy (8bit):7.997709625401924
    Encrypted:true
    SSDEEP:49152:J6rtadz2C+4yzr0Yd06K/73dIyP1ccVxb+6gFGbnF+JwN0:J6rtasCby3Td0F/znP1ccVxS64hw2
    MD5:901ABC1F307449EFC6BF2A6CDDF72453
    SHA1:284074051D885C914CEF0FB69CFEE71C6AC68150
    SHA-256:D708DCBF527F7F78394A77AB8C53A88C0B1A1A2E97C65BDAE9191F21C41D9155
    SHA-512:7DEA8CCBA547C331C6A9000D48F3FBE2F2247C04017CEA2687547DC0B624C86F65C6110E0514CB9F3E0A7574E36A44B8DC575F89E0A55546B501DB8E4094E764
    Malicious:false
    Reputation:low
    Preview:PK..........!....4n...........[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j.0.E......J.(....e.h...4vD.BR^..Q..R...dc.f.w...d.U....5%......VHS..k..?.,Df.S.@I...d|{3.m...i.J...=Q...4..u`.RY.Y...c...@......`b.....^.bK....n7I@W${n..UI.N.&O...8Sw2i......9.$g..te.Y...........a...T9n..>.....M...Lc.][/..|..,N.t.U%9.|Rs.r..OV...h&.!...!n...ht..!F...`...a.....%...B...+.|.V.7D.{..wxv...)K.z......c..l.s....._.:....Az....o.{E.?.......PK..........!.........N......._rels/.rels ...(...................
    Process:C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.97061493873519
    Encrypted:false
    SSDEEP:3:blRmMdNcYcYAXNlim/D6n/JAbJx0:bzmMdNrcYQe/ec
    MD5:893420D5F1B5EC4C73F722822FB77193
    SHA1:ACC8EF696994DAF70513D8D03C2A2CF93F5A419D
    SHA-256:B7DB424C31CEE051925BEFBD6B8260D9F58561077516BC6AEE7C3171EF5A9D22
    SHA-512:63D83EE9900ADC2D8DDF99D3B8CA2E4EC4F59DEE5C595E90BF4507B8F909EEA77D437973D753D8D21DB55E65273F85B8EA1E70123CF95B7AB22E932EDCAC29E9
    Malicious:false
    Preview:.user..................................................M.a.o.g.a......ssx.....=..\....=..\...................................qV.>Bc..+P..$...(>.ABc..........6..e
    Process:C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    File Type:Microsoft Word 2007+
    Category:modified
    Size (bytes):1972021
    Entropy (8bit):7.997709625401924
    Encrypted:true
    SSDEEP:49152:J6rtadz2C+4yzr0Yd06K/73dIyP1ccVxb+6gFGbnF+JwN0:J6rtasCby3Td0F/znP1ccVxS64hw2
    MD5:901ABC1F307449EFC6BF2A6CDDF72453
    SHA1:284074051D885C914CEF0FB69CFEE71C6AC68150
    SHA-256:D708DCBF527F7F78394A77AB8C53A88C0B1A1A2E97C65BDAE9191F21C41D9155
    SHA-512:7DEA8CCBA547C331C6A9000D48F3FBE2F2247C04017CEA2687547DC0B624C86F65C6110E0514CB9F3E0A7574E36A44B8DC575F89E0A55546B501DB8E4094E764
    Malicious:false
    Preview:PK..........!....4n...........[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j.0.E......J.(....e.h...4vD.BR^..Q..R...dc.f.w...d.U....5%......VHS..k..?.,Df.S.@I...d|{3.m...i.J...=Q...4..u`.RY.Y...c...@......`b.....^.bK....n7I@W${n..UI.N.&O...8Sw2i......9.$g..te.Y...........a...T9n..>.....M...Lc.][/..|..,N.t.U%9.|Rs.r..OV...h&.!...!n...ht..!F...`...a.....%...B...+.|.V.7D.{..wxv...)K.z......c..l.s....._.:....Az....o.{E.?.......PK..........!.........N......._rels/.rels ...(...................
    Process:C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):26
    Entropy (8bit):3.95006375643621
    Encrypted:false
    SSDEEP:3:ggPYV:rPYV
    MD5:187F488E27DB4AF347237FE461A079AD
    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
    Malicious:false
    Preview:[ZoneTransfer]....ZoneId=0
    File type:Microsoft Word 2007+
    Entropy (8bit):7.999360600967597
    TrID:
    • Word Microsoft Office Open XML Format document (49504/1) 58.23%
    • Word Microsoft Office Open XML Format document (27504/1) 32.35%
    • ZIP compressed archive (8000/1) 9.41%
    File name:CY SEC AUDIT PLAN 2025.docx.doc
    File size:1'960'592 bytes
    MD5:0ffd99b46024863228e14efea8265ff2
    SHA1:274b3cdab333bce3309d7444b2cb82fd7c0b1926
    SHA256:896ddb35cde29b51ec5cf0da0197605d5fd754c1f9f45e97d40cd287fb5a2d25
    SHA512:819bace97bb8ce37ba1363c41de64cf8ef0a540fb6030e9e4e8ae33d37c4faef1aa259fd4f249db4fde88131f3182d676571a75439ef01ff93da987a3025268d
    SSDEEP:49152:esrY5SuN+iq8yNk7xwyLriiPilI19jCcFcTnSMhqNRZ:9rDiByiwy1cI19jCE2qPZ
    TLSH:7A9533F1890BEF739B5B553810E75758DE3A086B3C0536AA2F7039F25B1499E4B3229C
    File Content Preview:PK.........`)Z........N......._rels/.rels...j.0.@......Q....N/c......[IL...j...<...].aG.....zs.Fu..]...U......^.[..x.....1x.p.....f..#I)...Y.............*D....i")..c$...qU...~3..1..jH[{..=E......~.f?..3-.....].T...2.j).,.l0/%..b.......z......,..../.|f\.Z.
    Icon Hash:35e1cc889a8a8599
    Document Type:OpenXML
    Number of OLE Files:1
    Has Summary Info:
    Application Name:
    Encrypted Document:False
    Contains Word Document Stream:True
    Contains Workbook/Book Stream:False
    Contains PowerPoint Document Stream:False
    Contains Visio Document Stream:False
    Contains ObjectPool Stream:False
    Flash Objects Count:0
    Contains VBA Macros:False
    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
    2025-01-10T10:30:24.195859+01002055080ET MALWARE TA399/Sidewinder Activity Payload Request M3, Microsoft Word UA Request for .rtf1192.168.2.2449745151.236.12.150443TCP
    2025-01-10T10:30:25.384196+01001810004Joe Security ANOMALY Microsoft Office HTTP activity1192.168.2.2449746151.236.12.150443TCP
    2025-01-10T10:30:25.384196+01002033858ET MALWARE TA399/Sidewinder Activity Payload Request M2, Microsoft Office UA Request for .rtf 1192.168.2.2449746151.236.12.150443TCP
    2025-01-10T10:30:25.385343+01002055129ET MALWARE Possible TA399/SideWinder Related Empty .rtf Inbound1151.236.12.150443192.168.2.2449746TCP
    2025-01-10T10:30:28.193838+01002055080ET MALWARE TA399/Sidewinder Activity Payload Request M3, Microsoft Word UA Request for .rtf1192.168.2.2449751151.236.12.150443TCP
    2025-01-10T10:30:29.308344+01001810004Joe Security ANOMALY Microsoft Office HTTP activity1192.168.2.2449752151.236.12.150443TCP
    2025-01-10T10:30:29.308344+01002033858ET MALWARE TA399/Sidewinder Activity Payload Request M2, Microsoft Office UA Request for .rtf 1192.168.2.2449752151.236.12.150443TCP
    2025-01-10T10:30:29.309410+01002055129ET MALWARE Possible TA399/SideWinder Related Empty .rtf Inbound1151.236.12.150443192.168.2.2449752TCP
    2025-01-10T10:30:31.732689+01001810005Joe Security ANOMALY Microsoft Office WebDAV Discovery1192.168.2.2449755151.236.12.150443TCP
    2025-01-10T10:30:33.933417+01002055080ET MALWARE TA399/Sidewinder Activity Payload Request M3, Microsoft Word UA Request for .rtf1192.168.2.2449759151.236.12.150443TCP
    2025-01-10T10:30:35.064526+01001810004Joe Security ANOMALY Microsoft Office HTTP activity1192.168.2.2449763151.236.12.150443TCP
    2025-01-10T10:30:35.064526+01002033858ET MALWARE TA399/Sidewinder Activity Payload Request M2, Microsoft Office UA Request for .rtf 1192.168.2.2449763151.236.12.150443TCP
    2025-01-10T10:30:35.065073+01002055129ET MALWARE Possible TA399/SideWinder Related Empty .rtf Inbound1151.236.12.150443192.168.2.2449763TCP
    TimestampSource PortDest PortSource IPDest IP
    Jan 10, 2025 10:30:21.666868925 CET49744443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:21.666909933 CET44349744151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:21.666979074 CET49744443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:21.667339087 CET49744443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:21.667356968 CET44349744151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:22.365885019 CET44349744151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:22.366158962 CET49744443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:22.367985964 CET49744443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:22.368010044 CET44349744151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:22.368436098 CET44349744151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:22.369247913 CET49744443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:22.411328077 CET44349744151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:22.779932976 CET44349744151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:22.780877113 CET44349744151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:22.784327030 CET49744443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:22.848083973 CET49744443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:22.848121881 CET44349744151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:23.069072962 CET49745443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:23.069148064 CET44349745151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:23.069263935 CET49745443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:23.082281113 CET49745443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:23.082331896 CET44349745151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:23.770438910 CET44349745151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:23.771200895 CET49745443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:23.771262884 CET44349745151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:23.771761894 CET49745443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:23.771775961 CET44349745151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:24.195916891 CET44349745151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:24.196166992 CET49745443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:24.196167946 CET49745443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:24.196239948 CET44349745151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:24.196275949 CET44349745151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:24.196412086 CET44349745151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:24.238593102 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:24.238627911 CET44349746151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:24.238720894 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:24.240633965 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:24.240648985 CET44349746151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:24.931410074 CET44349746151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:24.931540012 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:24.933450937 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:24.933460951 CET44349746151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:24.934909105 CET44349746151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:24.934997082 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:24.938827991 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:24.938913107 CET44349746151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:24.938973904 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:24.938980103 CET44349746151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:24.939172029 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:24.941584110 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:24.983344078 CET44349746151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:25.384264946 CET44349746151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:25.384924889 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:25.384943008 CET44349746151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:25.385057926 CET44349746151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:25.385188103 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:25.409761906 CET49746443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:25.409786940 CET44349746151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:25.730799913 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:25.730844975 CET44349748151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:25.730923891 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:25.735236883 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:25.735259056 CET44349748151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:25.939218998 CET49749443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:25.939335108 CET44349749151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:25.939429045 CET49749443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:25.940104961 CET49749443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:25.940140963 CET44349749151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:26.423063040 CET44349748151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:26.423134089 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:26.424751997 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:26.424781084 CET44349748151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:26.425318003 CET44349748151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:26.425384998 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:26.426228046 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:26.426331043 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:26.426333904 CET44349748151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:26.426388979 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:26.467330933 CET44349748151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:26.629945993 CET44349749151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:26.630796909 CET49749443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:26.630860090 CET44349749151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:26.631309986 CET49749443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:26.631324053 CET44349749151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:26.847172022 CET44349748151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:26.847243071 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:26.847292900 CET44349748151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:26.847342968 CET44349748151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:26.847352982 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:26.847387075 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:26.847387075 CET49748443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:26.847404003 CET44349748151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:27.048024893 CET44349749151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:27.048121929 CET44349749151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:27.049232960 CET49749443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:27.049371004 CET49749443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:27.052697897 CET49751443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:27.052731037 CET44349751151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:27.053046942 CET49751443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:27.053046942 CET49751443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:27.053081036 CET44349751151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:27.774308920 CET44349751151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:27.774924994 CET49751443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:27.774960041 CET44349751151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:27.777381897 CET49751443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:27.777390957 CET44349751151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:28.193914890 CET44349751151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:28.194103003 CET49751443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:28.194132090 CET44349751151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:28.194149017 CET49751443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:28.194160938 CET44349751151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:28.194170952 CET44349751151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:28.194281101 CET49751443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:28.202296972 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:28.202330112 CET44349752151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:28.202399015 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:28.203608036 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:28.203623056 CET44349752151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:28.886686087 CET44349752151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:28.886790991 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:28.889142036 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:28.889148951 CET44349752151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:28.890306950 CET44349752151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:28.890357018 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:28.891379118 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:28.891458035 CET44349752151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:28.891505957 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:28.891578913 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:28.935322046 CET44349752151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:29.308362961 CET44349752151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:29.308499098 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:29.308516026 CET44349752151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:29.308775902 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:29.309005022 CET44349752151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:29.309154034 CET44349752151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:29.309180975 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:29.309307098 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:29.309977055 CET49752443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:29.309989929 CET44349752151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:29.427028894 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:29.427076101 CET44349753151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:29.427350998 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:29.429765940 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:29.429780960 CET44349753151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:29.461759090 CET49754443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:29.461793900 CET44349754151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:29.465955019 CET49754443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:29.466161966 CET49754443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:29.466176033 CET44349754151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.101049900 CET44349753151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.101126909 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.102910995 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.102930069 CET44349753151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.103440046 CET44349753151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.103491068 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.104469061 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.104562998 CET44349753151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.104574919 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.104600906 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.135483027 CET44349754151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.136094093 CET49754443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.136111975 CET44349754151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.136807919 CET49754443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.136812925 CET44349754151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.147341967 CET44349753151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.520946026 CET44349753151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.521014929 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.521047115 CET44349753151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.521074057 CET44349753151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.521126986 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.521183968 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.521208048 CET44349753151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.521228075 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.521255970 CET49753443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.547220945 CET44349754151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.547486067 CET44349754151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.547539949 CET49754443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.547874928 CET49754443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.547888041 CET44349754151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.549909115 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.549951077 CET44349755151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:30.550015926 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.551074982 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:30.551091909 CET44349755151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:31.316981077 CET44349755151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:31.317255020 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.318829060 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.318847895 CET44349755151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:31.319355965 CET44349755151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:31.319907904 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.320442915 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.320442915 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.320540905 CET44349755151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:31.321162939 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.732841015 CET44349755151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:31.732942104 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.732959032 CET44349755151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:31.733014107 CET44349755151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:31.734204054 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.734205008 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.734205008 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.734235048 CET44349755151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:31.735975981 CET49755443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.738380909 CET49757443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.738461971 CET44349757151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:31.738718033 CET49757443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.738944054 CET49757443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.738979101 CET44349757151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:31.741358042 CET49758443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.741381884 CET44349758151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:31.741720915 CET49758443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.741720915 CET49758443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:31.741753101 CET44349758151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.424144983 CET44349758151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.424928904 CET49758443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.424953938 CET44349758151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.425673008 CET49758443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.425678015 CET44349758151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.500622988 CET44349757151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.501246929 CET49757443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.501279116 CET44349757151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.501768112 CET49757443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.501780033 CET44349757151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.839910984 CET44349758151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.840467930 CET49758443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.843704939 CET49759443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.843748093 CET44349759151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.843811989 CET49759443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.843986988 CET49759443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.844000101 CET44349759151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.911952019 CET44349757151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.912044048 CET44349757151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.912091017 CET49757443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.912203074 CET49757443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.913419962 CET49761443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.913455009 CET44349761151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:32.913513899 CET49761443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.913697004 CET49761443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:32.913710117 CET44349761151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.513047934 CET44349759151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.514516115 CET49759443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.514516115 CET49759443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.514537096 CET44349759151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.514549017 CET44349759151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.581307888 CET44349761151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.582495928 CET49761443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.582496881 CET49761443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.582557917 CET44349761151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.582601070 CET44349761151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.933459997 CET44349759151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.933554888 CET44349759151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.934030056 CET49759443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.934091091 CET49759443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.934091091 CET49759443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.934113026 CET44349759151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.934123993 CET44349759151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.939358950 CET49763443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.939419031 CET44349763151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.939799070 CET49763443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.941973925 CET49763443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.941994905 CET44349763151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.991823912 CET44349761151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.992018938 CET49761443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.992018938 CET49761443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.992063046 CET44349761151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.992271900 CET44349761151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.992316961 CET44349761151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.996896029 CET49761443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.997796059 CET49764443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.997859001 CET44349764151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:33.997925997 CET49764443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.998326063 CET49764443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:33.998339891 CET44349764151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:34.632709980 CET44349763151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:34.632796049 CET49763443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:34.634708881 CET49763443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:34.634721041 CET44349763151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:34.635955095 CET44349763151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:34.636012077 CET49763443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:34.637113094 CET49763443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:34.637296915 CET49763443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:34.637342930 CET44349763151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:34.637398958 CET49763443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:34.682418108 CET44349764151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:34.682486057 CET49764443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:34.684576988 CET49764443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:34.684597969 CET44349764151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:34.685266972 CET44349764151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:34.685930967 CET49764443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:34.727338076 CET44349764151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.064626932 CET44349763151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.064801931 CET44349763151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.065383911 CET49763443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:35.066206932 CET49763443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:35.066251040 CET44349763151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.100295067 CET44349764151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.100482941 CET44349764151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.101807117 CET49764443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:35.106117010 CET49764443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:35.106151104 CET44349764151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.235655069 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:35.235713005 CET44349767151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.236201048 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:35.237567902 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:35.237595081 CET44349767151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.921225071 CET44349767151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.921382904 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:35.922854900 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:35.922882080 CET44349767151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.924154997 CET44349767151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.924455881 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:35.925390005 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:35.925390005 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:35.925595999 CET44349767151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:35.925719976 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:36.339179993 CET44349767151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:36.339257002 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:36.339339018 CET44349767151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:36.339387894 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:36.339412928 CET44349767151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:36.339416027 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:36.339442968 CET44349767151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:36.339462042 CET49767443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:38.122420073 CET49769443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:38.122468948 CET44349769151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:38.122558117 CET49769443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:38.123431921 CET49769443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:38.123449087 CET44349769151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:38.800837040 CET44349769151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:38.800901890 CET49769443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:38.802577972 CET49769443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:38.802592039 CET44349769151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:38.803837061 CET44349769151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:38.803880930 CET49769443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:38.804969072 CET49769443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:38.805052996 CET49769443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:38.805167913 CET44349769151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:38.805211067 CET49769443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:39.230469942 CET44349769151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:39.230650902 CET44349769151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:39.230772972 CET49769443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:39.232016087 CET49769443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:39.232016087 CET49769443192.168.2.24151.236.12.150
    Jan 10, 2025 10:30:39.232031107 CET44349769151.236.12.150192.168.2.24
    Jan 10, 2025 10:30:39.232083082 CET49769443192.168.2.24151.236.12.150
    TimestampSource PortDest PortSource IPDest IP
    Jan 10, 2025 10:30:21.655164003 CET6243153192.168.2.241.1.1.1
    Jan 10, 2025 10:30:21.666141033 CET53624311.1.1.1192.168.2.24
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jan 10, 2025 10:30:21.655164003 CET192.168.2.241.1.1.10x7969Standard query (0)paknavy.modpak.liveA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jan 10, 2025 10:30:21.666141033 CET1.1.1.1192.168.2.240x7969No error (0)paknavy.modpak.live151.236.12.150A (IP address)IN (0x0001)false
    • paknavy.modpak.live
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.2449744151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:22 UTC347OUTOPTIONS /70137347_audit/ HTTP/1.1
    Connection: Keep-Alive
    Authorization: Bearer
    User-Agent: Microsoft Office Word 2014
    X-Office-Major-Version: 16
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    Accept-Auth: badger,Wlid1.1,Bearer,Basic,NTLM,Digest,Kerberos,Negotiate,Nego2
    X-MSGETWEBURL: t
    X-IDCRL_ACCEPTED: t
    Host: paknavy.modpak.live
    2025-01-10 09:30:22 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:22 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *
    2025-01-10 09:30:22 UTC196INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 34 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
    Data Ascii: <html><head><title>405 Method Not Allowed</title></head><body bgcolor="white"><center><h1>405 Method Not Allowed</h1></center><hr><center>nginx/1.14.0 (Ubuntu)</center></body></html>


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.2449745151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:23 UTC337OUTHEAD /70137347_audit/Profile.rtf HTTP/1.1
    Connection: Keep-Alive
    Authorization: Bearer
    User-Agent: Microsoft Office Word 2014
    X-Office-Major-Version: 16
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    Accept-Auth: badger,Wlid1.1,Bearer,Basic,NTLM,Digest,Kerberos,Negotiate,Nego2
    X-IDCRL_ACCEPTED: t
    Host: paknavy.modpak.live
    2025-01-10 09:30:24 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:24 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    2192.168.2.2449746151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:24 UTC217OUTGET /70137347_audit/Profile.rtf HTTP/1.1
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    Host: paknavy.modpak.live
    Connection: Keep-Alive
    2025-01-10 09:30:25 UTC205INHTTP/1.1 200 OK
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:25 GMT
    Content-Type: application/rtf
    Content-Length: 8
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *
    2025-01-10 09:30:25 UTC8INData Raw: 7b 5c 72 74 66 31 20 7d
    Data Ascii: {\rtf1 }


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    3192.168.2.2449748151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:26 UTC240OUTHEAD /70137347_audit/Profile.rtf HTTP/1.1
    Authorization: Bearer
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    X-IDCRL_ACCEPTED: t
    User-Agent: Microsoft Office Existence Discovery
    Host: paknavy.modpak.live
    Connection: Keep-Alive
    2025-01-10 09:30:26 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:26 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    4192.168.2.2449749151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:26 UTC347OUTOPTIONS /70137347_audit/ HTTP/1.1
    Connection: Keep-Alive
    Authorization: Bearer
    User-Agent: Microsoft Office Word 2014
    X-Office-Major-Version: 16
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    Accept-Auth: badger,Wlid1.1,Bearer,Basic,NTLM,Digest,Kerberos,Negotiate,Nego2
    X-MSGETWEBURL: t
    X-IDCRL_ACCEPTED: t
    Host: paknavy.modpak.live
    2025-01-10 09:30:27 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:26 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *
    2025-01-10 09:30:27 UTC196INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 34 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
    Data Ascii: <html><head><title>405 Method Not Allowed</title></head><body bgcolor="white"><center><h1>405 Method Not Allowed</h1></center><hr><center>nginx/1.14.0 (Ubuntu)</center></body></html>


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    5192.168.2.2449751151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:27 UTC337OUTHEAD /70137347_audit/Profile.rtf HTTP/1.1
    Connection: Keep-Alive
    Authorization: Bearer
    User-Agent: Microsoft Office Word 2014
    X-Office-Major-Version: 16
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    Accept-Auth: badger,Wlid1.1,Bearer,Basic,NTLM,Digest,Kerberos,Negotiate,Nego2
    X-IDCRL_ACCEPTED: t
    Host: paknavy.modpak.live
    2025-01-10 09:30:28 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:28 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    6192.168.2.2449752151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:28 UTC217OUTGET /70137347_audit/Profile.rtf HTTP/1.1
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    Host: paknavy.modpak.live
    Connection: Keep-Alive
    2025-01-10 09:30:29 UTC205INHTTP/1.1 200 OK
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:29 GMT
    Content-Type: application/rtf
    Content-Length: 8
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *
    2025-01-10 09:30:29 UTC8INData Raw: 7b 5c 72 74 66 31 20 7d
    Data Ascii: {\rtf1 }


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    7192.168.2.2449753151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:30 UTC240OUTHEAD /70137347_audit/Profile.rtf HTTP/1.1
    Authorization: Bearer
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    X-IDCRL_ACCEPTED: t
    User-Agent: Microsoft Office Existence Discovery
    Host: paknavy.modpak.live
    Connection: Keep-Alive
    2025-01-10 09:30:30 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:30 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    8192.168.2.2449754151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:30 UTC347OUTOPTIONS /70137347_audit/ HTTP/1.1
    Connection: Keep-Alive
    Authorization: Bearer
    User-Agent: Microsoft Office Word 2014
    X-Office-Major-Version: 16
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    Accept-Auth: badger,Wlid1.1,Bearer,Basic,NTLM,Digest,Kerberos,Negotiate,Nego2
    X-MSGETWEBURL: t
    X-IDCRL_ACCEPTED: t
    Host: paknavy.modpak.live
    2025-01-10 09:30:30 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:30 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *
    2025-01-10 09:30:30 UTC196INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 34 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
    Data Ascii: <html><head><title>405 Method Not Allowed</title></head><body bgcolor="white"><center><h1>405 Method Not Allowed</h1></center><hr><center>nginx/1.14.0 (Ubuntu)</center></body></html>


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    9192.168.2.2449755151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:31 UTC250OUTOPTIONS /70137347_audit/ HTTP/1.1
    Authorization: Bearer
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    X-IDCRL_ACCEPTED: t
    User-Agent: Microsoft Office Protocol Discovery
    Host: paknavy.modpak.live
    Content-Length: 0
    Connection: Keep-Alive
    2025-01-10 09:30:31 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:31 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *
    2025-01-10 09:30:31 UTC196INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 34 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
    Data Ascii: <html><head><title>405 Method Not Allowed</title></head><body bgcolor="white"><center><h1>405 Method Not Allowed</h1></center><hr><center>nginx/1.14.0 (Ubuntu)</center></body></html>


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    10192.168.2.2449758151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:32 UTC347OUTOPTIONS /70137347_audit/ HTTP/1.1
    Connection: Keep-Alive
    Authorization: Bearer
    User-Agent: Microsoft Office Word 2014
    X-Office-Major-Version: 16
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    Accept-Auth: badger,Wlid1.1,Bearer,Basic,NTLM,Digest,Kerberos,Negotiate,Nego2
    X-MSGETWEBURL: t
    X-IDCRL_ACCEPTED: t
    Host: paknavy.modpak.live
    2025-01-10 09:30:32 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:32 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *
    2025-01-10 09:30:32 UTC196INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 34 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
    Data Ascii: <html><head><title>405 Method Not Allowed</title></head><body bgcolor="white"><center><h1>405 Method Not Allowed</h1></center><hr><center>nginx/1.14.0 (Ubuntu)</center></body></html>


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    11192.168.2.2449757151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:32 UTC399OUTOPTIONS /70137347_audit/ HTTP/1.1
    Connection: Keep-Alive
    Authorization: Bearer
    User-Agent: Microsoft Office Word 2014
    X-Office-Major-Version: 16
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    Accept-Auth: badger,Wlid1.1,Bearer,Basic,NTLM,Digest,Kerberos,Negotiate,Nego2
    X-IDCRL_ACCEPTED: t
    X-IDCRL_OPTIONS: force-auth-challenge
    IgnoreCookieAuthentication: t
    Host: paknavy.modpak.live
    2025-01-10 09:30:32 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:32 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *
    2025-01-10 09:30:32 UTC196INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 34 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
    Data Ascii: <html><head><title>405 Method Not Allowed</title></head><body bgcolor="white"><center><h1>405 Method Not Allowed</h1></center><hr><center>nginx/1.14.0 (Ubuntu)</center></body></html>


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    12192.168.2.2449759151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:33 UTC337OUTHEAD /70137347_audit/Profile.rtf HTTP/1.1
    Connection: Keep-Alive
    Authorization: Bearer
    User-Agent: Microsoft Office Word 2014
    X-Office-Major-Version: 16
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    Accept-Auth: badger,Wlid1.1,Bearer,Basic,NTLM,Digest,Kerberos,Negotiate,Nego2
    X-IDCRL_ACCEPTED: t
    Host: paknavy.modpak.live
    2025-01-10 09:30:33 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:33 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    13192.168.2.2449761151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:33 UTC125OUTHEAD /70137347_audit/ HTTP/1.1
    Connection: Keep-Alive
    User-Agent: Microsoft Office Word 2014
    Host: paknavy.modpak.live
    2025-01-10 09:30:33 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:33 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    14192.168.2.2449763151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:34 UTC217OUTGET /70137347_audit/Profile.rtf HTTP/1.1
    Accept: */*
    User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    Host: paknavy.modpak.live
    Connection: Keep-Alive
    2025-01-10 09:30:35 UTC205INHTTP/1.1 200 OK
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:34 GMT
    Content-Type: application/rtf
    Content-Length: 8
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *
    2025-01-10 09:30:35 UTC8INData Raw: 7b 5c 72 74 66 31 20 7d
    Data Ascii: {\rtf1 }


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    15192.168.2.2449764151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:34 UTC342OUTOPTIONS /70137347_audit/ HTTP/1.1
    Connection: Keep-Alive
    Authorization: Bearer
    User-Agent: Microsoft Office Word
    X-Office-Major-Version: 16
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    Accept-Auth: badger,Wlid1.1,Bearer,Basic,NTLM,Digest,Kerberos,Negotiate,Nego2
    X-MSGETWEBURL: t
    X-IDCRL_ACCEPTED: t
    Host: paknavy.modpak.live
    2025-01-10 09:30:35 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:34 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *
    2025-01-10 09:30:35 UTC196INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 34 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
    Data Ascii: <html><head><title>405 Method Not Allowed</title></head><body bgcolor="white"><center><h1>405 Method Not Allowed</h1></center><hr><center>nginx/1.14.0 (Ubuntu)</center></body></html>


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    16192.168.2.2449767151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:35 UTC240OUTHEAD /70137347_audit/Profile.rtf HTTP/1.1
    Authorization: Bearer
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    X-IDCRL_ACCEPTED: t
    User-Agent: Microsoft Office Existence Discovery
    Host: paknavy.modpak.live
    Connection: Keep-Alive
    2025-01-10 09:30:36 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:36 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    17192.168.2.2449769151.236.12.1504437628C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    TimestampBytes transferredDirectionData
    2025-01-10 09:30:38 UTC240OUTHEAD /70137347_audit/Profile.rtf HTTP/1.1
    Authorization: Bearer
    X-MS-CookieUri-Requested: t
    X-FeatureVersion: 1
    X-IDCRL_ACCEPTED: t
    User-Agent: Microsoft Office Existence Discovery
    Host: paknavy.modpak.live
    Connection: Keep-Alive
    2025-01-10 09:30:39 UTC232INHTTP/1.1 405 Method Not Allowed
    Server: nginx
    Date: Fri, 10 Jan 2025 09:30:39 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 196
    Connection: close
    X-Robots-Tag: noindex, nofollow
    Access-Control-Allow-Origin: *


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:1
    Start time:04:30:11
    Start date:10/01/2025
    Path:C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
    Imagebase:0x7ff600c80000
    File size:1'637'952 bytes
    MD5 hash:A9F0EC89897AC6C878D217DFB64CA752
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:false

    Target ID:3
    Start time:04:30:16
    Start date:10/01/2025
    Path:C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT
    Imagebase:0x7ff79baf0000
    File size:485'544 bytes
    MD5 hash:036423B15211CC7D2E83A271709049F6
    Has elevated privileges:true
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:9
    Start time:04:30:25
    Start date:10/01/2025
    Path:C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT
    Imagebase:0x7ff79baf0000
    File size:485'544 bytes
    MD5 hash:036423B15211CC7D2E83A271709049F6
    Has elevated privileges:true
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:11
    Start time:04:30:34
    Start date:10/01/2025
    Path:C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\FLTLDR.EXE" C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT
    Imagebase:0x7ff79baf0000
    File size:485'544 bytes
    MD5 hash:036423B15211CC7D2E83A271709049F6
    Has elevated privileges:true
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    No disassembly