Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FW EXTERNAL Check Approval.msg

Overview

General Information

Sample name:FW EXTERNAL Check Approval.msg
Analysis ID:1438587
MD5:2404b6f740334e48899b59783285106e
SHA1:f759a8f89d6d5feeb8e8f1587a31437582b6708e
SHA256:0250eb1de58e9c5baf2319df43c4f156c462c7f83309929af349d0dcb623efa8
Infos:

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

LLM detected suspicious URL
Creates a window with clipboard capturing capabilities
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Stores files to the Windows start menu directory

Classification

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis
  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6492 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\FW EXTERNAL Check Approval.msg" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 6268 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "6DE79C5E-3DE5-4591-948E-219D95B7F91D" "9E663AD4-92CB-4F5B-B9DD-2F77DD91C7BC" "6492" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 6892 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2F MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 3704 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1996,i,3405720180451191570,18100183712643827559,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7912 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2F MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7052 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1996,i,1548859053847161888,10154591588167090725,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6492, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hLLM: Score: 8 Reasons: The URL provided exhibits characteristics commonly associated with typosquatting, which is a type of cyber attack where a malicious domain is created to resemble a legitimate one, often by misspelling or using a similar domain name. The reasons for this risk assessment are as follows: 1. Length of the URL: The URL is excessively long, which can be an attempt to obfuscate the true domain name. 2. Lack of human-readable components: The URL does not contain any easily recognizable words or phrases, making it difficult for users to identify the actual domain. 3. Use of special characters: The URL contains a large number of special characters, which can be used to create a domain that resembles a legitimate one. 4. Hyphens in the domain name: The URL contains multiple hyphens in the domain name, which is a common tactic used in typosquatting attacks. 5. Lack of a clear brand name: The URL does not contain any clear brand name, making it difficult to determine the true owner of the domain. Given these factors, it is recommended to exercise caution when accessing this URL. It is possible that it is a typosquatted domain, which could be used for phishing, malware distribution, or other malicious activities. DOM: 2.3.pages.csv
Source: https://pdf-image.org/HTTP Parser: No favicon
Source: https://pdf-image.org/HTTP Parser: No favicon
Source: https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2Fhttps://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2FHTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.16:49733 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 0MB later: 26MB
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 199.232.214.172
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 20.150.100.65
Source: unknownTCP traffic detected without corresponding DNS query: 20.150.100.65
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: secure-web.cisco.com
Source: global trafficDNS traffic detected: DNS query: pdf-image.org
Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49688 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.16:49733 version: TLS 1.2
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow created: window name: CLIPBRDWNDCLASS
Source: classification engineClassification label: sus22.phis.winMSG@30/26@14/157
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20240508T2138360153-6492.etl
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\FW EXTERNAL Check Approval.msg"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "6DE79C5E-3DE5-4591-948E-219D95B7F91D" "9E663AD4-92CB-4F5B-B9DD-2F77DD91C7BC" "6492" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2F
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1996,i,3405720180451191570,18100183712643827559,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "6DE79C5E-3DE5-4591-948E-219D95B7F91D" "9E663AD4-92CB-4F5B-B9DD-2F77DD91C7BC" "6492" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2F
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1996,i,3405720180451191570,18100183712643827559,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2F
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1996,i,1548859053847161888,10154591588167090725,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2F
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1996,i,1548859053847161888,10154591588167090725,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote Services1
Clipboard Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Process Injection
LSASS Memory13
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Extra Window Memory Injection
1
Extra Window Memory Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
about:blank0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
pdf-image.org
172.67.197.74
truefalse
    unknown
    a.nel.cloudflare.com
    35.190.80.1
    truefalse
      high
      www.google.com
      142.251.215.228
      truefalse
        high
        secure-web.cisco.com
        unknown
        unknownfalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2Fhttps://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2Ffalse
            high
            about:blankfalse
            • Avira URL Cloud: safe
            low
            https://pdf-image.org/false
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              52.113.194.132
              unknownUnited States
              8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
              172.67.197.74
              pdf-image.orgUnited States
              13335CLOUDFLARENETUSfalse
              1.1.1.1
              unknownAustralia
              13335CLOUDFLARENETUSfalse
              142.250.217.67
              unknownUnited States
              15169GOOGLEUSfalse
              74.125.142.84
              unknownUnited States
              15169GOOGLEUSfalse
              142.251.33.67
              unknownUnited States
              15169GOOGLEUSfalse
              52.182.143.211
              unknownUnited States
              8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
              104.21.44.75
              unknownUnited States
              13335CLOUDFLARENETUSfalse
              146.112.255.69
              unknownAustria
              36692OPENDNSUSfalse
              142.250.217.110
              unknownUnited States
              15169GOOGLEUSfalse
              142.251.215.228
              www.google.comUnited States
              15169GOOGLEUSfalse
              142.251.215.238
              unknownUnited States
              15169GOOGLEUSfalse
              239.255.255.250
              unknownReserved
              unknownunknownfalse
              52.111.246.10
              unknownUnited States
              8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
              52.109.28.46
              unknownUnited States
              8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
              35.190.80.1
              a.nel.cloudflare.comUnited States
              15169GOOGLEUSfalse
              IP
              192.168.2.17
              192.168.2.16
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1438587
              Start date and time:2024-05-08 21:38:02 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsinteractivecookbook.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:17
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • EGA enabled
              Analysis Mode:stream
              Analysis stop reason:Timeout
              Sample name:FW EXTERNAL Check Approval.msg
              Detection:SUS
              Classification:sus22.phis.winMSG@30/26@14/157
              Cookbook Comments:
              • Found application associated with file extension: .msg
              • Exclude process from analysis (whitelisted): dllhost.exe
              • Excluded IPs from analysis (whitelisted): 52.109.28.46, 52.113.194.132, 52.111.246.10, 52.111.246.17, 52.111.246.11, 52.111.246.16, 52.182.143.211
              • Excluded domains from analysis (whitelisted): ecs.office.com, fs.microsoft.com, slscr.update.microsoft.com, prod.configsvc1.live.com.akadns.net, prod-na.naturallanguageeditorservice.osi.office.net.akadns.net, s-0005-office.config.skype.com, mobile.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, ecs-office.s-0005.s-msedge.net, prod1.naturallanguageeditorservice.osi.office.net.akadns.net, nleditor.osi.office.net, s-0005.s-msedge.net, config.officeapps.live.com, prod-wus2-resolver.naturallanguageeditorservice.osi.office.net.akadns.net, officeclient.microsoft.com, ecs.office.trafficmanager.net, europe.configsvc1.live.com.akadns.net, mobile.events.data.trafficmanager.net, onedscolprdcus13.centralus.cloudapp.azure.com, uks-azsc-config.officeapps.live.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: FW EXTERNAL Check Approval.msg
              InputOutput
              URL: about:blank
              {
              "riskscore": 1,
              "reasons": "The text extracted from the web page indicates a 404 error, which is a standard HTTP error message and is not malicious in nature. The URL 'about:blank' is also a blank page and is not associated with any known phishing sites. The risk score is therefore set to 1, indicating a low risk."
              }"
              Not Found The requested URL was not found on this server. Additionally: a 404 Not Found error was encountered while trying to use an ErrorDument to handle the request. 
              URL: https://pdf-image.org/
              {
              "riskscore": 5,
              "reasons": "The URL 'https://pdf-image.org/' has a moderate risk of typosquatting. The domain name contains a common misspelling of 'pdf' as 'pdg', and adds the word 'image' which could be confusing to users looking for a legitimate PDF conversion or viewing service. Additionally, the domain extension is a generic top-level domain (gTLD) which is more susceptible to typosquatting than country code top-level domains (ccTLDs). However, there is no evidence of malicious intent on this particular site, such as phishing or malware distribution."
              }"
              https://pdf-image.org/
              URL: https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_h
              {
              "riskscore": 8,
              "reasons": "The URL provided exhibits characteristics commonly associated with typosquatting, which is a type of cyber attack where a malicious domain is created to resemble a legitimate one, often by misspelling or using a similar domain name. The reasons for this risk assessment are as follows:\
              1. Length of the URL: The URL is excessively long, which can be an attempt to obfuscate the true domain name.\
              2. Lack of human-readable components: The URL does not contain any easily recognizable words or phrases, making it difficult for users to identify the actual domain.\
              3. Use of special characters: The URL contains a large number of special characters, which can be used to create a domain that resembles a legitimate one.\
              4. Hyphens in the domain name: The URL contains multiple hyphens in the domain name, which is a common tactic used in typosquatting attacks.\
              5. Lack of a clear brand name: The URL does not contain any clear brand name, making it difficult to determine the true owner of the domain.\
              Given these factors, it is recommended to exercise caution when accessing this URL. It is possible that it is a typosquatted domain, which could be used for phishing, malware distribution, or other malicious activities."
              }"
              https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_h
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:data
              Category:modified
              Size (bytes):231348
              Entropy (8bit):4.392150499244186
              Encrypted:false
              SSDEEP:
              MD5:BB71FD620BED0DAA1484E5FD11E81F49
              SHA1:1FF26FF7B56137FD8DAAD1A9A7925141DAA8B169
              SHA-256:F42932F737602E9CD64D850C6C2DC97E74107F09CCA59DB9E13B7D1B4AFB480C
              SHA-512:FB5C26A0328D60005CF4FCB325E809FEF8C4275DEA9B37FE5746ECC5F58D58D350E72A25229B7614A64291FA3BB0994CFF4612CB084DBE30DEB1E8DF3306E8B0
              Malicious:false
              Reputation:unknown
              Preview:TH02...... ....H........SM01X...,... ..H............IPM.Activity...........h...............h............H..hl.Y............h............H..h\cal ...pDat...hX...0....Y....hV.%k...........h........_`yj...h*.%k@...I.lw...h....H...8.~j...0....T...............d.........2h...............k..............!h.............. h.V.'.....Y...#h....8.........$h........8....."h..............'h..............1hV.%k<.........0h....4....~j../h....h.....~jH..hX...p...l.Y...-h .........Y...+h.%k....`.Y................. ..............F7..............FIPM.Activity....Form....Standard....Journal Entry...IPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000....Microsoft...This form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):166208
              Entropy (8bit):5.340952002917708
              Encrypted:false
              SSDEEP:
              MD5:3769FA6A3C68D5F6E6630710E903CDCB
              SHA1:7E3A646410DD4D41AF4A1775D0697F53317F90D0
              SHA-256:73B41F25029B96A3996F4FA6C012C1144FE3D22E08FAC9C576308287B38FC0CD
              SHA-512:2DD3B0DF94C6CBEE8EA89076E760C4374E7B0ADE76180DE93C36D01C7D25587DFBCA0D1DB2235A9B4655185521738B7F039CDE98DBF9E9C7AF2C82B46A1AE40B
              Malicious:false
              Reputation:unknown
              Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2024-05-08T19:38:39">.. Build: 16.0.17629.40127-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://word-edit.officeapps.live.com/we/rrdiscovery.ashx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[MAX.ResourceId]" o:authorityUrl="[ADALAuth
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:data
              Category:dropped
              Size (bytes):32768
              Entropy (8bit):0.04587332210802959
              Encrypted:false
              SSDEEP:
              MD5:B4220672CFEC6141013908FDDEEC0F1B
              SHA1:B9CA97A3836675A96788A5B15F9FDD000292C72E
              SHA-256:BBB8DAA62C08C140B942AC1D9421A8C9FD57DA77618698F48578FACDFB285303
              SHA-512:08362BD4743021E4911DA70EFAE8C8937C5A382AB714D623292956AEF30A59E186FE71B3564FA54FDAA5859F469A1FD2CA21D4376C49B12BE6C4FA059B19AA8B
              Malicious:false
              Reputation:unknown
              Preview:..-.........................q6|.0+....4..0......-.........................q6|.0+....4..0............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:SQLite Write-Ahead Log, version 3007000
              Category:dropped
              Size (bytes):49472
              Entropy (8bit):0.4832731912155007
              Encrypted:false
              SSDEEP:
              MD5:E9171D5E52E36CB4300875D412A4748F
              SHA1:2F9578DE279F5EF55CB7F201AF8D1F24BB66BFCC
              SHA-256:BB5243F8E629A3C82F802BD9E34D95B4E387EE07B34AA62DE15D8839CBBBA090
              SHA-512:5FE1C1F67CDC347A9F95835AD6DF2034D850FB8405CB53E2041DB54966CEBDA9C494BE555F3A519455CF531CA9E4002C62FDF03A9A5F817B85BCB8642EFCDAC0
              Malicious:false
              Reputation:unknown
              Preview:7....-..........0+.......CS...........0+.....D2e!-.)SQLite format 3......@ .......................................................................... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:PNG image data, 265 x 52, 8-bit/color RGBA, non-interlaced
              Category:dropped
              Size (bytes):2785
              Entropy (8bit):7.870285896393713
              Encrypted:false
              SSDEEP:
              MD5:2CA36B299B426D9E3A725B1F6FA3C208
              SHA1:4084533929AAF4C7CD029C1650AC146252165AC3
              SHA-256:A539AC1E529EE352397B7183E74495CCF3D28089DB7DC95776CF646B957F6D2D
              SHA-512:50D027E98B322DB3DAE5F97CD12B75F1C8EB76BF22EBF636B74231A527444A1D741E147B03A497CFF1A373EA17907179A2295D4C701535C520246151CE16605E
              Malicious:false
              Reputation:unknown
              Preview:.PNG........IHDR.......4............IDATx....Y....._......yQaD..D..e..}_.FG-{DQ..m..I.m.@.Q.V.A-.[.......oFDeUe.Y.......~qb...)Z ....5.L...(.......I|..5.{......7o..'0........... ..(~..9....z................r.h..,.AD.....E......#. .."....q .}.....A.<..........9..ItwM....M..I4A...@ ...I8.1....&..$. ..@ .p..$......@..A.M..D ..8.A..F...@... .&Hb".....1C...]J.'Nl|....)S..W.^5...Gn+E.U_.pa.i..*....I.&U..4lA@~.A>...S.s..JU.........|.4..>|.%.[.K...5..e:C..k.}l.n...{...`....W.4...x.M..(...........>.1v.h.?|...l5'..9..3..~.Yi........T.....#.F..i...B...;.vl.g.g..N.>m.~p.....g_...*kn+9..|.....{..Am.:.u..(.......IpE.''#.g=.$...m!......5t...N....:..dZ|...n\F...u..w_...".<...={.(L]j{.+....G,tU.....eG/...y|..9.*....r.U...&..O....}.m..'GN.'O.l`&92._kA>..?...p.^..|..u5....S.|,.m#..v..x..Y..+.x.b .Z9...*....C.........V:.#..-/.......W..pd.m.)......7o.,..o...E...b..x..{'.......5?...r..z.......X....s,....5A..)....;..yzb.O.f.ss.N..*I..D...g.D..^.U......m...,
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:data
              Category:dropped
              Size (bytes):22676
              Entropy (8bit):3.4846045856487353
              Encrypted:false
              SSDEEP:
              MD5:C9A0F1A895A79C369DCAADBD5B0A3361
              SHA1:2D07C63463C4A46A6130D98D877F0B5D8837B51A
              SHA-256:7A41F5E37063A0BCDAE29D585B1FF7BE87AF584B52B7D8BBF438EF862DDC3AB4
              SHA-512:116DC580F61D63E6A9BC7864D3E48B7DE54C6B9DC3F9E575F62B9234C83D6879667C3B09536A94BE5DDEAC706025C5690EFE56409B2306420E766F3418D6C7A0
              Malicious:false
              Reputation:unknown
              Preview:........D.h.a.k.s.a.y.a.n. .S.h.a.n.m.u.g.a.n.a.y.a.g.a.m...C.h.i.e.f. .I.n.f.o.r.m.a.t.i.o.n. .O.f.f.i.c.e.r...I...T... .S.e.r.v.i.c.e.s. .D.e.p.a.r.t.m.e.n.t...C.o.r.p.o.r.a.t.e. .S.e.r.v.i.c.e.s.....T.:. .4.1.6.-.3.9.3.-.3.9.2.2. .|. .M.:. .4.1.6.-.7.7.1.-.7.3.1.8. .......H.Y.P.E.R.L.I.N.K. .".h.t.t.p.:././.w.w.w...t.t.c...c.a./.".............................................................................................................................................................................................................................T...V...X...Z...........,...................................................................................................................................................................................................................................................................................................$..$.If....:V.......t.....6......4........4........a....*...$..$.If........!v..h.#v....:V.......t.....6......5.......4........4.
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:ASCII text, with very long lines (28758), with CRLF line terminators
              Category:dropped
              Size (bytes):20971520
              Entropy (8bit):0.17812132402626502
              Encrypted:false
              SSDEEP:
              MD5:2ABB1047E51CD89F921CEC31794A2F31
              SHA1:0AF8554E039F22EE34495989C2F6947A843ED61F
              SHA-256:97511C8F7E849E46A8380DC02C02DD8455B4E752B382D8CA004E65F397E4201D
              SHA-512:D0A59FE8D26A9CABA4967C3C37EE6FCF8D08E457FC339532ACA65E411A2A9C4029703DDBC2B2ECDB5B7713A807B333F837A3F4DF3C4C0B127DB2FCBE0C014D8B
              Malicious:false
              Reputation:unknown
              Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..05/08/2024 19:38:36.374.OUTLOOK (0x195C).0x1A60.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.GDIAssistant.HandleCallback","Flags":30962256044949761,"InternalSequenceNumber":22,"Time":"2024-05-08T19:38:36.374Z","Contract":"Office.System.Activity","Activity.CV":"DF8EF+L7QUarZwAdAWraow.4.9","Activity.Duration":14,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.GdiFamilyName":"","Data.CloudFontStatus":6,"Data.CloudFontTypes":256}...05/08/2024 19:38:36.390.OUTLOOK (0x195C).0x1A60.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.ResourceClient.Deserialize","Flags":30962256044949761,"InternalSequenceNumber":24,"Time":"2024-05-08T19:38:36.390Z","Contract":"Office.System.Activity","Activity.CV":"DF8EF+L7QUarZwAdAWraow.4.10","Activity.Duration":10236,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.JsonFileMajorV
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:data
              Category:dropped
              Size (bytes):20971520
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:
              MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
              SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
              SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
              SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
              Malicious:false
              Reputation:unknown
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:data
              Category:modified
              Size (bytes):94208
              Entropy (8bit):4.49478119347496
              Encrypted:false
              SSDEEP:
              MD5:F28112D9A34FC98410FBF94FDABF863E
              SHA1:4C3C97D5FE01DDB1BF4086CC1F5AA596689331B6
              SHA-256:2E706BBFB8DA028A01BECFA7D6B5EFE6BC5BE7DBBF5AFB8069C4AF2879725A30
              SHA-512:03F8B35E87633609F44C80B337D3AF21834787A525CA9BDD82AF49BE62C212839007867E28408682117F732A70DC697E85D2F4E7BE6F0D49772D0516B5CFC218
              Malicious:false
              Reputation:unknown
              Preview:............................................................................`...`...\....{.Q....................eJ..............Zb..2.......................................@.t.z.r.e.s...d.l.l.,.-.3.2.2.......................................................@.t.z.r.e.s...d.l.l.,.-.3.2.1...........................................................@.?..Y...........{.Q............v.2._.O.U.T.L.O.O.K.:.1.9.5.c.:.e.4.c.d.9.3.a.c.f.1.2.9.4.8.6.d.a.4.1.e.a.e.0.7.5.c.9.4.5.b.6.5...C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.0.5.0.8.T.2.1.3.8.3.6.0.1.5.3.-.6.4.9.2...e.t.l.......P.P.`...\....{.Q............................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:data
              Category:dropped
              Size (bytes):163840
              Entropy (8bit):0.38475304918046116
              Encrypted:false
              SSDEEP:
              MD5:AAD34336BF21D46BEEE5FAB1D605D489
              SHA1:803144488140E18B18BBAEA43B3D92C829688ED2
              SHA-256:F578FF960BE3087F5EF935BC39FE73F33A06F7777B7A8F49E01D4D41D8A3C960
              SHA-512:407E0C2BE587CC1C57C9FF756012645F5B82E05F788F4366266CB4B1D6963BF0C8AB9619C5F62CCCB2D5F8061F0039303293F1563CF5C97C1CC9798D5A575BC8
              Malicious:false
              Reputation:unknown
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:data
              Category:dropped
              Size (bytes):30
              Entropy (8bit):1.2389205950315936
              Encrypted:false
              SSDEEP:
              MD5:3C8209FB8320F928A91057F7F721A88E
              SHA1:A04B6040AB8C20BF7C3415A056D47DD57E64B933
              SHA-256:48D30025BDAEBCCE5AECC04B671A03AA47FE8CD396D67DCDC831BECCD4A49B0E
              SHA-512:5185C1C09231230536400FD419D11049AF287C40B7CDCE4037009632958ECD276F486A47A5A4463BB81E3BAD92B39BCF438560398E4FC8F1E2CD63AF37AFA91C
              Malicious:false
              Reputation:unknown
              Preview:..............................
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
              Category:modified
              Size (bytes):14
              Entropy (8bit):2.699513850319966
              Encrypted:false
              SSDEEP:
              MD5:C5A12EA2F9C2D2A79155C1BC161C350C
              SHA1:75004B4B6C6C4EE37BE7C3FD7EE4AF4A531A1B1A
              SHA-256:61EC0DAA23CBC92167446DADEFB919D86E592A31EBBD0AB56E64148EBF82152D
              SHA-512:B3D5AF7C4A9CB09D27F0522671503654D06891740C36D3089BB5CB21E46AB235B0FA3DC2585A383B9F89F5C6DAE78F49F72B0AD58E6862DE39F440C4D6FF460B
              Malicious:false
              Reputation:unknown
              Preview:..c.a.l.i.....
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 8 18:38:54 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2673
              Entropy (8bit):3.9873340512756905
              Encrypted:false
              SSDEEP:
              MD5:F7F56C52A623F896CF729D9CABB4DB89
              SHA1:061385EAE92EF922BDED7BE6A60996FD9D034C7D
              SHA-256:54617AEADE70B64EED6A653C80EEDA10C19CBEF4F5C77D58987D0CDCE7D32ABF
              SHA-512:51145CF66437CA370F1BCEECF266D036B9E03152DA0F59B55EFF2CC1038656AC9F69C15A0129DEE0D9A45247F815EDC7B18F3FC23D63B437E83C580C027C67EF
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,....\=.\....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............C.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 8 18:38:54 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2675
              Entropy (8bit):4.006385048723081
              Encrypted:false
              SSDEEP:
              MD5:8FFBAF2D1CE8567600B572A2F865F46F
              SHA1:8F0823B0D78D9F4EB81E7AECCD5A9C31C513F0EC
              SHA-256:24630321BD68726604B3757EC39E65DBFA12269E412EC41313DFFFDB97078732
              SHA-512:653311155A24FDCD0BE1E0291CDC52E08AB6C6827755217789CD09A3D7F48684770B0D8E7219F93A91E023942BE54CEBBB546E190016436F8985D53720DB6660
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,......\....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............C.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2689
              Entropy (8bit):4.013323222355667
              Encrypted:false
              SSDEEP:
              MD5:44F872ABF2EA23E30505D57B196C122D
              SHA1:4BB0E0F58F0BE7906F9114144C90B30DF19EE11E
              SHA-256:42A243286E1EF795AA72A20F0DB6F9171F8C6F62C8B9B5C197DEA8EB981BBDD3
              SHA-512:A5286BCFB607D00921595A9CE9539E24E54C5D02E6D5DEDA050DE27726DD3D7F3FB9C6FFC27139023A67FBA627FA3DA51B21D9C9E117646511592F7B89EC45B0
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............C.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 8 18:38:54 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2677
              Entropy (8bit):4.004543915646497
              Encrypted:false
              SSDEEP:
              MD5:802493696A783391E34FC75CA987167B
              SHA1:6A268C49B7901B159778794EBDAE824A530F2A1E
              SHA-256:2ADD0D6D878F54AD09E2B4BC40C7BC07F3E8F6B23A4D4EF7F6183EAE2515D5A9
              SHA-512:7FC21C7B8119BFCD9DF81E517D6E5A650B525FC096C84FE546F1CA530962A3FE12E38DF77218EDE288C13274DC2D17243B4E1A3759FE9FAD24610160D8A92F24
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,....[*.\....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............C.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 8 18:38:54 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2677
              Entropy (8bit):3.992917010780226
              Encrypted:false
              SSDEEP:
              MD5:87676106F131E345A155CCC85555F05F
              SHA1:1843D1D7BAE90DCBB5E17709D575EC09D15F9024
              SHA-256:7CE71A0F298B44C0290292165686F0F387993B773A1130694B92A028429D0731
              SHA-512:ED8BF17B427BFBDF977AF00D529CFBAC7194FFFC403E5CF626E350D83648D3531C71D4DD60078042110164ADCB019826A901AA4231CD0EF89A38331AB740E51E
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.......\....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............C.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 8 18:38:54 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
              Category:dropped
              Size (bytes):2679
              Entropy (8bit):4.000639829474691
              Encrypted:false
              SSDEEP:
              MD5:924650CB148A6A5A27A84038E28D3CCE
              SHA1:CFADA92DFDD0A1A4FAE2C97FB6921EF352AA6F3C
              SHA-256:E0B70EE90397827161276C516BB0BF1B651E2E857B6F9A19C2E5BEE5513C71B4
              SHA-512:DF16ECB32E4433BEE0B59E4E18503BC5F7A991D203A8BEF21DC3DA7D6994026A3100AFF91C05A9E3059FD03231C7BF748829FBF86AD911E4B5ADEC83865BF287
              Malicious:false
              Reputation:unknown
              Preview:L..................F.@.. ...$+.,.....*x\....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.X.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............C.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:Microsoft Outlook email folder (>=2003)
              Category:dropped
              Size (bytes):271360
              Entropy (8bit):1.3162028101033145
              Encrypted:false
              SSDEEP:
              MD5:923641B6192D72315D4B8E5292D022CB
              SHA1:E4D62C73C223CFA0FAB8395471C559302E88E502
              SHA-256:34EDB36773EE5F1951C7A727395FAA25AF5E5FB781FB438DDA9A3E1F0DDEDE63
              SHA-512:409B2F5D722C60D052C406099C549804CEFC43BA75AE1638704226BC2F82AC291672D355DE009655884192A4884AA5085927C8937514022CBF635FB15D130D05
              Malicious:false
              Reputation:unknown
              Preview:!BDN..A.SM......\.......................U................@...........@...@...................................@...........................................................................$.......D.......M..........................................................................................................................................................................................................................................................................................................................<........5/l......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
              File Type:data
              Category:dropped
              Size (bytes):131072
              Entropy (8bit):1.2013617142655217
              Encrypted:false
              SSDEEP:
              MD5:1B68BFB2258D7C7A018E107ACDA93FF8
              SHA1:6D02AF6F4A9A7C2F064EA00E96FEC73D31BBDDB3
              SHA-256:0C5DD5AAE9CA11BEFD147EEE7F03DDDF84A9C331BB604DAA1671C84D17C5A7F5
              SHA-512:75AC423E2F20852239E52C5C9BE7D42AF8C99077BCE44A92371BACF57F845A97373ABBB72CDF6CC811D8AF4885E68140B51DE0106110381091FBD769C9BD56A5
              Malicious:false
              Reputation:unknown
              Preview:.0.g0...[.......\...z.aQ.........D............#...........?.................................................................?.......................................................................................................................................................................................................................................................................................................................................................................................................................................Mb...D......@.U.0...\.......\...z.aQ.........B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:ASCII text, with no line terminators
              Category:downloaded
              Size (bytes):18
              Entropy (8bit):3.5724312513221195
              Encrypted:false
              SSDEEP:
              MD5:53AF239EE5D3E261545DEDEDCB6FFD57
              SHA1:04CA7E137E1E9FEEAD96A7DF45BB67D5AB3DE190
              SHA-256:99EB12F2AB3C4866A353E098FFA3CB7A967E617C49B98480394EC5D8EA92B094
              SHA-512:C734E4A5FF5D335A91518DBF47861BDAF8012AF49371DCD2E3350E269C9A5A1CC094114D17C4F5B053F3757B4B07487EBD0D309C91EF97ACF4665CC5D5C9A2D3
              Malicious:false
              Reputation:unknown
              URL:https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2Fhttps://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2F
              Preview:404 page not found
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:ASCII text, with very long lines (3664)
              Category:downloaded
              Size (bytes):3669
              Entropy (8bit):5.82215722018669
              Encrypted:false
              SSDEEP:
              MD5:69CA4C0F4D2743ABEE88BA8FCB5951F0
              SHA1:FF27E015DBE07123E8AF90E6F013B572CD51CF52
              SHA-256:0B42F53DB541BBBB41F34989B6A338D2823E330269335D7845F1FCE9112D77EC
              SHA-512:BBE6DDFC917D907564E46468C8DB42566BD3086E040BB4E341FCC9F80E41FA13F8B5E51A8DF2B1CDCB98A34ED4BB5C576A3EA9E562599F93D51FB550FFE7933D
              Malicious:false
              Reputation:unknown
              URL:https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
              Preview:)]}'.["",["60th baeksang arts awards winners","zwift subscription","badminton grassroots 2024","brewdog ceo james watt","joop sparkes prague","sxsw london","microsoft closes tango gameworks","rangers transfer news"],["","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:groupsinfo":"ChgIkk4SEwoRVHJlbmRpbmcgc2VhcmNoZXM\u003d","google:suggestdetail":[{"zl":10002},{"zl":10002},{"zl":10002},{"google:entityinfo":"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
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:HTML document, ASCII text, with no line terminators
              Category:downloaded
              Size (bytes):257
              Entropy (8bit):4.6486758631726115
              Encrypted:false
              SSDEEP:
              MD5:6147CA10712E483B5EE714D29C21E439
              SHA1:7BFFD4014EFE0ACE62D03599877153159E2A01B6
              SHA-256:E5128B5E331CAD19DF2F67041FFC85BF716D6E6106DEA098C37524593FB268E9
              SHA-512:B3381EFE8B9D07D1F27174E70813AF2E8FBFCAC00E0F5D197121F20E81DE7B2B271264CB07B332A82118F636917CA30A4CDD568BF97B83B29DFCBACC58F8C928
              Malicious:false
              Reputation:unknown
              URL:https://pdf-image.org/
              Preview:<html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:ASCII text, with very long lines (3319)
              Category:downloaded
              Size (bytes):3324
              Entropy (8bit):5.832309218825039
              Encrypted:false
              SSDEEP:
              MD5:439C7708CB4D0DC2830BC5CB1321C742
              SHA1:831B771778BE714B3CF9CBB6E5B4544EB9050702
              SHA-256:8093F62DA12598A542A665905AEB44ECC2ADBCF442FDFC33AA0BDC46E18E9C7D
              SHA-512:4AC41A0DD59F2448D0F591A92739D18E9D58F4A58DCA3867FD3B9E2C6BDF8076C4B09C2717BF80D44C4B752DF074C39EB5C42668328BB2C2D3235719A8655A97
              Malicious:false
              Reputation:unknown
              URL:https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
              Preview:)]}'.["",["kerala sslc results","set for life winners","the gathering drama","zwift subscription","adrian newey","uk weather heatwave","lego notre dame de paris","motorway speed limit"],["","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:groupsinfo":"ChgIkk4SEwoRVHJlbmRpbmcgc2VhcmNoZXM\u003d","google:suggestdetail":[{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002},{"google:entityinfo":"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
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:ASCII text, with very long lines (7784), with no line terminators
              Category:downloaded
              Size (bytes):7784
              Entropy (8bit):5.766686826945783
              Encrypted:false
              SSDEEP:
              MD5:F7715537C6744716002C71C98ACDF1D7
              SHA1:C15966FC5D685AC0A1D8470BC9C1136BE37DBA0C
              SHA-256:59F6909D64DBCEC3B9CB5667F2BC60C6DA09E837E636B9706F32649CC4829649
              SHA-512:CBFD0701747E16F9731C41D1BB2CB6D4F7FE009443F22099C3AFEFAE7BA3158C49B8FB27CB8F9CABE1445209C5C03FC2A03CC48062CE29A51E485A21B811E33D
              Malicious:false
              Reputation:unknown
              URL:https://pdf-image.org/cdn-cgi/challenge-platform/h/b/scripts/jsd/ce7818f50e39/main.js
              Preview:window._cf_chl_opt={cFPWv:'b'};~function(V,g,h,i,j,k,o,s){V=b,function(c,e,U,f,C){for(U=b,f=c();!![];)try{if(C=-parseInt(U(399))/1+parseInt(U(429))/2*(-parseInt(U(435))/3)+parseInt(U(397))/4+-parseInt(U(428))/5*(-parseInt(U(475))/6)+parseInt(U(463))/7+-parseInt(U(393))/8+parseInt(U(395))/9,e===C)break;else f.push(f.shift())}catch(D){f.push(f.shift())}}(a,646159),g=this||self,h=g[V(444)],i=function(W,e,f,C){return W=V,e=String[W(461)],f={'h':function(D){return null==D?'':f.g(D,6,function(E,X){return X=b,X(458)[X(423)](E)})},'g':function(D,E,F,Y,G,H,I,J,K,L,M,N,O,P,Q,R,S,T){if(Y=W,D==null)return'';for(H={},I={},J='',K=2,L=3,M=2,N=[],O=0,P=0,Q=0;Q<D[Y(403)];Q+=1)if(R=D[Y(423)](Q),Object[Y(477)][Y(465)][Y(464)](H,R)||(H[R]=L++,I[R]=!0),S=J+R,Object[Y(477)][Y(465)][Y(464)](H,S))J=S;else{if(Object[Y(477)][Y(465)][Y(464)](I,J)){if(256>J[Y(469)](0)){for(G=0;G<M;O<<=1,E-1==P?(P=0,N[Y(459)](F(O)),O=0):P++,G++);for(T=J[Y(469)](0),G=0;8>G;O=O<<1|1&T,E-1==P?(P=0,N[Y(459)](F(O)),O=0):P++,T>>=1,G++);
              Process:C:\Program Files\Google\Chrome\Application\chrome.exe
              File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 50x28, components 3
              Category:dropped
              Size (bytes):2364
              Entropy (8bit):7.679202158241799
              Encrypted:false
              SSDEEP:
              MD5:D9DBE534709BF946943CBCA0FB55E61F
              SHA1:A69E5E1F25AEF49CC1A8BB2C4031B62615BF3880
              SHA-256:00FF6AB3F13675A1DA9D1A69726E448DA7EB830395708A26BD90A313253BC634
              SHA-512:4826DDA66DDBC05510CABD5498CFB5E381D302329DDCB1F004460C7260B4E5A5415C77AB2FD0F2CB2C145DC8849C9347F74C91952ABB682C4F5DDE8844FD1517
              Malicious:false
              Reputation:unknown
              Preview:......JFIF.............C....................................................................C.........................................................................2.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...+..I.W..^.._...w.....&..u.yR....j.G...H.6..W./!(.y..,..A....w.>..>3........x.CY.S...]._.-..P....4.md.<x......O.|........Z...}K......ZxVk.....J.|Y...o...b'..P..p".._1..O....J...fN.'...#Nv..~...(:u.W..N.....IT.....%....(.#W...S.*...O..F.<j*.j.0/.Q....8.tjJ4>.~.z?...... ...h^....Dx&.Z...t.}J;-k^...%~&...cpm-.....-..v(.d.B.....F.O...7.....O..q5..h-..Gu$.V
              File type:CDFV2 Microsoft Outlook Message
              Entropy (8bit):4.587638224198865
              TrID:
              • Outlook Message (71009/1) 58.92%
              • Outlook Form Template (41509/1) 34.44%
              • Generic OLE2 / Multistream Compound File (8008/1) 6.64%
              File name:FW EXTERNAL Check Approval.msg
              File size:100'864 bytes
              MD5:2404b6f740334e48899b59783285106e
              SHA1:f759a8f89d6d5feeb8e8f1587a31437582b6708e
              SHA256:0250eb1de58e9c5baf2319df43c4f156c462c7f83309929af349d0dcb623efa8
              SHA512:0537f2431c0c031f2a361e6381f89f311f14c6d1969aa61d94dadc2cfd6ea12e893a9cceaaf8fdb439695c69f9c661e3c51dbf0dc4b63f7636bdae03c9dc215e
              SSDEEP:1536:dJLbBddUsTmQ9efLWct2YfAJG8jStPGgi4YDcJzZVINzRaL:dBBddU9Q9wLpt2hG8jSXiDAb
              TLSH:0EA3110267E90615F2BB8B759DF380968D23BC41AD35C75E3199370E8AB39D1AC20B77
              File Content Preview:........................>.......................................................t..............................................................................................................................................................................
              Subject:FW: [EXTERNAL] Check Approval
              From:"Shanmuganayagam, Dhaksayan" <Dhaksayan.Shanmuganayagam@ttc.ca>
              To:"Srivastava; Anshul" <Anshul.Srivastava@ttc.ca>; Phishing <Phishing@ttc.ca>
              Cc:
              BCC:
              Date:Tue, 07 May 2024 14:04:29 +0200
              Communications:
              • Dhaksayan Shanmuganayagam Chief Information Officer I.T. Services Department Corporate Services T: 416-393-3922 | M: 416-771-7318 [https://ttcstaticdata.blob.core.windows.net/ttc-data/TTC%20Logo.png]<http://www.ttc.ca/> Toronto Transit Commission 3rd Floor, 1910 Yonge Street Toronto, ON M4S 1Z5
              • From: Wong, Rich <Rich.Wong@ttc.ca> Sent: Tuesday, May 7, 2024 7:59 AM To: Shanmuganayagam, Dhaksayan <Dhaksayan.Shanmuganayagam@ttc.ca> Subject: Fwd: [EXTERNAL] Check Approval Hi Dhaksayan I accidentally clicked on the attachment while checking this in my phone It took me to a software program to open it further. Not sure if this was bad Sent from my iPhone Begin forwarded message: From: Arthur Boberg <aboberg@foodconcepts.com<mailto:aboberg@foodconcepts.com>> Date: May 7, 2024 at 6:05:25 AM EDT To: peter.fernandes@bcferries.com<mailto:peter.fernandes@bcferries.com>, calandrinom@fastfrate.com<mailto:calandrinom@fastfrate.com>, andre.menard@ameriwood.com<mailto:andre.menard@ameriwood.com>, jamie.farwell@interpipeline.com<mailto:jamie.farwell@interpipeline.com>, xian.peng@bcferries.com<mailto:xian.peng@bcferries.com>, philip.quinn@anton-paar.com<mailto:philip.quinn@anton-paar.com>, james.nakashima@availcpa.com<mailto:james.nakashima@availcpa.com>, dbrown@boyden.com<mailto:dbrown@boyden.com>, clifford.watson@cae.com<mailto:clifford.watson@cae.com>, wayne.warren@gowlingwlg.com<mailto:wayne.warren@gowlingwlg.com>, ken.krawiec@teigp.com<mailto:ken.krawiec@teigp.com>, tom.chang@bora-corp.com<mailto:tom.chang@bora-corp.com>, darren.barker@canfor.com<mailto:darren.barker@canfor.com>, oderra@orezone.com<mailto:oderra@orezone.com>, millie.hieke@spi-s.com<mailto:millie.hieke@spi-s.com>, jsamy@maureva.com<mailto:jsamy@maureva.com>, dschardt@elementcorp.com<mailto:dschardt@elementcorp.com>, hmelendez@grancolombiagold.com<mailto:hmelendez@grancolombiagold.com>, brent.heagy@interpipeline.com<mailto:brent.heagy@interpipeline.com>, greg.brown@easternhealth.ca<mailto:greg.brown@easternhealth.ca>, arudolph@bdo.ca<mailto:arudolph@bdo.ca>, merrill.martin@martindeerline.com<mailto:merrill.martin@martindeerline.com>, tom.gucciardi@axiomgroup.ca<mailto:tom.gucciardi@axiomgroup.ca>, jlafleche@dmsind.ca<mailto:jlafleche@dmsind.ca>, mel.crocker@aircanada.ca<mailto:mel.crocker@aircanada.ca>, mcrouch@ardex.com<mailto:mcrouch@ardex.com>, frank.mirabelli@firstgeneral.ca<mailto:frank.mirabelli@firstgeneral.ca>, ethel.sinjala@fqml.com<mailto:ethel.sinjala@fqml.com>, lee.thompson@flyjazz.ca<mailto:lee.thompson@flyjazz.ca>, deb@progressluv2pak.com<mailto:deb@progressluv2pak.com>, kurt@fortressge.com<mailto:kurt@fortressge.com>, smay@welchcapitalpartners.com<mailto:smay@welchcapitalpartners.com>, pcalleri@thegaap.net<mailto:pcalleri@thegaap.net>, frank.cristiano@icf.com<mailto:frank.cristiano@icf.com>, lori.higgs@sjhc.london.on.ca<mailto:lori.higgs@sjhc.london.on.ca>, kstowkowy@parlee.com<mailto:kstowkowy@parlee.com>, "Wong, Rich" <Rich.Wong@ttc.ca<mailto:Rich.Wong@ttc.ca>>, don.turri@crowemackay.ca<mailto:don.turri@crowemackay.ca>, jdwood@strongco.com<mailto:jdwood@strongco.com>, ronv@starvansystems.com<mailto:ronv@starvansystems.com>, trevor.jahnig@tolko.com<mailto:trevor.jahnig@tolko.com>, sjcodas@epsteincole.com<mailto:sjcodas@epsteincole.com>, chengd@bennettjones.com<mailto:chengd@bennettjones.com>, robin.periana@deltalight.ca<mailto:robin.periana@deltalight.ca>, debra.christmas@gartner.com<mailto:debra.christmas@gartner.com>, mikes@kingsdown.ca<mailto:mikes@kingsdown.ca>, sherle@parksville.ca<mailto:sherle@parksville.ca>, dana.gaer@elemecloud.com<mailto:dana.gaer@elemecloud.com>, marie-claude.guay@galderma.com<mailto:marie-claude.guay@galderma.com>, erinn_pinkerton@bctransit.com<mailto:erinn_pinkerton@bctransit.com> Subject: [EXTERNAL] Check Approval Email from outside TTC, proceed with caution while opening attachments and URL [image.png]<https://secure-web.cisco.com/107-TjUeqXLN5-AhpQ0ShpJqsX8wKbIQEiPDlMWWmuPmOqAIa-VmiHDgdCNaLXf02c5QSZ2bTeg_NmlEx94g147cni-IvjGzUi9NLcM9-dB1lK3YnpEf-GgGMUgctv9-3kTdUsnYo2ImAau6q4igXJWC4DauYsPhd8JQSov0ij09hX21BBRWaQDHvwSmsCvdf1D03fj7unVlRMiQkAwuyKrUp69_hiAebH_OuTHF1jZHEGRERkEWa2ifSh9xt1t7Ypgz8NC05s_YXd4F-fGtoN6mRWbdhqleaene1p2Xl5g0lcdNgI4L3J6LvpEU_xQQKRI62cP08qoPD6-OZLyLhMmzL4Kq220fERL4DqqHNs1cOV8jrFzzZGbf8EdNsCE6JKEKYorVL43rqgcv5gdwEMweoBJpVtCzvj-iCD3barYrCBGWSHiTZIL_Gw9WABxUS/https%3A%2F%2Fpdf-image.org%2F> Greetings, Please find attached. Let me know if you have any questions or concerns, please feel free to contact me. Thanks, Arthur
              Attachments:
              • image.png
              Key Value
              Receivedfrom P-Edmonton.INT.TTC.CA ([fe80::7dc9:6c1f:2df8:58df]) by
              Transport; Tue, 7 May 2024 0804:29 -0400
              2024 0804:29 -0400
              P-Edmonton.INT.TTC.CA ([fe80:7dc9:6c1f:2df8:58df%3]) with mapi id
              15.01.2507.034; Tue, 7 May 2024 0804:29 -0400
              Content-Typeapplication/ms-tnef; name="winmail.dat"
              Content-Transfer-Encodingbinary
              From"Shanmuganayagam, Dhaksayan" <Dhaksayan.Shanmuganayagam@ttc.ca>
              To"Srivastava, Anshul" <Anshul.Srivastava@ttc.ca>, Phishing
              SubjectFW: [EXTERNAL] Check Approval
              Thread-Topic[EXTERNAL] Check Approval
              Thread-IndexAQHaoGX/jilMGaVJzEG/h2cy3/wjTbGLqzRcgAABV3A=
              DateTue, 7 May 2024 08:04:29 -0400
              Message-ID<58e9e36c29e4403baa5bc6e23f5a28b0@ttc.ca>
              References<BN8PR18MB28202708F96A04DC22998437DAE42@BN8PR18MB2820.namprd18.prod.outlook.com>
              In-Reply-To<1F6AD6C1-EDA5-4A6E-8D91-FA0837763D96@ttc.ca>
              Accept-Languageen-US
              Content-Languageen-US
              X-MS-Has-Attachyes
              X-MS-Exchange-Organization-SCL-1
              X-MS-TNEF-Correlator<58e9e36c29e4403baa5bc6e23f5a28b0@ttc.ca>
              MIME-Version1.0
              X-MS-Exchange-Organization-MessageDirectionalityOriginating
              X-MS-Exchange-Organization-AuthSourceP-Edmonton.INT.TTC.CA
              X-MS-Exchange-Organization-AuthAsInternal
              X-MS-Exchange-Organization-AuthMechanism04
              X-Originating-IP[10.199.3.250]
              X-MS-Exchange-Organization-Network-Message-Ida779320c-6b7f-4d65-3259-08dc6e8dd934
              Return-PathDhaksayan.Shanmuganayagam@ttc.ca
              X-MS-Exchange-Transport-EndToEndLatency00:00:00.4889376
              X-MS-Exchange-Processed-By-BccFoldering15.01.2507.034
              dateTue, 07 May 2024 14:04:29 +0200

              Icon Hash:c4e1928eacb280a2