Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Message.eml

Overview

General Information

Sample name:Message.eml
Analysis ID:1631106
MD5:ab57f01a63d58d11bbd37e6217497e17
SHA1:a567b842844d9164854049bea717a926be5bedba
SHA256:8a8ccc89ac5fd4edfeab446c654b9930cb4bd7222b2c436469f29c462ffcf537
Infos:

Detection

Score:52
Range:0 - 100
Confidence:100%

Signatures

AI detected landing page (webpage, office document or email)
AI detected suspicious elements in Email content
AI detected suspicious elements in Email header
Creates files inside the system directory
Deletes files inside the Windows folder
IP address seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Sigma detected: Suspicious Office Outbound Connections
Suricata IDS alerts with low severity for network traffic

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 4652 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Message.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 5940 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "FF1092E9-C705-422A-B026-B19261394388" "94C875A3-187C-497C-B2E3-EB486B1F25D1" "4652" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • WINWORD.EXE (PID: 4380 cmdline: "C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE" /n "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\4FXV0OMO\Hyperoptic limited Reference Number(s)_FLD9396400164 (SOP 00876) Note(s).docx" /o "" MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
      • WINWORD.EXE (PID: 6604 cmdline: "C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE" /Embedding MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
      • chrome.exe (PID: 3880 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://ts-college.com/?t=cHJlc3NAaHlwZXJvcHRpYy5jb20= MD5: E81F54E6C1129887AEA47E7D092680BF)
        • chrome.exe (PID: 6904 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1840,i,12390355679735535310,5238380358082981745,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2260 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 4652, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
Source: Registry Key setAuthor: frack113: Data: Details: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\4FXV0OMO\, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 4652, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Security\OutlookSecureTempFolder
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.18, DestinationIsIpv6: false, DestinationPort: 49827, EventID: 3, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, Initiated: true, ProcessId: 4652, Protocol: tcp, SourceIp: 52.123.130.14, SourceIsIpv6: false, SourcePort: 443
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-03-06T16:37:57.822106+010020283713Unknown Traffic192.168.2.184982752.123.130.14443TCP
2025-03-06T16:38:18.328030+010020283713Unknown Traffic192.168.2.184984752.123.130.14443TCP

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: Screenshot id: 6Joe Sandbox AI: Page contains button: 'REVIEW DOCUMENT' Source: 'Screenshot id: 6'
Source: Screenshot id: 6Joe Sandbox AI: Screenshot id: 6 contains prominent button: 'review document'
Source: Screenshot id: 10Joe Sandbox AI: Page contains button: 'REVIEW DOCUMENT' Source: 'Screenshot id: 10'
Source: Screenshot id: 10Joe Sandbox AI: Screenshot id: 10 contains prominent button: 'review document'
Source: Screenshot id: 8Joe Sandbox AI: Page contains button: 'REVIEW DOCUMENT' Source: 'Screenshot id: 8'
Source: Screenshot id: 8Joe Sandbox AI: Screenshot id: 8 contains prominent button: 'review document'
Source: Screenshot id: 4Joe Sandbox AI: Page contains button: 'REVIEW DOCUMENT' Source: 'Screenshot id: 4'
Source: Screenshot id: 4Joe Sandbox AI: Screenshot id: 4 contains prominent button: 'review document'
Source: Screenshot id: 5Joe Sandbox AI: Page contains button: 'REVIEW DOCUMENT' Source: 'Screenshot id: 5'
Source: Screenshot id: 5Joe Sandbox AI: Screenshot id: 5 contains prominent button: 'review document'
Source: Screenshot id: 7Joe Sandbox AI: Page contains button: 'REVIEW DOCUMENT' Source: 'Screenshot id: 7'
Source: Screenshot id: 7Joe Sandbox AI: Screenshot id: 7 contains prominent button: 'review document'
Source: Screenshot id: 11Joe Sandbox AI: Page contains button: 'REVIEW DOCUMENT' Source: 'Screenshot id: 11'
Source: Screenshot id: 11Joe Sandbox AI: Screenshot id: 11 contains prominent button: 'review document'
Source: Screenshot id: 9Joe Sandbox AI: Page contains button: 'REVIEW DOCUMENT' Source: 'Screenshot id: 9'
Source: Screenshot id: 9Joe Sandbox AI: Screenshot id: 9 contains prominent button: 'review document'
Source: EmailJoe Sandbox AI: Detected potential phishing email: The sender email domain (altraconsulting.fr) does not match the claimed identity (Arcutis IT Help Desk). The subject line contains suspicious random characters and reference numbers typical of phishing attempts. The email contains repetitive content and inconsistent formatting, suggesting automated malicious content
Source: EmailJoe Sandbox AI: Detected suspicious elements in Email header: IP address 45.150.34.178 is suspicious and doesn't match the claimed domain (altraconsulting.fr). Message-ID format appears to be machine-generated but uses the claimed domain suspiciously. Return-path claims to be from altraconsulting.fr but email originated from a different IP range. Despite low SCL (Spam Confidence Level) of 1, the combination of mismatched sending infrastructure and domain spoofing indicates potential phishing. The x-forefront-antispam-report shows multiple spam filtering categories triggered. The email appears to be attempting to impersonate a legitimate business domain
Source: EmailClassification: Credential Stealer
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: Joe Sandbox ViewIP Address: 52.123.130.14 52.123.130.14
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.18:49827 -> 52.123.130.14:443
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.18:49847 -> 52.123.130.14:443
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.184.195
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: unknownTCP traffic detected without corresponding DNS query: 52.149.20.212
Source: global trafficHTTP traffic detected: GET /r/r4.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
Source: global trafficHTTP traffic detected: GET /r/gsr1.crl HTTP/1.1Cache-Control: max-age = 3000Connection: Keep-AliveAccept: */*If-Modified-Since: Tue, 07 Jan 2025 07:28:00 GMTUser-Agent: Microsoft-CryptoAPI/10.0Host: c.pki.goog
Source: global trafficDNS traffic detected: DNS query: ts-college.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: ~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drString found in binary or memory: https://community.docusign.com/esignature-111?utm_campaign=GBL_US_PRD_AWA_2405_CommunityCTA&utm_medi
Source: ~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drString found in binary or memory: https://protect.docusign.net/report-abuse?e=AUtomjpFak9GlbPL0zFFi11jilG0VmYI97b1epzmoQg30jlISZME_i7f
Source: ~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drString found in binary or memory: https://support.docusign.com/
Source: ~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drString found in binary or memory: https://support.docusign.com/en/articles/How-do-I-manage-my-email-notifications
Source: ~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drString found in binary or memory: https://support.docusign.com/en/guides/Declining-to-sign-DocuSign-Signer-Guide
Source: ~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drString found in binary or memory: https://support.docusign.com/en/guides/signer-guide-signing-sign-on-paper-new
Source: ~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drString found in binary or memory: https://support.docusign.com/s/articles/How-do-I-sign-a-DocuSign-document-Basic-Signing?language=en_
Source: ~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drString found in binary or memory: https://ts-college.com/?t=cHJlc3NAaHlwZXJvcHRpYy5jb20=
Source: ~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drString found in binary or memory: https://www.docusign.com/features-and-benefits/mobile?utm_campaign=GBL_XX_DBU_UPS_2211_SignNotificat
Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49906 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49932
Source: unknownNetwork traffic detected: HTTP traffic on port 49889 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49931
Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49892
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49891
Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49926
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49889
Source: unknownNetwork traffic detected: HTTP traffic on port 49901 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49888
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49882
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49892 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49918
Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49915
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
Source: unknownNetwork traffic detected: HTTP traffic on port 49891 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49931 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49907
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49906
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
Source: unknownNetwork traffic detected: HTTP traffic on port 49907 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49901
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49900
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
Source: unknownNetwork traffic detected: HTTP traffic on port 49888 -> 443
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\scoped_dir3880_1058844816
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\scoped_dir3880_1058844816
Source: classification engineClassification label: mal52.winEML@30/19@4/4
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmpJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20250306T1037310891-4652.etlJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Message.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "FF1092E9-C705-422A-B026-B19261394388" "94C875A3-187C-497C-B2E3-EB486B1F25D1" "4652" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE" /n "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\4FXV0OMO\Hyperoptic limited Reference Number(s)_FLD9396400164 (SOP 00876) Note(s).docx" /o ""
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE" /Embedding
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://ts-college.com/?t=cHJlc3NAaHlwZXJvcHRpYy5jb20=
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1840,i,12390355679735535310,5238380358082981745,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2260 /prefetch:3
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "FF1092E9-C705-422A-B026-B19261394388" "94C875A3-187C-497C-B2E3-EB486B1F25D1" "4652" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE" /n "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\4FXV0OMO\Hyperoptic limited Reference Number(s)_FLD9396400164 (SOP 00876) Note(s).docx" /o ""Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE" /EmbeddingJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://ts-college.com/?t=cHJlc3NAaHlwZXJvcHRpYy5jb20=Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1840,i,12390355679735535310,5238380358082981745,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2260 /prefetch:3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile opened: C:\Program Files (x86)\Microsoft Office\root\vfs\SystemX86\MSVCR100.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation21
Browser Extensions
1
Process Injection
11
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager14
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
File Deletion
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://ts-college.com/?t=cHJlc3NAaHlwZXJvcHRpYy5jb20=0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
ts-college.com
213.209.150.110
truefalse
    unknown
    www.google.com
    216.58.212.164
    truefalse
      high
      s-0005.dual-s-dc-msedge.net
      52.123.130.14
      truefalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://community.docusign.com/esignature-111?utm_campaign=GBL_US_PRD_AWA_2405_CommunityCTA&utm_medi~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drfalse
          high
          https://support.docusign.com/en/guides/signer-guide-signing-sign-on-paper-new~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drfalse
            high
            https://support.docusign.com/en/articles/How-do-I-manage-my-email-notifications~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drfalse
              high
              https://support.docusign.com/~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drfalse
                high
                https://ts-college.com/?t=cHJlc3NAaHlwZXJvcHRpYy5jb20=~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.docusign.com/features-and-benefits/mobile?utm_campaign=GBL_XX_DBU_UPS_2211_SignNotificat~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drfalse
                  high
                  https://support.docusign.com/en/guides/Declining-to-sign-DocuSign-Signer-Guide~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drfalse
                    high
                    https://protect.docusign.net/report-abuse?e=AUtomjpFak9GlbPL0zFFi11jilG0VmYI97b1epzmoQg30jlISZME_i7f~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drfalse
                      high
                      https://support.docusign.com/s/articles/How-do-I-sign-a-DocuSign-document-Basic-Signing?language=en_~WRS{BF1E2BF5-2F98-4B73-8484-F384E88EA61B}.tmp.6.drfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        52.123.130.14
                        s-0005.dual-s-dc-msedge.netUnited States
                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        216.58.212.164
                        www.google.comUnited States
                        15169GOOGLEUSfalse
                        213.209.150.110
                        ts-college.comGermany
                        197706KEMINETALfalse
                        IP
                        192.168.2.18
                        Joe Sandbox version:42.0.0 Malachite
                        Analysis ID:1631106
                        Start date and time:2025-03-06 16:37:01 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 15s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:13
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Message.eml
                        Detection:MAL
                        Classification:mal52.winEML@30/19@4/4
                        Cookbook Comments:
                        • Found application associated with file extension: .eml
                        • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe, svchost.exe, MavInject32.exe
                        • Excluded IPs from analysis (whitelisted): 52.109.28.46, 217.20.57.36, 52.109.76.243, 2.22.242.112, 2.22.242.105, 2.22.242.136, 2.22.242.97, 2.22.242.113, 2.22.242.121, 2.22.242.81, 2.22.242.145, 52.109.76.144, 20.42.73.26, 52.111.243.41, 52.111.243.43, 52.111.243.40, 52.111.243.42, 142.250.185.110, 142.250.186.131, 142.250.186.142, 66.102.1.84, 20.42.65.93, 2.19.120.68, 2.19.120.69, 52.182.143.213, 142.250.185.195, 172.217.18.14, 142.250.185.163, 172.217.16.195
                        • Excluded domains from analysis (whitelisted): omex.cdn.office.net, neu-azsc-000.odc.officeapps.live.com, odc.officeapps.live.com, onedscolprdeus20.eastus.cloudapp.azure.com, slscr.update.microsoft.com, europe.odcsm1.live.com.akadns.net, templatesmetadata.office.net.edgekey.net, clientservices.googleapis.com, eur.roaming1.live.com.akadns.net, neu-azsc-000.roaming.officeapps.live.com, mobile.events.data.microsoft.com, roaming.officeapps.live.com, dual-s-0005-office.config.skype.com, clients2.google.com, onedscolprdcus16.centralus.cloudapp.azure.com, login.live.com, onedscolprdeus09.eastus.cloudapp.azure.com, update.googleapis.com, officeclient.microsoft.com, templatesmetadata.office.net, c.pki.goog, a1864.dscd.akamai.net, osiprod-neu-bronze-azsc-000.northeurope.cloudapp.azure.com, ecs.office.com, self-events-data.trafficmanager.net, accounts.google.com, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtOpenFile calls found.
                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        No simulations
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        52.123.130.14FW_ Sam Coon shared _03-04-2025 rabofla_pdf_ with you.msgGet hashmaliciousUnknownBrowse
                          Map1.pdfGet hashmaliciousUnknownBrowse
                            Re_ 23-005 Mosquito Control - Stonhard Subcontractor SOV request; PRN011991.emlGet hashmaliciousInvisible JSBrowse
                              triage-report_995297-malware-serafim_reclame_aqui-q4_AT_pousoheron_us.zipGet hashmaliciousUnknownBrowse
                                REMITTANCE DETAILS....xlsxGet hashmaliciousHTMLPhisher, Invisible JSBrowse
                                  FW_ Fw_ Spreadsheet shared with you_ _Invitation to Bid_ By Elna Davis [ID_0023058].emlGet hashmaliciousHTMLPhisher, Invisible JSBrowse
                                    Deborah Hardwick shared Carter Towler New Project with you. (17.8 KB).msgGet hashmaliciousUnknownBrowse
                                      snymandejager.msgGet hashmaliciousUnknownBrowse
                                        Benjamin Media Inc.emlGet hashmaliciousUnknownBrowse
                                          New Po Copy.docxGet hashmaliciousUnknownBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            s-0005.dual-s-dc-msedge.net_EXT_ _EXT_ Hydraulic pump.msgGet hashmaliciousUnknownBrowse
                                            • 52.123.131.14
                                            05 BOIRON F 240700457 ORDEN 05 MAR 2025.xlsGet hashmaliciousHidden Macro 4.0Browse
                                            • 52.123.131.14
                                            Quote 09052022-008_1.xlsxGet hashmaliciousUnknownBrowse
                                            • 52.123.131.14
                                            Quote 09052022-008_1.xlsxGet hashmaliciousUnknownBrowse
                                            • 52.123.130.14
                                            file.0xd10e5bd05bb0.0xd10e58feb750.DataSectionObject.CV.docm.docmGet hashmaliciousUnknownBrowse
                                            • 52.123.131.14
                                            AccountFactuur8472.xlsmGet hashmaliciousUnknownBrowse
                                            • 52.123.131.14
                                            Outstanding statement.xlsGet hashmaliciousUnknownBrowse
                                            • 52.123.131.14
                                            RE DOCUMENT A SIGNER.msgGet hashmaliciousHTMLPhisherBrowse
                                            • 52.123.130.14
                                            FW_ Sam Coon shared _03-04-2025 rabofla_pdf_ with you.msgGet hashmaliciousUnknownBrowse
                                            • 52.123.130.14
                                            Message.emlGet hashmaliciousUnknownBrowse
                                            • 52.123.130.14
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            KEMINETALaV2ffcSuKl.exeGet hashmaliciousAmadey, GCleaner, LummaC Stealer, PureLog Stealer, Stealc, SystemBC, VidarBrowse
                                            • 213.209.150.137
                                            SecuriteInfo.com.Trojan.MulDrop29.15967.25640.16156.exeGet hashmaliciousSystemBCBrowse
                                            • 213.209.150.137
                                            email.batGet hashmaliciousDiscord Token Stealer, Strela StealerBrowse
                                            • 213.209.150.200
                                            rDB_YAK_838327E.cmdGet hashmaliciousDBatLoader, RemcosBrowse
                                            • 172.94.126.47
                                            SecuriteInfo.com.Win32.SpywareX-gen.326.19270.exeGet hashmaliciousSystemBCBrowse
                                            • 213.209.150.137
                                            SecuriteInfo.com.Win32.SpywareX-gen.19167.22607.exeGet hashmaliciousSystemBCBrowse
                                            • 213.209.150.137
                                            XO4ioEY3nq.exeGet hashmaliciousAmadey, SystemBCBrowse
                                            • 213.209.150.137
                                            sora.x86.elfGet hashmaliciousMiraiBrowse
                                            • 185.53.100.140
                                            Hilix.mpsl.elfGet hashmaliciousMiraiBrowse
                                            • 185.53.100.126
                                            ldr.ps1Get hashmaliciousGO Miner, XmrigBrowse
                                            • 31.171.157.32
                                            MICROSOFT-CORP-MSN-AS-BLOCKUSnabarm7.elfGet hashmaliciousUnknownBrowse
                                            • 20.115.124.195
                                            _EXT_ _EXT_ Hydraulic pump.msgGet hashmaliciousUnknownBrowse
                                            • 52.123.131.14
                                            PI090599.exeGet hashmaliciousAsyncRAT, DBatLoaderBrowse
                                            • 150.171.27.10
                                            05 BOIRON F 240700457 ORDEN 05 MAR 2025.xlsGet hashmaliciousHidden Macro 4.0Browse
                                            • 13.107.246.60
                                            05 BOIRON F 240700457 ORDEN 05 MAR 2025.xlsGet hashmaliciousUnknownBrowse
                                            • 13.107.253.72
                                            xuy.bin.exeGet hashmaliciousXmrigBrowse
                                            • 204.79.197.203
                                            Quote 09052022-008_1.xlsxGet hashmaliciousUnknownBrowse
                                            • 13.107.246.60
                                            Quote 09052022-008_1.xlsxGet hashmaliciousUnknownBrowse
                                            • 13.107.246.60
                                            splarm7.elfGet hashmaliciousUnknownBrowse
                                            • 104.147.137.250
                                            AccountFactuur8472.xlsmGet hashmaliciousKnowBe4Browse
                                            • 13.107.246.67
                                            No context
                                            No context
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):32768
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:BB7DF04E1B0A2570657527A7E108AE23
                                            SHA1:5188431849B4613152FD7BDBA6A3FF0A4FD6424B
                                            SHA-256:C35020473AED1B4642CD726CAD727B63FFF2824AD68CEDD7FFB73C7CBD890479
                                            SHA-512:768007E06B0CD9E62D50F458B9435C6DDA0A6D272F0B15550F97C478394B743331C3A9C9236E09AB5B9CB3B423B2320A5D66EB3C7068DB9EA37891CA40E47012
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):217
                                            Entropy (8bit):5.70567201304659
                                            Encrypted:false
                                            SSDEEP:6:WLvoOoSc23oH+H1hVcpALqEjOP+0IXFLryCcZHXVWnZvan:0voLSfYeV8pALqEyPI1HyCcJKZi
                                            MD5:1233ED9632E10656BA7DCC6C31036EA8
                                            SHA1:9946BD8688316DDAA2135766CEC96A7DE06CE934
                                            SHA-256:A7B329919284EF670B8E63BA44EA3159999E26BDEF838C089CF59113A19DCED7
                                            SHA-512:0A3BFE47AF2C0221E952DD58D2039CD672DB4AB94F3EBB3EBFF1B22DC3B15D372A5F0B56AE1F1CF7077E9D75A35F54ED634B2161F0CE7D3E05D76AA13BD63600
                                            Malicious:false
                                            Reputation:low
                                            Preview:S.............2.;.............Zfile:///C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\4FXV0OMO\.THyperoptic%20limited%20Reference%20Number(s)_FLD9396400164%20(SOP%2000876)%20Note(s)..docx..d.
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:SQLite 3.x database, last written using SQLite version 3023002, writer version 2, read version 2, file counter 2, database pages 1, cookie 0, schema 0, largest root page 1, unknown 0 encoding, version-valid-for 2
                                            Category:dropped
                                            Size (bytes):4096
                                            Entropy (8bit):0.09216609452072291
                                            Encrypted:false
                                            SSDEEP:3:lSWFN3l/klslpF/4llfll:l9F8E0/
                                            MD5:F138A66469C10D5761C6CBB36F2163C3
                                            SHA1:EEA136206474280549586923B7A4A3C6D5DB1E25
                                            SHA-256:C712D6C7A60F170A0C6C5EC768D962C58B1F59A2D417E98C7C528A037C427AB6
                                            SHA-512:9D25F943B6137DD2981EE75D57BAF3A9E0EE27EEA2DF19591D580F02EC8520D837B8E419A8B1EB7197614A3C6D8793C56EBC848C38295ADA23C31273DAA302D9
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:SQLite format 3......@ .......................................................................... .....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:SQLite Rollback Journal
                                            Category:dropped
                                            Size (bytes):4616
                                            Entropy (8bit):0.13760166725504608
                                            Encrypted:false
                                            SSDEEP:3:7FEG2l+iOslll/FllkpMRgSWbNFl/sl+ltlslVlllflli6:7+/lzbvg9bNFlEs1EP/S6
                                            MD5:C9F5CB36B4A27794B32FFE929E7C7C1F
                                            SHA1:61F39026216A4C57F34F6B165D8E5D9FC9A91C88
                                            SHA-256:E3E417E11818EF0968876D80B697482892F5C54F24DCE970DD0684CFCE77AFB4
                                            SHA-512:4A3FD835A83647A1048C8FBBB4159074CABA2E4410A62CE59F514EE7DDAC7966955BFB9CE375CB787CFD4EC0032D2B1FFCDDA34BC145819A04FAAE0A571C7C28
                                            Malicious:false
                                            Preview:.... .c............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ .......................................................................... .................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):32768
                                            Entropy (8bit):0.04495055541749482
                                            Encrypted:false
                                            SSDEEP:3:G4l23LA3weClIt4l23LA3weC/llulL9//Xlvlll1lllwlvlllglbXdbllAlldl+l:G4l27PnY4l27PNlML9XXPH4l942U
                                            MD5:6C0FF3863E37AF6D3E7C8398CE70AE97
                                            SHA1:2D1F8EF9628A853B3C39B90910D7C7C6CC8029FA
                                            SHA-256:F619FA0D3EA0DF8B7E68112887DB9260AD761FE7DA706B660DF58587484130FF
                                            SHA-512:315ABFBE03417480248DC8F8A014460281BAAFF9E045451E5E811CB9C346E785828CF2991241587E5996CC97BD339730FED9B87D9D91B8F32F912100EAA61246
                                            Malicious:false
                                            Preview:..-.......................=.;...3~.GvD..#....z..-.......................=.;...3~.GvD..#....z........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:SQLite Write-Ahead Log, version 3007000
                                            Category:dropped
                                            Size (bytes):45352
                                            Entropy (8bit):0.39399130584915476
                                            Encrypted:false
                                            SSDEEP:24:Kx6Y8sUqQ3zRDB6wbxXUll7DBtDi4kZERDBcqZzqt8VtbDBtDi4kZERDBG1W1:jH6Q10wXUll7DYMNzO8VFDYM01
                                            MD5:A719FAD99AA40F41A8A3D7FEDA783985
                                            SHA1:D54703DC4F2A64A3579367CA63934BA2DB7349DE
                                            SHA-256:C1D3E39972BA7617F52DCA93C4F674CF76327D6C62C275F1BFDEF30CA0006FC0
                                            SHA-512:E005D6D41D61888F6D389DE9110EAFA0E2B4A0BDFC466D65377647B907EEFAA621FEAF00E82E84BF09343AFF5E5C980155C80B25C954695B05038921E2A3FBAC
                                            Malicious:false
                                            Preview:7....-............3~.GvDS...Oy............3~.GvD.U...Z..SQLite format 3......@ .......................................................................... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:PNG image data, 36 x 36, 8-bit/color RGBA, non-interlaced
                                            Category:dropped
                                            Size (bytes):445
                                            Entropy (8bit):7.318768335834397
                                            Encrypted:false
                                            SSDEEP:12:6v/7ci1zjW3R7hXmwyVilrbMGSWBrGPAhQgajgEa8r5o9:6yZhXmXilcGlGPRgaj4b
                                            MD5:E03518ED70845F60E54D995516FC7814
                                            SHA1:F70C7019C0989B62CC691B6CD34859D8FC506C01
                                            SHA-256:6F1AE1C2D727A21E023D4C687EDBD6FB7AA97BE003E3B17E4E6A2505F2B2B82C
                                            SHA-512:D8E73BE08FDC026BF5733C276E165AB9E93F562F99A4AFAAC46C9097CB6CE80FC45BA0FF9733391EC1A51727B1A1715394D03F6F167CFA22D8B4720D053B7E22
                                            Malicious:false
                                            Preview:.PNG........IHDR...$...$.............IDATx..?N.A......4.+..7....[.h(....9.z......... z...5..Zl....&..;..3._23..m...Y.&..|..'0..{..i8....].F.............<n=~....[B........8.d.g.*9./..#[-O.."TF.-...*..8.we.V.rm.......Qj|......g?sQ..Z.!".]]'.....X...N..G.z...(g...0..d....T.Im 5.|..J.Hle....^`.....[B.b...Q@..pI...7..|...u.@..MNl..N.3.;..{BR.q.9].Q.u.?@...&...*1.<...".j?$.1.....C.X..#vB........A...p...~.'.r...NM....IEND.B`.
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:Microsoft Word 2007+
                                            Category:dropped
                                            Size (bytes):20217
                                            Entropy (8bit):7.903242189049849
                                            Encrypted:false
                                            SSDEEP:384:Bw3x9VzRnbsLDWUXbqJVNevLyp+L6g52mRy4/FRqcMin2VPcxwvRfGAClGJr:i3x97QLiRVNIS42mRyUFRqcz+0x+BkY
                                            MD5:1D2FAE0085C665C6B966507557888DE1
                                            SHA1:C5E1802EA5B88D1A6362BFB0343D796A8AFB17BB
                                            SHA-256:5EF71D64553282C8A0A8BC5F0AC82127FEA7AA7D7AF171397C720A81FCE0A262
                                            SHA-512:15A5E40B539145F78643D9E009D34FA586FA8A56B11A8F31B0997EBC316B93EAC42BE228EDDE4CE481FCB52EAC0C71E0CB61BC9079D9D34AF578B30954FF2E5C
                                            Malicious:false
                                            Preview:PK........ ,fZ.[~.c...........[Content_Types].xml...N.0.E.%..%nY ..v.l........dO_..$..Ui...D.g.g.....d.!*gs6..,.+].l..%..=K".[..,.l..M...CLHkc......(.`D..K...#....^..Q.....t..b........K...w...*.<...)S....S.m.......@#..J..:_..`..k...MO\(.o..XDS:.......U@2.._..6^89..GN..M..+K%.<..$..D...'K.....d.t..O..S.>7r.B.[..#....(XB../....#...))z&............I...b.|..n5\.....GzV`........\...jG..%..:..PK........ ,fZ+.fW....O......._rels/.rels...J.A.._e..m..../....a&.;...L....A..Zz./.!..!..k.9YXv=.N...F.{...`.P.4.....`.Y..L.#m...e.fa.)...M..u.p..k$..X.....{.?.p.4;o.......-.<...Sv..I....d.#...\=..t.X0xYg..:|.N...T.....''.y.tC*....J._.#.y.B.+_...8...#l>.PK........ ,fZ.v1.e...........word/document.xml.].r.8.~...lv.L.>.xF...5I&.d&U.g.$!......d..}..}.y.}...C.EJ.aK.`W.$H4....&....`.H....z....y.....Q..3..0.a.#..l.....\....Q..J J.'...l...,'...ar1.<...K/<<.q..xH.`...*.*&.CIBK....&g99..5........7.$E.3...DL.#;..-...j.2)}cR..j.D......%s;JK......QD..0....<...(.(......A:.4.
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:gAWY3n:qY3n
                                            MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
                                            SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
                                            SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
                                            SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
                                            Malicious:false
                                            Preview:[ZoneTransfer]..ZoneId=3..
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
                                            Category:dropped
                                            Size (bytes):2555
                                            Entropy (8bit):7.88910627682238
                                            Encrypted:false
                                            SSDEEP:48:7Xjm4Mm5fF6Gk9uLduvH0NuAiRxbE6f6VwgIaKruai8SjFTW8KJjtz:RfF6GkUwAiXbEW6NIaSuainFTqJh
                                            MD5:6A78B0944A1DA4F3892D0F4A0163DA25
                                            SHA1:EDBEE8BAECF4D272F1B52BFA4C823DDC50E5486D
                                            SHA-256:C9903CB4027BD617227A5F968C1B48883F9FFC3C140A629C418A413A3C14991C
                                            SHA-512:1ECB84B1B369B7CF3BFA9184B527B9AB5885B1A8BE20A4AA408619D769379DC96ED56616400149381F14204C193FF359C86D7A7113089C6510A109705BF0C089
                                            Malicious:false
                                            Preview:.PNG........IHDR.............<.q.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx..q.:..mO......Ax...K..s..U.u`_.N*.]...p.y.N...$..j....1...."...B...#./.$u...,.......r.."...z..-Q...A$`y...&..@.&..%..f...&..Wy..UQ..Z._.Z.v.X.a.$L...":.]~......~..kW9H..\ [3.j....,..-.....g..N..........R..h...^&;zv.*.R..I%.....wLZ...9.%..C...e..D.9.......S...l~.J........MZ....B..)&..BG....b.@...X.^.*/.(n.@..L|......c$Nf....Y..B.0..]..j.qB!9....2@.c.e.....-.8.....L.+..zUl.^.a.e4!.r.{...[CKK....k4.3Tp}~]#...9a.L./Li.Sp...*.S..].........7......(.@.P..W..T..".WE..C..1U.1.J.R@...l.J..*.....8...<0...aH%..;.ENb.eXOU.*/.%.uR.m:.J+...s7e.B..N..A...."..M...J..K....h.>..f.........xk....C.* .R.u6.....YL...*.6D.....Y`...P..m.Zg.K,..A....i...Z.......R..k..bx.Xp..`........}H..`...S[..7..V.{.&.Z!Y.1.i.t....X....Z...\...{..G.......|...Z.X.).(..z....>..T....X+.3...B...Y.a.'.....X.._u.....0.P..I.P.......r....&.`.\;/.2..9TA..'.V.9.7...9T.G@.s..+...57xZ.T..]Z..R..CwH..RzG.`.p....1A.
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, baseline, precision 8, 100x100, components 3
                                            Category:dropped
                                            Size (bytes):1568
                                            Entropy (8bit):7.547462336040531
                                            Encrypted:false
                                            SSDEEP:24:3c1sp4Ey2Xtsxkm9Z8MxIkCUXgK0j2ok7WpHsES+6D5uhI9jud1ANfqXq:3iWU2Xt0P8MxIkCjKO2oFpMvu++1iC6
                                            MD5:365CFA50237B446D0712ECAEDAD92C95
                                            SHA1:F52D1594B7744FE05DCA6145CFC434A016763FC8
                                            SHA-256:2891638DB4785CDD1AB2EBBA696A2396C82FD8808990AC06F53322A1A795578E
                                            SHA-512:D1AFFCC261A41D605E7CEC97FBBF4A5175A880496FF643F94CA4CCD2A3EB47763EAD5D7773D0F3A42336D09CBA3229692CA7546D0CFA3CA2D68A265C2A4E4ECC
                                            Malicious:false
                                            Preview:......JFIF.....H.H.....C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((......d.d.."......................................0...........................!1A.Qa..q"R..#..3.................................+.......................!A.1..Q..Rq..................?......D@...DD....D@...DD....D@...sX....I...QC...$/-.T.......(j.5...{%...H.G...N-n.;..D.D@..kP.x4. ....@..dO{.%......T..Oh....$..eE.[U.j. .0.G.,7h$...9..r..\5.e..-.:&.......@....*...wV.\.0.'..K.g.=[=..^.....q....A.Zd.,\m....&.4........xs.g.=.2....j...`...h........sX...B......O.V.)}.vZ.o.....HD{.....\c....4.E......`g...t.....c7Q....+or.<}.e.....,...s..8..pGUw...N.F)#tw+.71.{Z.nv.$..;`....x...`...F{8......VKt_%.....$...q...F.C8...#..u..lu....OV..H?.v!..9....\.8#._Q..h.o.0.P2`=.4......../..).N.D\...^.......U.&;#;..H...i..'.....M..PhP.r.MC.^NUg.),6 ..s.....q....5..i.*...js...._6w4...~.i.k.f#...,G....|.+.O.5...
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:ASCII text, with very long lines (823), with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):5640
                                            Entropy (8bit):5.490611263064035
                                            Encrypted:false
                                            SSDEEP:96:voJhIKGQ4Q8duJMmiKGsDQ8dkfP6UI6cKGo0Q8df9mtdBKGX4Q8dslLuKGiP1Q8o:EhljW55v/q9x4eX4HNUh
                                            MD5:7116C6BCF3F0994F7EB6D660F80796D4
                                            SHA1:3C1110A2BD19840F41117C9277CA00626DA11EF9
                                            SHA-256:B0D6E7CC81694097901B9E16C1503ACF6A869CF2FC179A8121801A2891236FC3
                                            SHA-512:7BE35F10D6F8FE9F9F2AD9F9B28744A8BF4A9F8D9A1F2621E56699F6F79B2FAB2137B6905035FE7F3DCB429BBA373CEB277E20D4863BD75189E39742E0396B90
                                            Malicious:false
                                            Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..03/06/2025 15:37:53.983.WINWORD (0x19CC).0x1CC.Microsoft Word.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.GDIAssistant.RegisterCloudFontCallback","Flags":30962256044949761,"InternalSequenceNumber":21,"Time":"2025-03-06T15:37:53.983Z","Contract":"Office.System.Activity","Activity.CV":"+hut/QlmykOueHgn1GZ9pg.1.15","Activity.Duration":11,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true}...03/06/2025 15:37:54.079.WINWORD (0x19CC).0x1CC.Microsoft Word.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Performance.Boot","Flags":2814766963868161,"InternalSequenceNumber":40,"Time":"2025-03-06T15:37:54.079Z","Contract":"Office.System.Activity","Activity.CV":"+hut/QlmykOueHgn1GZ9pg.1","Activity.Duration":389485,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.ActivationKind":"Automation","Data.InitializationDuration":49261,"Data.DurationUntilMso20Initialization
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:PNG image data, 228 x 50, 8-bit/color RGBA, non-interlaced
                                            Category:dropped
                                            Size (bytes):2684
                                            Entropy (8bit):7.901894652512653
                                            Encrypted:false
                                            SSDEEP:48:B/6szm5aZYbB04l/HREz9CyaY6/8Rf78BLWlvhOmjtJBvQvxnwO:BSszm8Z4RHRG6uROLWb9RQj
                                            MD5:B4F8F0DCDA279711CB9224C2239323D4
                                            SHA1:3C1B1B68CD9D2D25FF5D7FB2C7A61271DFFBF41B
                                            SHA-256:53D92718DD6001A4EBF49D631AB9DF5B8194E6AF220790B1D8CF57164E38C6B0
                                            SHA-512:E97F783AF2EECCAFD684BDDE181C1509414997D2970405CC2AD7B9182439EF471EE6BF58253E6661A7B4491DD80523CC23C4544B0F9CF5AA0E9BFF4F20E7CA92
                                            Malicious:false
                                            Preview:.PNG........IHDR.......2.....L0w.....pHYs.................sRGB.........gAMA......a.....IDATx...n....#...C.y..R .!.So..s.J.%7..@..h..v.@.[....}....^.^.*r3Z.(.C.h3?s...q.....J.......3$.$..# ..D"..*.k...(..#..$Q........o."...{.).d.n.R.e...?.t5...._....2.+..... .....B..l...yQ*.....*..2.....e.X.}.{PG.SH....J.|..#....3D.FZ.Eh...d..............3..0......?."...x......4J.-....g..a8..9B$..e8....s.q...4JF[2....a.>.~3...6B.....D4d3*......o.....r#.....=.jK...1.?...o..YW..Hdgyx.7.[.....?x.......P.........K.fT..5Y&.%CbyS\.a.a.....6..y....._`.....r..!...G<...0......B.E...=:......#.p...6........!+..!MQ....t.....m.6RhO.:..odmu@P#....m.......]...|.ndS.PU\.]..`.f.Z...?.Ds]9....F).w....... ..W.........fW.R..J..4\.d4!.d.l..h..T.Rh/.+.z..R..5.h......-.{.n..@......V.k]..RR.H....(.+...C.MIl.\.LDG....C...k*...)..H0qM.{.._..A+.'.c.....-..WY......pG....A.. .......Y)EG.#t.....(...._..H....".....>.Zl.:..g...W_[I............@=Zh.75t.9.y\...N.e|..$....6...,9..h......3..fs.'9.
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:Microsoft OOXML
                                            Category:dropped
                                            Size (bytes):3085
                                            Entropy (8bit):4.4007554982421135
                                            Encrypted:false
                                            SSDEEP:24:9fHa9QXbq6f22WpwLszBF9uGKama6cV/1OiO5wXQTAebuVcYd/w28C+Qeirccjaw:9i9QW6szX9HmJcx1OiMwiSBdSbSid2
                                            MD5:207F6259E406B24EE4275D2C6811EF3D
                                            SHA1:29E485B8CA50412E79B837AC3243E25802C48194
                                            SHA-256:47F9D932B33A9C3D676FEEA452CDE37A36A6103798B556D545398CC88B555377
                                            SHA-512:7B6CA575170154542853C743F2A85A204CDDA4B20206190647912C6D76EF0F2596261CBD792AAD26FC9D5E2B68EF394391B872260480537277AB9BE40D67D91B
                                            Malicious:false
                                            Preview:PK..........!..!..............[Content_Types].xml ...(......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N.0...H...W.8p@.%.#.P...7.....}{6m...H...o<.W.iT{..ch.@a....7.y/.@......6pD.U{{So..I.:P..sz...2&.2.b...1.:..5=.z.6............. ..$.G..r^.Y...Fo.KR.......JQ.vh...$..y.7...j.w..&.$.v.sL$..X..,..E.#...'."Q*.?0v..(.w..^.\.Cw..O..~.......PK..........!...K............_rels/.rels ...(..............................................................................................................................
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):15872
                                            Entropy (8bit):4.033424691950628
                                            Encrypted:false
                                            SSDEEP:192:cDn3l323hpfFg6WQc3WHwcpi8rAYgMh53U9o:cDn3l323hpf7iz2AYgMhJUq
                                            MD5:94BE420D95F53A518DEA6D66AD110EA7
                                            SHA1:2FEEF8E63DA035D813F1EC6732F34418696FACB8
                                            SHA-256:0C53D80818811892B89D8D5A2E3AC4B5F9B453B218C4D6642FF53E208E9B3A1F
                                            SHA-512:EB1BD9E093D5985CE3291A1DDE84B34567749950CF2747D91F8A0CEF725BC88A01479D3B3E22B6880F549074D1E6F377214F2E2D48CC8BE308AAF6543A2D1728
                                            Malicious:false
                                            Preview:....../. ...../. ...H.y.p.e.r.o.p.t.i.c. .l.i.m.i.t.e.d. .A.C.H.D.e.p.t. .s.e.n.t. .y.o.u. .a. .d.o.c.u.m.e.n.t. .t.o. .r.e.v.i.e.w. .a.n.d. .s.i.g.n.............H.Y.P.E.R.L.I.N.K. .".h.t.t.p.s.:././.t.s.-.c.o.l.l.e.g.e...c.o.m./.?.t.=.c.H.J.l.c.3.N.A.a.H.l.w.Z.X.J.v.c.H.R.p.Y.y.5.j.b.2.0.=.". .\.t. ."._.b.l.a.n.k."...R.E.V.I.E.W. .D.O.C.U.M.E.N.T. ......................................................................................................................................................................................................................................................................^.......................................................................................8...$..$.If........!v..h.#v..!.:V........~..t.......!..6.,.....5.......2......h.2........2........4........B.........$.9D..a$.l........... ..........$.a$.l........... .......>...$..$.If........!v..h.#v...!:V........*..t.....6.,.....5.....Z(2........2......m.4........B.....`............p............
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):106496
                                            Entropy (8bit):4.542369779667214
                                            Encrypted:false
                                            SSDEEP:768:j1zfiYggdKlS2p3mq4OX9MJQtEBWKWJKUXmeumqN:Cp74OX9MJpepXhiN
                                            MD5:21E75FD95692986ED1EAED3E99F9AFD4
                                            SHA1:769C6FE0A1635F42B004C4C517513B356F504D29
                                            SHA-256:7FA47AC5C45782BE197373187F2B3B6506CFE64F583AE7214DAC973661B9DF79
                                            SHA-512:5C6AE8E1C53AF6B669EB870D36BABB312478C66D8A4BBE1F45ED05C587EC542CCDC105F3B9215A7EA1783ED76BD843921DAB664E443DB376C2F9C1439F587348
                                            Malicious:false
                                            Preview:............................................................................b...T...,.........................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1................................................................Y........................v.2._.O.U.T.L.O.O.K.:.1.2.2.c.:.7.4.7.8.0.f.0.9.2.c.1.e.4.d.b.5.8.7.7.b.c.4.8.9.9.7.8.5.9.1.c.f...C.:.\.U.s.e.r.s.\.n.o.r.d.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.5.0.3.0.6.T.1.0.3.7.3.1.0.8.9.1.-.4.6.5.2...e.t.l.............P.P.T...,.........................................................................................................................................................................................................................................................................................................
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):3584
                                            Entropy (8bit):2.5359549464249103
                                            Encrypted:false
                                            SSDEEP:24:r8fEZYeYlgbGoizZR726TPuQo6leYlgbGoizZR726TPuQogU6I:rmCipoiNR4QonipoiNR4QogU
                                            MD5:A6C2AE3E7708028CF4C07626E92286B1
                                            SHA1:37EFF3D14335138BB6A7D9E3D0B99883A070A3E9
                                            SHA-256:32C6BA398C332771B1263CB9D98839ABCC4D589CDDF184C83FA1415AE7BF1E1D
                                            SHA-512:56B27ED4EC950A5DBAE19460F7A0E2E7F2B49DC7CAE61E6C5377E2EAF7A6516825C5173AA1154985FB697836E0E37967CB45C8DD4FD62FD7C156F7639FB62404
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                            File Type:Microsoft Outlook email folder (>=2003)
                                            Category:dropped
                                            Size (bytes):271360
                                            Entropy (8bit):3.723129353905997
                                            Encrypted:false
                                            SSDEEP:1536:xEThubEKLQtArqUscrWKw9rYuKr4QCMeyB84YDOnWWsZpLo+Noz2Q10PMBCM4W5v:xwuEK2fnK80nBLco+yLap9kLDQp9
                                            MD5:B42ED24A7A22E2BACBE0BD8B2C0E5063
                                            SHA1:7F9B24700BFDF5BA58FEBD7B8066E43E00BAE9C7
                                            SHA-256:075D4F3FF2DFD3297388CC085B2337FA9AA097F279F5C2BB97C04F8FE02A27BA
                                            SHA-512:6C093F24DF4C0BB9C7C1005C1A91401C7126ACAAEFB3C543F11C1EF1786E3070ED5DD9B42E668AE9E2D85979888BD084EFDAE080FDC48A2678287E75206A38C7
                                            Malicious:true
                                            Preview:!BDN.{".SM......\...V...........D.......b................@...........@...@...................................@...........................................................................$.......D......................?...............B........x..................................................................................................................................................................................................................................................................................X.......X...*.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):131072
                                            Entropy (8bit):4.361371115028062
                                            Encrypted:false
                                            SSDEEP:1536:/W53jEpEHP4qQ10PAwr1+DOwVD9FYqrqUVcrWKw9zhPo+N0D4HhW53jEpEHP4qQq:Bp9kkY0nK8zhPo+1vp9
                                            MD5:D91A543E5DC524CD98AEE21592ED07B5
                                            SHA1:320415062A3E9A433CF5506A7360A34ABE024025
                                            SHA-256:E53145D73B08F3C194F7A8EC15725A1C2C73ACA23F3B015222DCF883D6702741
                                            SHA-512:57E44AC3D2E2378C4D0D7A04010CB1A12409BE3920CE954E8D5E66BFBB1C081848E278787145BD2DEA76A7D3712EE4CCFF4922F737DD482A40594463C6C7432A
                                            Malicious:true
                                            Preview:z.h.0...z.......,...............D............#..._..........................................................~.......................................................................................................................................................................................................................................................................................................................................................................................................................................................Cf*.D.......y..0...{.......,...............B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:Unicode text, UTF-8 (with BOM) text, with very long lines (371), with CRLF line terminators
                                            Entropy (8bit):6.142426243472995
                                            TrID:
                                            • Text - UTF-8 encoded (3003/1) 100.00%
                                            File name:Message.eml
                                            File size:52'532 bytes
                                            MD5:ab57f01a63d58d11bbd37e6217497e17
                                            SHA1:a567b842844d9164854049bea717a926be5bedba
                                            SHA256:8a8ccc89ac5fd4edfeab446c654b9930cb4bd7222b2c436469f29c462ffcf537
                                            SHA512:cded2a8e1e2e30f33cfa4f99f30fabfce78ac374f5d8f5444710e15f71f9fcd8b5542257cd6853bcce5bbc13f3430f86e84dcae67156e552fcc8759c7eb2c300
                                            SSDEEP:1536:wqCLF3w7nrsuIwQei0NPSDlmP/8hdQjn+gwBM2a:wqoF0KJmP/adQjvWMZ
                                            TLSH:5233B03314D63998F9A078C48E6AFE076E32074B75B3D682176DC541D9588871FB287B
                                            File Content Preview:..."Received: from PA4PR07MB8839.eurprd07.prod.outlook.com (2603:10a6:102:268::17).. by PR1PR07MB5756.eurprd07.prod.outlook.com with HTTPS; Thu, 6 Mar 2025.. 13:34:12 +0000..ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;.. b=sN
                                            Subject:EFT Pay Advice - Adviser 15(c) Request1.06.25 Hyperoptic limited Final.docx, Data Protection (Ref No: 172089VpaFM3x0mpzDrdhyky1uF6lyRhkm0YdFJdYjctVFWi6Q2G4JV) ...
                                            From:Press <service.comptabilite@altraconsulting.fr>
                                            To:press@hyperoptic.com
                                            Cc:
                                            BCC:
                                            Date:Thu, 06 Mar 2025 13:33:03 +0000
                                            Communications:
                                            • Note: This email originated from outside Hyperoptic so please remember to only click on links or open attachments if you recognise the sender and know the content is safe. This email transmission and any documents, files or previous email messages attached to it may contain information that is confidential or legally privileged. If you are not the intended recipient or a person responsible for delivering this transmission to the intended recipient, you are hereby notified that you must not read this transmission and that any disclosure, copying, printing, distribution or use of this transmission is strictly prohibited. If you have received this transmission in error, please immediately notify the sender by telephone or return email and delete the original transmission and its attachments without reading or saving in any manner. ** A message from the Arcutis IT Help Desk ** Hi Mary Jo, Thank you for reaching out to Arcutis IT Help Desk. Your request is important to us. If your ticket was submitted during help desk hours (M-F: 5am 6pm PST), an update will be provided within 1 business day. For urgent attention, please call our dedicated support line at 800-376-8106. Please note that you may also receive a call from this number while your request is open. Rest assured, we'll work diligently to resolve your issue. Expect a response within one business day for non-urgent requests. To view updates regarding this ticket, please click on this link and then click on the "My tickets" link to view all of your open tickets. Thank you for your cooperation. Best regards, The Arcutis IT Help Desk CONTACT INFO: Email: ithelp@arcutis.com Call: 1-800-376-8106 Here is a summary of your request... Subject: Setting up new phone Message Body: 847 830 0275 Mary is looking to get a new phone and wants to know the process of transferring and getting all her apps on the new one. Note: This email originated from outside Hyperoptic so please remember to only click on links or open attachments if you recognise the sender and know the content is safe. This email transmission and any documents, files or previous email messages attached to it may contain information that is confidential or legally privileged. If you are not the intended recipient or a person responsible for delivering this transmission to the intended recipient, you are hereby notified that you must not read this transmission and that any disclosure, copying, printing, distribution or use of this transmission is strictly prohibited. If you have received this transmission in error, please immediately notify the sender by telephone or return email and delete the original transmission and its attachments without reading or saving in any manner. ** A message from the Arcutis IT Help Desk ** Hi Mary Jo, Thank you for reaching out to Arcutis IT Help Desk. Your request is important to us. If your ticket was submitted during help desk hours (M-F: 5am 6pm PST), an update will be provided within 1 business day. For urgent attention, please call our dedicated support line at 800-376-8106. Please note that you may also receive a call from this number while your request is open. Rest assured, we'll work diligently to resolve your issue. Expect a response within one business day for non-urgent requests. To view updates regarding this ticket, please click on this link and then click on the "My tickets" link to view all of your open tickets. Thank you for your cooperation. Best regards, The Arcutis IT Help Desk CONTACT INFO: Email: ithelp@arcutis.com Call: 1-800-376-8106 Here is a summary of your request... Subject: Setting up new phone Message Body: 847 830 0275 Mary is looking to get a new phone and wants to know the process of transferring and getting all her apps on the new one. Note: This email originated from outside Hyperoptic so please remember to only click on links or open attachments if you recognise the sender and know the content is safe. Note: This email originated from outside Hyperoptic so please remember to only click on links or open attachments if you recognise the sender and know the content is safe. Note: This email originated from outside Hyperoptic so please remember to only click on links or open attachments if you recognise the sender and know the content is safe. Note: This email originated from outside Hyperoptic so please remember to only click on links or open attachments if you recognise the sender and know the content is safe. Note: This email originated from outside Hyperoptic so please remember to only click on links or open attachments if you recognise the sender and know the content is safe. Note: Note: This email originated from outside Hyperoptic so please remember to only click on links or open attachments if you recognise the sender and know the content is safe. This email transmission and any documents, files or previous email messages attached to it may contain information that is confidential or legally privileged. If you are not the intended recipient or a person responsible for delivering this transmission to the intended recipient, you are hereby notified that you must not read this transmission and that any disclosure, copying, printing, distribution or use of this transmission is strictly prohibited. If you have received this transmission in error, please immediately notify the sender by telephone or return email and delete the original transmission and its attachments without reading or saving in any manner. ** A message from the Arcutis IT Help Desk ** Hi Mary Jo, Thank you for reaching out to Arcutis IT Help Desk. Your request is important to us. If your ticket was submitted during help desk hours (M-F: 5am 6pm PST), an update will be provided within 1 business day. For urgent attention, please call our dedicated support line at 800-376-8106. Please note that you may also receive a call from this number while your request is open. Rest assured, we'll work diligently to resolve your issue. Expect a response within one business day for non-urgent requests. To view updates regarding this ticket, please click on this link and then click on the "My tickets" link to view all of your open tickets. Thank you for your cooperation. Best regards, The Arcutis IT Help Desk CONTACT INFO: Email: ithelp@arcutis.com Call: 1-800-376-8106 Here is a summary of your request... Subject: Setting up new phone Message Body: 847 830 0275 Mary is looking to get a new phone and wants to know the process of transferring and getting all her apps on the new one. This email transmission and any documents, files or previous email messages attached to it may contain information that is confidential or legally privileged. If you are not the intended recipient or a person responsible for delivering this transmission to the intended recipient, you are hereby notified that you must not read this transmission and that any disclosure, copying, printing, distribution or use of this transmission is strictly prohibited. If you have received this transmission in error, please immediately notify the sender by telephone or return email and delete the original transmission and its attachments without reading or saving in any manner. This email transmission and any documents, files or previous email messages attached to it may contain information that is confidential or legally privileged. If you are not the intended recipient or a person responsible for delivering this transmission to the intended recipient, you are hereby notified that you must not read this transmission and that any disclosure, copying, printing, distribution or use of this transmission is strictly prohibited. If you have received this transmission in error, please immediately notify the sender by telephone or return email and delete the original transmission and its attachments without reading or saving in any manner. ** A message from the Arcutis IT Help Desk ** Hi Mary Jo, Thank you for reaching out to Arcutis IT Help Desk. Your request is important to us. If your ticket was submitted during help desk hours (M-F: 5am 6pm PST), an update will be provided within 1 business day. For urgent attention, please call our dedicated support line at 800-376-8106. Please note that you may also receive a call from this number while your request is open. Rest assured, we'll work diligently to resolve your issue. Expect a response within one business day for non-urgent requests. To view updates regarding this ticket, please click on this link and then click on the "My tickets" link to view all of your open tickets. Thank you for your cooperation. Best regards, The Arcutis IT Help Desk CONTACT INFO: Email: ithelp@arcutis.com Call: 1-800-376-8106 Here is a summary of your request... Subject: Setting up new phone Message Body: 847 830 0275 Mary is looking to get a new phone and wants to know the process of transferring and getting all her apps on the new one. ** A message from the Arcutis IT Help Desk ** ** A message from the Arcutis IT Help Desk ** Hi Mary Jo, Thank you for reaching out to Arcutis IT Help Desk. Your request is important to us. If your ticket was submitted during help desk hours (M-F: 5am 6pm PST), an update will be provided within 1 business day. For urgent attention, please call our dedicated support line at 800-376-8106. Please note that you may also receive a call from this number while your request is open. Rest assured, we'll work diligently to resolve your issue. Expect a response within one business day for non-urgent requests. To view updates regarding this ticket, please click on this link and then click on the "My tickets" link to view all of your open tickets. Thank you for your cooperation. Best regards, The Arcutis IT Help Desk CONTACT INFO: Email: ithelp@arcutis.com Call: 1-800-376-8106 Here is a summary of your request... Subject: Setting up new phone Message Body: 847 830 0275 Mary is looking to get a new phone and wants to know the process of transferring and getting all her apps on the new one. Hi Mary Jo, Thank you for reaching out to Arcutis IT Help Desk. Your request is important to us. If your ticket was submitted during help desk hours (M-F: 5am 6pm PST), an update will be provided within 1 business day. For urgent attention, please call our dedicated support line at 800-376-8106. Please note that you may also receive a call from this number while your request is open. Rest assured, we'll work diligently to resolve your issue. Expect a response within one business day for non-urgent requests. To view updates regarding this ticket, please click on this link and then click on the "My tickets" link to view all of your open tickets. link https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fyashinmsp.service-now.com%2Flogin_locate_sso.do&data=05%7C02%7Cpress%40hyperoptic.com%7C879947a04c4543c2ac3b08dd5cb36ef5%7Cdf58f80712094a959c55f71b3c95667b%7C0%7C0%7C638768648522498543%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C40000%7C%7C%7C&sdata=c%2FpW7FiKSzlRJ9n6j4C6PDD6gMYkrJZFmcWJdTXtW24%3D&reserved=0 Thank you for your cooperation. Best regards, The Arcutis IT Help Desk CONTACT INFO: Email: ithelp@arcutis.com Call: 1-800-376-8106 ithelp@arcutis.com mailto:ithelp@arcutis.com Here is a summary of your request... Here is a summary of your request... Subject: Setting up new phone Subject: Message Body: 847 830 0275 Message Body: Mary is looking to get a new phone and wants to know the process of transferring and getting all her apps on the new one.
                                            Attachments:
                                            • Hyperoptic limited Reference Number(s):FLD9396400164 (SOP 00876) Note(s).docx
                                            Key Value
                                            "Receivedfrom PA4PR07MB8839.eurprd07.prod.outlook.com (2603:10a6:102:268::17) by PR1PR07MB5756.eurprd07.prod.outlook.com with HTTPS; Thu, 6 Mar 2025 13:34:12 +0000
                                            ARC-Seali=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=EgMx8CN57rHkh5KGtD1RZ2h/uFH/AOo8eJ9ZkmgGWZ8FFeVCb6Rhh8LvQFfApqQMr0dqs6IizUm0DiE4RNclNpaNd2uTl7fqmYTlzfeX/gUFMeUVpuFAnKXGzfKhsSLA3CsEfDGRzrP6qA2ZD4fl3ObR0gaKsNY2giL8TaeLDkfogaFLPy/hAgHCqgjCGYqAlaJkISHC4D/h70bIIo97FV+Ylkaotpk1gyils3c4QCtXZ9fTp1Fsal35O8KXhlklkpfVWgvWmo3nFq3BpMnEobA/h9j6jW0rcY8E7Hl+mcUpKTgBUugzm7YNQscVB87z8Tycn7Bft48maeW3aY7cUg==
                                            ARC-Message-Signaturei=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=h42QuDE6jcaGh0TF2+RXuDqRY+8Mz6bfchOA1/DaKyc=; b=bOzAVJVOxJlKJFedcQP+nT5xX1nKKL82XpiRwpdStsLL/5UIeClwwKU3nLxffWqu5sQuOjuLnW+hG4iA6CgNEiM7mkVneruiIpOby2e77TxjyWQHr0qUeujowiK/2z82Zag8pTSgkpLhzwU50piT7QR9sWeyh1MtkPXdRYZbh+LLHMQjqHyFBO9XZQjy25fg5jBOMGSEXyOW7BLko58HzpGVFfvvnpw9hAVTO8YPRhpfaNnef3ZX1F+9YvNNY9QgHaxlaaKH/Per6kJ5jGJzrjQChZNmeV0WvLELupqN6sytu6J49m18mCJS7GK/5fErARAjVeXlaUitHAVnaw4sgQ==
                                            ARC-Authentication-Resultsi=1; mx.microsoft.com 1; spf=softfail (sender ip is 45.150.34.178) smtp.rcpttodomain=hyperoptic.com smtp.mailfrom=altraconsulting.fr; dmarc=none action=none header.from=altraconsulting.fr; dkim=none (message not signed); arc=none (0)
                                            Receivedfrom [45.150.34.178] (45.150.34.178) by PA1PEPF000CC3FA.mail.protection.outlook.com (10.167.242.5) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8511.15 via Frontend Transport; Thu, 6 Mar 2025 13:33:03 +0000
                                            Authentication-Resultsspf=pass (sender IP is 2a01:111:f403:2613::61b) smtp.mailfrom=altraconsulting.fr; dkim=pass (signature was verified) header.d=altraconsultingcrm.onmicrosoft.com;dmarc=bestguesspass action=none header.from=altraconsulting.fr;compauth=pass reason=109
                                            Received-SPFSoftFail (protection.outlook.com: domain of transitioning altraconsulting.fr discourages use of 45.150.34.178 as permitted sender)
                                            DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=altraconsultingcrm.onmicrosoft.com; s=selector2-altraconsultingcrm-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=h42QuDE6jcaGh0TF2+RXuDqRY+8Mz6bfchOA1/DaKyc=; b=T+ctaDgwpMNt5LibfQWgtdkTCv+mp+VcI8JrjmDc3B1DyauTNoodZeWbDDSeWWkiZmrx8HKgUNHGpBJsx/16nLgfsLvWnQDth0NYs1CzV3zttFan+sjTV6EhEkX/MCZcWkcnEf8cF/bLgmfCEPJkRXPT5+blHNs2/1TQmepo8m8=
                                            X-MS-Exchange-Authentication-Resultsspf=softfail (sender IP is 45.150.34.178) smtp.mailfrom=altraconsulting.fr; dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=altraconsulting.fr;
                                            SubjectEFT Pay Advice - Adviser 15(c) Request1.06.25 Hyperoptic limited Final.docx, Data Protection (Ref No: 172089VpaFM3x0mpzDrdhyky1uF6lyRhkm0YdFJdYjctVFWi6Q2G4JV) ...
                                            FromPress <service.comptabilite@altraconsulting.fr>
                                            Topress@hyperoptic.com
                                            Message-Id<174126798066.11516.15010442714776003154@altraconsulting.fr>
                                            Content-Typemultipart/mixed; boundary="Boundary_(ID_AEn0eu3CFLW3xmJOyaZALh)"
                                            Return-Pathservice.comptabilite@altraconsulting.fr
                                            DateThu, 06 Mar 2025 13:33:03 +0000
                                            X-EOPAttributedMessage1
                                            X-MS-TrafficTypeDiagnosticPA1PEPF000CC3FA:EE_|AS4PR10MB6085:EE_|DB5PEPF00014B97:EE_|PA4PR07MB8839:EE_|PR1PR07MB5756:EE_
                                            X-MS-Office365-Filtering-Correlation-Id879947a0-4c45-43c2-ac3b-08dd5cb36ef5
                                            X-MS-Exchange-SenderADCheck1
                                            X-MS-Exchange-AntiSpam-Relay0
                                            X-Microsoft-Antispam-UntrustedBCL:0;ARA:13230040|82310400026|376014|36860700013|1800799024|4076899003|8096899003|4053099003|15072699012;
                                            X-Microsoft-Antispam-Message-Info-OriginalkZ1C6qjqYLFLftC78sYUA9U7h9jhQJgiht9wlPd81xJm7VOk/RDkXIUAwFVE8DgP9oYDWZTHWR7hkiyWYKdyF2vDOvImZpckGsezjLO0FfRayypVrGggcJzBFMCcovNfVe228T8efo27Q4uba1MzPzOrrlykd4qUqvZjMHpo+sasCrG9uzyWwFqiK6sCBB5kMndfhd3x/eLyg20g0cNXJ+zvO/TFfBinScm1Es2KVBJrZA9zocpXWY+eraS6L6wrrkrwuv0fBsUcPS5Y9UL4YHeiQV5z+QEoxJRXAHmJpbGz0cDgSfM7lwyadnIY40rUsGcqi37lCK/DerjPWIKqJ+XIe0eAGDf/+wN+DrRU/otWTlreYs9A3CoHCGk/asxjwlkJEFGAws054jVhs9DynevQ4k/3qpVKBd2tpzk6DBoNVHvA3PkIbe1Ue1nagd03j8eohzGJHKcdfU/eSjMGfljsEGG1rbpt/Bh7PVpV47NyA6Rel/Ot0uZydwVFudYMCQIbD68R3QsXPvbRS8KJFM+5C+0NRqa1t6u0WkAtR2o87qQdZlxDUtVdXGyN0qpeW0XXlZvN1or01pRZ03peKUeUH5+vj8HVsZpwJy6kcFTgcwNEjQIh3LQzV4QcJWETnnkA+sqJnF8WPMfZyHLytLtM+FUpK1H8R6ynUYooHI6x1D/coWeBiBUa2agJ6gYPtVFRENFEP9yNq8EvKbLfeIrwlwuwD4wfANhbP3J7TioU0PBRJhn0wCv9uRhC7uCvEvzqqdK6OK40LOWRYzPL4x63A4J1NMLcPNQ5sGPUN0u6SDfTijILQmY/p3KQD5P0ZU2LGRGzJwXqf9CikOTqEsEuiB1yUdZ3/PeYDBOCkxxkwqyKOaRwEtjBXCx9ggrBmtrWPUtKYmptzdAVlk2rdwfoOCgC7A9kDZoWPuNfQXOh5qWWVzNzVl2jwXlMAiotxYSd1GN882WXDWb00uk7xjLZzUNBlR4rWyqN6tQdLrB9tQSNXo9sXnymJj6u8HLuwpyP4gGriODF+WF6a4iofbOLQAEUBTLGSHemDuVhJYqZ4muv26cnix1UKSBf53FV3T2Nkov8pLYie8URSNY1UXV2xwahjFsNdaIUsDpz5yQR6J1NnV2mh+yOzS54pn16/6YmwvnDNOIl7fym38IqEWHW1siVN1jA5OGTR1eIopkZzcJG4BP11bJ5opjupB31bvFzOYSJpr8wrm9kILm/vsXPTR14kUqakmvgVj4Dhr5P6P5QI+qMxZKKFE5Q9CmaRPP1z9OyE9FqtAQk6RikMnAyvvswGYD7+Bv+y+KL+5i+CtdGdyfkaTFFaBB7btWffEVAApZMUO0oDBrOGooZw9rZT/rWmpwHD7ZTDsMKTErkgJA+4bWxi0y3DvOSPQ3dtO3hM5SQa1QCS2LKPtrJoQ==
                                            X-Forefront-Antispam-Report-UntrustedCIP:45.150.34.178;CTRY:NL;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:[45.150.34.178];PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(376014)(36860700013)(1800799024)(4076899003)(8096899003)(4053099003)(15072699012);DIR:OUT;SFP:1101;
                                            X-MS-Exchange-Transport-CrossTenantHeadersStampedPA4PR07MB8839
                                            X-MS-Exchange-Organization-ExpirationStartTime06 Mar 2025 13:33:08.6974 (UTC)
                                            X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                                            X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                                            X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                                            X-MS-Exchange-Organization-Network-Message-Id879947a0-4c45-43c2-ac3b-08dd5cb36ef5
                                            X-EOPTenantAttributedMessagedf58f807-1209-4a95-9c55-f71b3c95667b:0
                                            X-MS-Exchange-Organization-MessageDirectionalityIncoming
                                            X-MS-Exchange-Transport-CrossTenantHeadersStrippedDB5PEPF00014B97.eurprd02.prod.outlook.com
                                            X-MS-Exchange-Transport-CrossTenantHeadersPromotedDB5PEPF00014B97.eurprd02.prod.outlook.com
                                            X-MS-PublicTrafficTypeEmail
                                            X-MS-Exchange-Organization-AuthSourceDB5PEPF00014B97.eurprd02.prod.outlook.com
                                            X-MS-Exchange-Organization-AuthAsAnonymous
                                            X-MS-Office365-Filtering-Correlation-Id-Prvsa9f306c5-6753-48db-86bc-08dd5cb36bf8
                                            X-MS-Exchange-AtpMessagePropertiesSA|SL
                                            X-MS-Exchange-Organization-SCL1
                                            X-Microsoft-AntispamBCL:0;ARA:13230040|5062899012|4073199012|5073199012|3072899012|2092899012|12012899012|35042699022|4076899003|8096899003|4053099003|15072699012;
                                            X-Forefront-Antispam-ReportCIP:2a01:111:f403:2613::61b;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:EUR05-VI1-obe.outbound.protection.outlook.com;PTR:mail-vi1eur05on2061b.outbound.protection.outlook.com;CAT:NONE;SFS:(13230040)(5062899012)(4073199012)(5073199012)(3072899012)(2092899012)(12012899012)(35042699022)(4076899003)(8096899003)(4053099003)(15072699012);DIR:INB;
                                            X-MS-Exchange-CrossTenant-OriginalArrivalTime06 Mar 2025 13:33:08.5567 (UTC)
                                            X-MS-Exchange-CrossTenant-Network-Message-Id879947a0-4c45-43c2-ac3b-08dd5cb36ef5
                                            X-MS-Exchange-CrossTenant-Iddf58f807-1209-4a95-9c55-f71b3c95667b
                                            X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIpTenantId=366d2fa7-6e70-4bbf-8f0a-17e774b37952;Ip=[45.150.34.178];Helo=[[45.150.34.178]]
                                            X-MS-Exchange-CrossTenant-AuthSourceDB5PEPF00014B97.eurprd02.prod.outlook.com
                                            X-MS-Exchange-CrossTenant-AuthAsAnonymous
                                            X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                                            X-MS-Exchange-Transport-EndToEndLatency00:01:03.4572792
                                            X-MS-Exchange-Processed-By-BccFoldering15.20.8489.024
                                            X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(4955320)(4710117)(4712020)(920097)(930097)(140003)(1420198);
                                            X-Microsoft-Antispam-Message-Info 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
                                            MIME-Version1.0

                                            Icon Hash:46070c0a8e0c67d6
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2025-03-06T16:37:57.822106+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.184982752.123.130.14443TCP
                                            2025-03-06T16:38:18.328030+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.184984752.123.130.14443TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 6, 2025 16:37:27.909377098 CET4975280192.168.2.18199.232.210.172
                                            Mar 6, 2025 16:37:27.909399986 CET4976180192.168.2.18199.232.210.172
                                            Mar 6, 2025 16:37:40.247749090 CET4982480192.168.2.18142.250.184.195
                                            Mar 6, 2025 16:37:40.252836943 CET8049824142.250.184.195192.168.2.18
                                            Mar 6, 2025 16:37:40.252935886 CET4982480192.168.2.18142.250.184.195
                                            Mar 6, 2025 16:37:40.252988100 CET4982480192.168.2.18142.250.184.195
                                            Mar 6, 2025 16:37:40.258044004 CET8049824142.250.184.195192.168.2.18
                                            Mar 6, 2025 16:37:40.902110100 CET8049824142.250.184.195192.168.2.18
                                            Mar 6, 2025 16:37:40.907598019 CET4982480192.168.2.18142.250.184.195
                                            Mar 6, 2025 16:37:40.912712097 CET8049824142.250.184.195192.168.2.18
                                            Mar 6, 2025 16:37:41.094713926 CET8049824142.250.184.195192.168.2.18
                                            Mar 6, 2025 16:37:41.146365881 CET4982480192.168.2.18142.250.184.195
                                            Mar 6, 2025 16:37:42.245578051 CET49826443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:42.245651007 CET4434982652.149.20.212192.168.2.18
                                            Mar 6, 2025 16:37:42.245759010 CET49826443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:42.247656107 CET49826443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:42.247677088 CET4434982652.149.20.212192.168.2.18
                                            Mar 6, 2025 16:37:49.682418108 CET49827443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:37:49.682457924 CET4434982752.123.130.14192.168.2.18
                                            Mar 6, 2025 16:37:49.682574034 CET49827443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:37:49.682888985 CET49827443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:37:49.682904005 CET4434982752.123.130.14192.168.2.18
                                            Mar 6, 2025 16:37:49.861175060 CET49828443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:37:49.861227989 CET4434982820.190.159.23192.168.2.18
                                            Mar 6, 2025 16:37:49.861332893 CET49828443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:37:49.861644030 CET49828443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:37:49.861658096 CET4434982820.190.159.23192.168.2.18
                                            Mar 6, 2025 16:37:50.388787985 CET4434982652.149.20.212192.168.2.18
                                            Mar 6, 2025 16:37:50.388922930 CET49826443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:50.389003038 CET49826443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:50.389022112 CET4434982652.149.20.212192.168.2.18
                                            Mar 6, 2025 16:37:50.394994020 CET49829443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:50.395025015 CET4434982952.149.20.212192.168.2.18
                                            Mar 6, 2025 16:37:50.395101070 CET49829443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:50.395499945 CET49829443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:50.395513058 CET4434982952.149.20.212192.168.2.18
                                            Mar 6, 2025 16:37:57.822019100 CET4434982752.123.130.14192.168.2.18
                                            Mar 6, 2025 16:37:57.822105885 CET49827443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:37:57.822180986 CET49827443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:37:57.822197914 CET4434982752.123.130.14192.168.2.18
                                            Mar 6, 2025 16:37:57.823038101 CET49835443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:37:57.823065996 CET4434983552.123.130.14192.168.2.18
                                            Mar 6, 2025 16:37:57.823756933 CET49835443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:37:57.823756933 CET49835443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:37:57.823792934 CET4434983552.123.130.14192.168.2.18
                                            Mar 6, 2025 16:37:58.045416117 CET4434982820.190.159.23192.168.2.18
                                            Mar 6, 2025 16:37:58.045530081 CET49828443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:37:58.045588970 CET49828443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:37:58.045608997 CET4434982820.190.159.23192.168.2.18
                                            Mar 6, 2025 16:37:58.070924044 CET49836443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:37:58.070981026 CET4434983620.190.159.23192.168.2.18
                                            Mar 6, 2025 16:37:58.071075916 CET49836443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:37:58.071604967 CET49836443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:37:58.071620941 CET4434983620.190.159.23192.168.2.18
                                            Mar 6, 2025 16:37:58.621505022 CET4434982952.149.20.212192.168.2.18
                                            Mar 6, 2025 16:37:58.621613979 CET49829443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:58.621758938 CET49829443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:58.621777058 CET4434982952.149.20.212192.168.2.18
                                            Mar 6, 2025 16:37:58.660082102 CET49837443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:58.660123110 CET4434983752.149.20.212192.168.2.18
                                            Mar 6, 2025 16:37:58.660213947 CET49837443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:58.660768032 CET49837443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:37:58.660788059 CET4434983752.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:06.045067072 CET4434983552.123.130.14192.168.2.18
                                            Mar 6, 2025 16:38:06.045152903 CET49835443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:38:06.045245886 CET49835443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:38:06.045263052 CET4434983552.123.130.14192.168.2.18
                                            Mar 6, 2025 16:38:06.254200935 CET4434983620.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:06.254319906 CET49836443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:06.254319906 CET49836443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:06.254755974 CET49843443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:06.254793882 CET4434984320.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:06.254872084 CET49843443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:06.256915092 CET49843443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:06.256958008 CET4434984320.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:06.257004976 CET49843443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:06.268064022 CET49844443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:06.268105984 CET4434984420.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:06.268186092 CET49844443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:06.268474102 CET49844443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:06.268485069 CET4434984420.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:06.558429956 CET49836443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:06.558460951 CET4434983620.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:06.814301014 CET4434983752.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:06.814424038 CET49837443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:06.814944029 CET49837443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:06.814965963 CET4434983752.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:06.837630987 CET49845443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:06.837682962 CET4434984552.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:06.837793112 CET49845443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:06.838195086 CET49845443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:06.838212967 CET4434984552.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:10.035017967 CET49847443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:38:10.035067081 CET4434984752.123.130.14192.168.2.18
                                            Mar 6, 2025 16:38:10.035166979 CET49847443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:38:10.035550117 CET49847443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:38:10.035564899 CET4434984752.123.130.14192.168.2.18
                                            Mar 6, 2025 16:38:14.524640083 CET4434984420.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:14.524696112 CET49844443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:14.560698986 CET49844443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:14.560720921 CET4434984420.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:14.560985088 CET49851443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:14.561033010 CET4434985120.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:14.561104059 CET49851443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:14.565239906 CET49851443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:14.565257072 CET4434985120.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:14.586986065 CET49856443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:14.587030888 CET44349856213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:14.587088108 CET49856443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:14.587502956 CET49856443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:14.587512970 CET44349856213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:15.126266956 CET4434984552.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:15.126435995 CET49845443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:15.126562119 CET49845443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:15.126574993 CET4434984552.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:15.179441929 CET49860443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:15.179486036 CET4434986052.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:15.179594040 CET49860443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:15.180038929 CET49860443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:15.180049896 CET4434986052.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:15.214611053 CET49856443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:15.215192080 CET49861443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:15.215234041 CET44349861213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:15.215313911 CET49861443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:15.215950966 CET49861443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:15.215964079 CET44349861213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:15.256330967 CET44349856213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:18.211539030 CET49819443192.168.2.1840.115.3.253
                                            Mar 6, 2025 16:38:18.216675043 CET4434981940.115.3.253192.168.2.18
                                            Mar 6, 2025 16:38:18.327861071 CET4434984752.123.130.14192.168.2.18
                                            Mar 6, 2025 16:38:18.328030109 CET49847443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:38:18.328094959 CET49847443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:38:18.328110933 CET4434984752.123.130.14192.168.2.18
                                            Mar 6, 2025 16:38:18.328779936 CET49866443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:38:18.328818083 CET4434986652.123.130.14192.168.2.18
                                            Mar 6, 2025 16:38:18.328900099 CET49866443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:38:18.329435110 CET49866443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:38:18.329448938 CET4434986652.123.130.14192.168.2.18
                                            Mar 6, 2025 16:38:18.385803938 CET4434981940.115.3.253192.168.2.18
                                            Mar 6, 2025 16:38:18.433506012 CET49819443192.168.2.1840.115.3.253
                                            Mar 6, 2025 16:38:18.891912937 CET44349856213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:18.892049074 CET49856443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:19.281066895 CET49868443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:38:19.281109095 CET44349868216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:38:19.281181097 CET49868443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:38:19.281687975 CET49868443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:38:19.281698942 CET44349868216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:38:22.752537966 CET4434985120.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:22.752655029 CET49851443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:22.752696991 CET49851443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:22.752716064 CET4434985120.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:22.755172014 CET49870443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:22.755218983 CET4434987020.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:22.755512953 CET49870443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:22.755512953 CET49870443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:22.755760908 CET4434987020.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:22.756331921 CET49870443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:22.763073921 CET49871443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:22.763117075 CET4434987120.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:22.763197899 CET49871443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:22.763415098 CET49871443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:22.763430119 CET4434987120.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:23.330466032 CET4434986052.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:23.330539942 CET49860443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:23.330634117 CET49860443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:23.330657959 CET4434986052.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:23.333041906 CET49872443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:23.333085060 CET4434987252.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:23.333159924 CET49872443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:23.333523035 CET49872443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:23.333535910 CET4434987252.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:23.579349995 CET44349861213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:23.579514027 CET49861443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:23.579732895 CET49861443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:23.579754114 CET44349861213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:23.580333948 CET49874443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:23.580382109 CET44349874213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:23.580504894 CET49874443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:23.580998898 CET49874443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:23.581012011 CET44349874213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:26.466506958 CET4434986652.123.130.14192.168.2.18
                                            Mar 6, 2025 16:38:26.466665983 CET49866443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:38:26.466783047 CET49866443192.168.2.1852.123.130.14
                                            Mar 6, 2025 16:38:26.466801882 CET4434986652.123.130.14192.168.2.18
                                            Mar 6, 2025 16:38:27.649239063 CET44349868216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:38:27.649451971 CET49868443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:38:27.649655104 CET49868443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:38:27.649672985 CET44349868216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:38:27.650015116 CET49878443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:38:27.650062084 CET44349878216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:38:27.650150061 CET49878443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:38:27.650599957 CET49878443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:38:27.650615931 CET44349878216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:38:28.623017073 CET49811443192.168.2.1840.126.31.129
                                            Mar 6, 2025 16:38:28.623019934 CET4981480192.168.2.182.17.190.73
                                            Mar 6, 2025 16:38:28.623279095 CET4981280192.168.2.18199.232.214.172
                                            Mar 6, 2025 16:38:28.628345013 CET80498142.17.190.73192.168.2.18
                                            Mar 6, 2025 16:38:28.628449917 CET4981480192.168.2.182.17.190.73
                                            Mar 6, 2025 16:38:28.628771067 CET4434981140.126.31.129192.168.2.18
                                            Mar 6, 2025 16:38:28.628787041 CET8049812199.232.214.172192.168.2.18
                                            Mar 6, 2025 16:38:28.628824949 CET49811443192.168.2.1840.126.31.129
                                            Mar 6, 2025 16:38:28.628998995 CET4981280192.168.2.18199.232.214.172
                                            Mar 6, 2025 16:38:30.985908985 CET4434987120.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:30.985991955 CET49871443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:30.986041069 CET49871443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:30.986063004 CET4434987120.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:30.987704992 CET49880443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:30.987754107 CET4434988020.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:30.987848043 CET49880443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:30.988240004 CET49880443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:30.988250017 CET4434988020.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:31.491812944 CET4434987252.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:31.491931915 CET49872443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:31.492350101 CET49872443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:31.492372036 CET4434987252.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:31.535836935 CET49882443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:31.535859108 CET4434988252.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:31.535959005 CET49882443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:31.536298990 CET49882443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:31.536319971 CET4434988252.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:31.956216097 CET44349874213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:31.956346035 CET49874443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:31.956526995 CET49874443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:31.956542969 CET44349874213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:32.997437954 CET49883443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:32.997478962 CET44349883213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:32.997595072 CET49883443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:32.998264074 CET49883443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:32.998274088 CET44349883213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:33.032383919 CET49885443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:33.032434940 CET44349885213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:33.032530069 CET49885443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:33.032907963 CET49885443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:33.032921076 CET44349885213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:36.057102919 CET44349878216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:38:36.057219982 CET49878443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:38:36.057426929 CET49878443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:38:36.057445049 CET44349878216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:38:39.139925957 CET4434988020.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:39.140140057 CET49880443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:39.140189886 CET49880443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:39.140211105 CET4434988020.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:39.140702009 CET49888443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:39.140749931 CET4434988820.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:39.140849113 CET49888443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:39.141117096 CET49888443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:39.141151905 CET4434988820.190.159.23192.168.2.18
                                            Mar 6, 2025 16:38:39.141206026 CET49888443192.168.2.1820.190.159.23
                                            Mar 6, 2025 16:38:39.657866001 CET4434988252.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:39.657958984 CET49882443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:39.658051968 CET49882443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:39.658067942 CET4434988252.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:39.683465004 CET49889443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:39.683502913 CET4434988952.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:39.683609009 CET49889443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:39.683988094 CET49889443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:39.684000015 CET4434988952.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:41.294929981 CET4982480192.168.2.18142.250.184.195
                                            Mar 6, 2025 16:38:41.302050114 CET8049824142.250.184.195192.168.2.18
                                            Mar 6, 2025 16:38:41.302169085 CET4982480192.168.2.18142.250.184.195
                                            Mar 6, 2025 16:38:41.545401096 CET44349883213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:41.545538902 CET49883443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:41.545713902 CET49883443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:41.545742035 CET44349883213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:41.546139956 CET49891443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:41.546190023 CET44349891213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:41.546365023 CET49891443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:41.546648979 CET49891443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:41.546664000 CET44349891213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:41.548985004 CET44349885213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:41.549063921 CET49885443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:41.549134970 CET49885443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:41.549154043 CET44349885213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:41.549360991 CET49892443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:41.549380064 CET44349892213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:41.549453974 CET49892443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:41.549740076 CET49892443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:41.549750090 CET44349892213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:48.090739012 CET4434988952.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:48.090883017 CET49889443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:48.090975046 CET49889443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:38:48.090991974 CET4434988952.149.20.212192.168.2.18
                                            Mar 6, 2025 16:38:49.896599054 CET44349891213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:49.896769047 CET49891443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:49.896915913 CET49891443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:49.896938086 CET44349891213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:49.898319960 CET44349892213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:49.898507118 CET49892443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:49.898672104 CET49892443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:49.898680925 CET44349892213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:50.262895107 CET4434981313.107.253.72192.168.2.18
                                            Mar 6, 2025 16:38:50.263040066 CET4434981313.107.253.72192.168.2.18
                                            Mar 6, 2025 16:38:50.263174057 CET49813443192.168.2.1813.107.253.72
                                            Mar 6, 2025 16:38:50.263725996 CET49813443192.168.2.1813.107.253.72
                                            Mar 6, 2025 16:38:50.268750906 CET4434981313.107.253.72192.168.2.18
                                            Mar 6, 2025 16:38:54.913017988 CET49900443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:54.913072109 CET44349900213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:54.913162947 CET49900443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:54.913630962 CET49900443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:54.913652897 CET44349900213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:54.914978027 CET49901443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:54.915015936 CET44349901213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:38:54.915090084 CET49901443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:54.915358067 CET49901443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:38:54.915371895 CET44349901213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:04.279165983 CET44349900213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:04.279355049 CET49900443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:04.279529095 CET49900443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:04.279558897 CET44349900213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:04.280272961 CET49906443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:04.280323029 CET44349906213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:04.280409098 CET49906443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:04.280890942 CET49906443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:04.280903101 CET44349906213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:04.309259892 CET44349901213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:04.309403896 CET49901443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:04.309688091 CET49901443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:04.309705019 CET44349901213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:04.310192108 CET49907443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:04.310249090 CET44349907213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:04.310318947 CET49907443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:04.310844898 CET49907443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:04.310858965 CET44349907213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:12.689090014 CET44349906213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:12.689177036 CET49906443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:12.689431906 CET49906443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:12.689456940 CET44349906213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:12.699126005 CET44349907213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:12.699199915 CET49907443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:12.699418068 CET49907443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:12.699439049 CET44349907213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:18.204448938 CET49819443192.168.2.1840.115.3.253
                                            Mar 6, 2025 16:39:18.204526901 CET49815443192.168.2.1840.115.3.253
                                            Mar 6, 2025 16:39:18.209652901 CET4434981940.115.3.253192.168.2.18
                                            Mar 6, 2025 16:39:18.209672928 CET4434981540.115.3.253192.168.2.18
                                            Mar 6, 2025 16:39:18.423537970 CET4434981940.115.3.253192.168.2.18
                                            Mar 6, 2025 16:39:18.425179005 CET4434981540.115.3.253192.168.2.18
                                            Mar 6, 2025 16:39:18.475600004 CET49819443192.168.2.1840.115.3.253
                                            Mar 6, 2025 16:39:18.479434013 CET49815443192.168.2.1840.115.3.253
                                            Mar 6, 2025 16:39:19.323947906 CET49915443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:39:19.323988914 CET44349915216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:39:19.324093103 CET49915443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:39:19.324482918 CET49915443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:39:19.324492931 CET44349915216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:39:24.319777012 CET49918443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:39:24.319890976 CET4434991852.149.20.212192.168.2.18
                                            Mar 6, 2025 16:39:24.320013046 CET49918443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:39:24.320415974 CET49918443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:39:24.320450068 CET4434991852.149.20.212192.168.2.18
                                            Mar 6, 2025 16:39:27.851537943 CET44349915216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:39:27.851881027 CET49915443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:39:27.851977110 CET49915443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:39:27.852020979 CET44349915216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:39:27.852432013 CET49922443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:39:27.852473021 CET44349922216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:39:27.852582932 CET49922443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:39:27.852930069 CET49922443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:39:27.852945089 CET44349922216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:39:32.471882105 CET4434991852.149.20.212192.168.2.18
                                            Mar 6, 2025 16:39:32.471972942 CET49918443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:39:32.472063065 CET49918443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:39:32.472084045 CET4434991852.149.20.212192.168.2.18
                                            Mar 6, 2025 16:39:32.477915049 CET49926443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:39:32.477962017 CET4434992652.149.20.212192.168.2.18
                                            Mar 6, 2025 16:39:32.478071928 CET49926443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:39:32.478430986 CET49926443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:39:32.478442907 CET4434992652.149.20.212192.168.2.18
                                            Mar 6, 2025 16:39:36.316643000 CET44349922216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:39:36.316747904 CET49922443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:39:36.316937923 CET49922443192.168.2.18216.58.212.164
                                            Mar 6, 2025 16:39:36.316963911 CET44349922216.58.212.164192.168.2.18
                                            Mar 6, 2025 16:39:38.648629904 CET4434992652.149.20.212192.168.2.18
                                            Mar 6, 2025 16:39:38.702742100 CET49926443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:39:38.789686918 CET4434992652.149.20.212192.168.2.18
                                            Mar 6, 2025 16:39:38.830707073 CET49926443192.168.2.1852.149.20.212
                                            Mar 6, 2025 16:39:42.703725100 CET49931443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:42.703790903 CET44349931213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:42.703890085 CET49931443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:42.704276085 CET49931443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:42.704291105 CET44349931213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:42.704329014 CET49932443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:42.704370975 CET44349932213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:42.706041098 CET49932443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:42.706041098 CET49932443192.168.2.18213.209.150.110
                                            Mar 6, 2025 16:39:42.706084013 CET44349932213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:47.254796028 CET44349931213.209.150.110192.168.2.18
                                            Mar 6, 2025 16:39:47.300630093 CET49931443192.168.2.18213.209.150.110
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 6, 2025 16:38:14.545170069 CET6423953192.168.2.181.1.1.1
                                            Mar 6, 2025 16:38:14.545367956 CET5657453192.168.2.181.1.1.1
                                            Mar 6, 2025 16:38:14.555130005 CET53580311.1.1.1192.168.2.18
                                            Mar 6, 2025 16:38:14.563226938 CET53494531.1.1.1192.168.2.18
                                            Mar 6, 2025 16:38:14.586235046 CET53565741.1.1.1192.168.2.18
                                            Mar 6, 2025 16:38:14.586289883 CET53642391.1.1.1192.168.2.18
                                            Mar 6, 2025 16:38:19.272212029 CET5428253192.168.2.181.1.1.1
                                            Mar 6, 2025 16:38:19.272515059 CET5555353192.168.2.181.1.1.1
                                            Mar 6, 2025 16:38:19.279450893 CET53542821.1.1.1192.168.2.18
                                            Mar 6, 2025 16:38:19.279966116 CET53555531.1.1.1192.168.2.18
                                            Mar 6, 2025 16:39:14.435385942 CET53612151.1.1.1192.168.2.18
                                            Mar 6, 2025 16:39:17.525681973 CET53554641.1.1.1192.168.2.18
                                            Mar 6, 2025 16:39:22.540287971 CET53509071.1.1.1192.168.2.18
                                            Mar 6, 2025 16:39:31.129101038 CET53501321.1.1.1192.168.2.18
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Mar 6, 2025 16:38:14.545170069 CET192.168.2.181.1.1.10x291fStandard query (0)ts-college.comA (IP address)IN (0x0001)false
                                            Mar 6, 2025 16:38:14.545367956 CET192.168.2.181.1.1.10x75ddStandard query (0)ts-college.com65IN (0x0001)false
                                            Mar 6, 2025 16:38:19.272212029 CET192.168.2.181.1.1.10x5cffStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                            Mar 6, 2025 16:38:19.272515059 CET192.168.2.181.1.1.10x11a6Standard query (0)www.google.com65IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Mar 6, 2025 16:37:49.681499958 CET1.1.1.1192.168.2.180xfed4No error (0)ecs-office.s-0005.dual-s-msedge.netshed.s-0005.dual-s-dc-msedge.netCNAME (Canonical name)IN (0x0001)false
                                            Mar 6, 2025 16:37:49.681499958 CET1.1.1.1192.168.2.180xfed4No error (0)shed.s-0005.dual-s-dc-msedge.nets-0005.dual-s-dc-msedge.netCNAME (Canonical name)IN (0x0001)false
                                            Mar 6, 2025 16:37:49.681499958 CET1.1.1.1192.168.2.180xfed4No error (0)s-0005.dual-s-dc-msedge.net52.123.130.14A (IP address)IN (0x0001)false
                                            Mar 6, 2025 16:37:49.681499958 CET1.1.1.1192.168.2.180xfed4No error (0)s-0005.dual-s-dc-msedge.net52.123.131.14A (IP address)IN (0x0001)false
                                            Mar 6, 2025 16:38:14.586289883 CET1.1.1.1192.168.2.180x291fNo error (0)ts-college.com213.209.150.110A (IP address)IN (0x0001)false
                                            Mar 6, 2025 16:38:19.279450893 CET1.1.1.1192.168.2.180x5cffNo error (0)www.google.com216.58.212.164A (IP address)IN (0x0001)false
                                            Mar 6, 2025 16:38:19.279966116 CET1.1.1.1192.168.2.180x11a6No error (0)www.google.com65IN (0x0001)false
                                            • c.pki.goog
                                            Session IDSource IPSource PortDestination IPDestination Port
                                            0192.168.2.1849824142.250.184.19580
                                            TimestampBytes transferredDirectionData
                                            Mar 6, 2025 16:37:40.252988100 CET200OUTGET /r/r4.crl HTTP/1.1
                                            Cache-Control: max-age = 3000
                                            Connection: Keep-Alive
                                            Accept: */*
                                            If-Modified-Since: Thu, 25 Jul 2024 14:48:00 GMT
                                            User-Agent: Microsoft-CryptoAPI/10.0
                                            Host: c.pki.goog
                                            Mar 6, 2025 16:37:40.902110100 CET223INHTTP/1.1 304 Not Modified
                                            Date: Thu, 06 Mar 2025 15:15:58 GMT
                                            Expires: Thu, 06 Mar 2025 16:05:58 GMT
                                            Age: 1302
                                            Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
                                            Cache-Control: public, max-age=3000
                                            Vary: Accept-Encoding
                                            Mar 6, 2025 16:37:40.907598019 CET202OUTGET /r/gsr1.crl HTTP/1.1
                                            Cache-Control: max-age = 3000
                                            Connection: Keep-Alive
                                            Accept: */*
                                            If-Modified-Since: Tue, 07 Jan 2025 07:28:00 GMT
                                            User-Agent: Microsoft-CryptoAPI/10.0
                                            Host: c.pki.goog
                                            Mar 6, 2025 16:37:41.094713926 CET223INHTTP/1.1 304 Not Modified
                                            Date: Thu, 06 Mar 2025 15:15:54 GMT
                                            Expires: Thu, 06 Mar 2025 16:05:54 GMT
                                            Age: 1306
                                            Last-Modified: Tue, 07 Jan 2025 07:28:00 GMT
                                            Cache-Control: public, max-age=3000
                                            Vary: Accept-Encoding


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:10:37:31
                                            Start date:06/03/2025
                                            Path:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Message.eml"
                                            Imagebase:0x140000
                                            File size:34'446'744 bytes
                                            MD5 hash:91A5292942864110ED734005B7E005C0
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:3
                                            Start time:10:37:49
                                            Start date:06/03/2025
                                            Path:C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "FF1092E9-C705-422A-B026-B19261394388" "94C875A3-187C-497C-B2E3-EB486B1F25D1" "4652" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
                                            Imagebase:0x7ff7418a0000
                                            File size:710'048 bytes
                                            MD5 hash:EC652BEDD90E089D9406AFED89A8A8BD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:4
                                            Start time:10:37:52
                                            Start date:06/03/2025
                                            Path:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE" /n "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\4FXV0OMO\Hyperoptic limited Reference Number(s)_FLD9396400164 (SOP 00876) Note(s).docx" /o ""
                                            Imagebase:0x840000
                                            File size:1'620'872 bytes
                                            MD5 hash:1A0C2C2E7D9C4BC18E91604E9B0C7678
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:6
                                            Start time:10:37:53
                                            Start date:06/03/2025
                                            Path:C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE" /Embedding
                                            Imagebase:0x840000
                                            File size:1'620'872 bytes
                                            MD5 hash:1A0C2C2E7D9C4BC18E91604E9B0C7678
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:9
                                            Start time:10:38:13
                                            Start date:06/03/2025
                                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://ts-college.com/?t=cHJlc3NAaHlwZXJvcHRpYy5jb20=
                                            Imagebase:0x7ff711e10000
                                            File size:3'388'000 bytes
                                            MD5 hash:E81F54E6C1129887AEA47E7D092680BF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:false

                                            Target ID:10
                                            Start time:10:38:13
                                            Start date:06/03/2025
                                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=1840,i,12390355679735535310,5238380358082981745,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version --mojo-platform-channel-handle=2260 /prefetch:3
                                            Imagebase:0x7ff711e10000
                                            File size:3'388'000 bytes
                                            MD5 hash:E81F54E6C1129887AEA47E7D092680BF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:false

                                            No disassembly