Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
attachment(1).eml

Overview

General Information

Sample name:attachment(1).eml
Analysis ID:1541128
MD5:0dede3f92bef4730ef21e6e143c87140
SHA1:5617a99b3e4d541a36a45f8fe35a3a364601ea08
SHA256:1c6d6635a271e90527917b6493ea85c0c7b8011f421ba6338bfe55d91162ca44
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Connects to many different domains
Creates files inside the system directory
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Drops PE files
Drops PE files to the windows directory (C:\Windows)
HTML body contains low number of good links
HTML body contains password input but no form action
HTML body with high number of embedded SVGs detected
HTML page contains hidden javascript code
HTML title does not match URL
Invalid T&C link found
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Stores files to the Windows start menu directory
Stores large binary data to the registry

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6152 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\attachment(1).eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 2412 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "EEDD0B08-3C37-4EF1-B694-807A717ED8F1" "193BA9E5-FC59-42A9-BD52-9D566D4EE580" "6152" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 1996 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 3312 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1936,i,3392873588386690937,14404457618251791924,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6152, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
Source: Registry Key setAuthor: frack113: Data: Details: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\GZKBQLBB\, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6152, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Security\OutlookSecureTempFolder
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://euroservis.basiic.net/4fHFE/LLM: Score: 9 Reasons: The brand 'Microsoft' is classified as 'wellknown'., The legitimate domain for Microsoft is 'microsoft.com'., The provided URL 'euroservis.basiic.net' does not match the legitimate domain for Microsoft., The domain 'basiic.net' is unrelated to Microsoft and could be a potential phishing attempt., The use of a subdomain 'euroservis' and an unrelated main domain 'basiic.net' is suspicious., The input fields 'Email, phone, or Skype' are commonly targeted in phishing attempts to collect personal information. DOM: 2.12.pages.csv
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: Number of links: 0
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: <input type="password" .../> found but no <form action="...
Source: https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40daHTTP Parser: Total embedded SVG size: 1752575
Source: https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40daHTTP Parser: Base64 decoded: 1729770009.000000
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: Title: Sign in to your account does not match URL
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: Invalid link: Privacy statement
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: Invalid link: Privacy statement
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: <input type="password" .../> found
Source: https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40daHTTP Parser: No favicon
Source: https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40daHTTP Parser: No favicon
Source: https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40daHTTP Parser: No favicon
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: No favicon
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: No favicon
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: No favicon
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: No favicon
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: No <meta name="author".. found
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: No <meta name="author".. found
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: No <meta name="copyright".. found
Source: https://euroservis.basiic.net/4fHFE/HTTP Parser: No <meta name="copyright".. found
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1763765446\LICENSE.txt
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49706 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.32.138:443 -> 192.168.2.16:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.32.138:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49911 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 1MB later: 30MB
Source: unknownNetwork traffic detected: DNS query count 32
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:62947 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:62947 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:62947 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:62947 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:62947 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:49864 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.16:62947 -> 1.1.1.1:53
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.138
Source: global trafficDNS traffic detected: DNS query: euroservis.circle.so
Source: global trafficDNS traffic detected: DNS query: rum-static.pingdom.net
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: connect.facebook.net
Source: global trafficDNS traffic detected: DNS query: platform.twitter.com
Source: global trafficDNS traffic detected: DNS query: sessions.bugsnag.com
Source: global trafficDNS traffic detected: DNS query: platform.instagram.com
Source: global trafficDNS traffic detected: DNS query: cdn.embedly.com
Source: global trafficDNS traffic detected: DNS query: js.stripe.com
Source: global trafficDNS traffic detected: DNS query: js.partnerstack.com
Source: global trafficDNS traffic detected: DNS query: static.cloudflareinsights.com
Source: global trafficDNS traffic detected: DNS query: www.instagram.com
Source: global trafficDNS traffic detected: DNS query: grsm.io
Source: global trafficDNS traffic detected: DNS query: analytics.google.com
Source: global trafficDNS traffic detected: DNS query: stats.g.doubleclick.net
Source: global trafficDNS traffic detected: DNS query: td.doubleclick.net
Source: global trafficDNS traffic detected: DNS query: partnerlinks.io
Source: global trafficDNS traffic detected: DNS query: rsms.me
Source: global trafficDNS traffic detected: DNS query: rum-collector-2.pingdom.net
Source: global trafficDNS traffic detected: DNS query: m.stripe.network
Source: global trafficDNS traffic detected: DNS query: m.stripe.com
Source: global trafficDNS traffic detected: DNS query: euroservis.basiic.net
Source: global trafficDNS traffic detected: DNS query: stripe.com
Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: code.jquery.com
Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: maxcdn.bootstrapcdn.com
Source: global trafficDNS traffic detected: DNS query: stackpath.bootstrapcdn.com
Source: global trafficDNS traffic detected: DNS query: 5102487645-1323985617.cos.eu-frankfurt.myqcloud.com
Source: global trafficDNS traffic detected: DNS query: 5102487645.my.id
Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
Source: unknownNetwork traffic detected: HTTP traffic on port 49932 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62953
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62950
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62952
Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49974
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49973
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49972
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49971
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49970
Source: unknownNetwork traffic detected: HTTP traffic on port 49967 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49943 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49968
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49967
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49966
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49965
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49964
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49963
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49961
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49960
Source: unknownNetwork traffic detected: HTTP traffic on port 49966 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49933 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49959
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49958
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 49921 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49957
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49956
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49954
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49953
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49952
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49950
Source: unknownNetwork traffic detected: HTTP traffic on port 49944 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49910 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49949
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49948
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49947
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49946
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49945
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49944
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49943
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 49945 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49968 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49899
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49897
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49896
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49895
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49893
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49892
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49891
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49890
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49897 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49911 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49957 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49889
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49888
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49882
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49896 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49956 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49876
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
Source: unknownNetwork traffic detected: HTTP traffic on port 62950 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49934 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49906 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49900 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49929 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49964 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49930 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49963 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 49952 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49895 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49907 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49941 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49965 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49942 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62952 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49919 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49954 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49953 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 62953 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49908 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49931 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49920 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49926 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49949 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49961 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49950 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49893 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49972 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49892 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49904 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49927 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49938 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49974 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49916 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49939 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49905 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49928 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49940 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49973 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49891 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49917 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49970 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49912 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49935 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49958 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49889 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49946 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49901 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49947 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49913 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49942
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49941
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49940
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49939
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49938
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49937
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49936
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49935
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 49902 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49934
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49933
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49932
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49931
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49930
Source: unknownNetwork traffic detected: HTTP traffic on port 49925 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49971 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49936 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49876 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49960 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49929
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49928
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49927
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49926
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49925
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49924
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49923
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49921
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49920
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49919
Source: unknownNetwork traffic detected: HTTP traffic on port 49937 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49918
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49917
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49916
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49915
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49914
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49913
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49912
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49911
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49910
Source: unknownNetwork traffic detected: HTTP traffic on port 49948 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49899 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49959 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49909
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49908
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49907
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49906
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49905
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49904
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49903
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49902
Source: unknownNetwork traffic detected: HTTP traffic on port 49903 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49901
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49900
Source: unknownNetwork traffic detected: HTTP traffic on port 49888 -> 443
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49706 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.32.138:443 -> 192.168.2.16:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.32.138:443 -> 192.168.2.16:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49911 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_757049762
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_757049762\sets.json
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_757049762\manifest.json
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_757049762\LICENSE
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_757049762\_metadata\
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_757049762\_metadata\verified_contents.json
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_757049762\manifest.fingerprint
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1404197370
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1404197370\Google.Widevine.CDM.dll
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1404197370\manifest.json
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1404197370\_metadata\
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1404197370\_metadata\verified_contents.json
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1404197370\manifest.fingerprint
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1763765446
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1763765446\LICENSE.txt
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1763765446\Filtering Rules
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1763765446\manifest.json
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1763765446\_metadata\
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1763765446\_metadata\verified_contents.json
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1763765446\manifest.fingerprint
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\chrome_BITS_1996_1441280379
Source: classification engineClassification label: mal48.phis.winEML@33/39@124/557
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241024T0739500856-6152.etl
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.ini
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\attachment(1).eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "EEDD0B08-3C37-4EF1-B694-807A717ED8F1" "193BA9E5-FC59-42A9-BD52-9D566D4EE580" "6152" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "EEDD0B08-3C37-4EF1-B694-807A717ED8F1" "193BA9E5-FC59-42A9-BD52-9D566D4EE580" "6152" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1936,i,3392873588386690937,14404457618251791924,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1936,i,3392873588386690937,14404457618251791924,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CACAF262-9370-4615-A13B-9F5539DA4C0A}\InProcServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\Chrome\Application\Dictionaries
Source: attachment(1).emlStatic file information: File size 1119972 > 1048576
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1404197370\Google.Widevine.CDM.dllJump to dropped file
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1404197370\Google.Widevine.CDM.dllJump to dropped file
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1763765446\LICENSE.txt
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\outlook\ConfigContextData 1
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
23
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Modify Registry
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Registry Run Keys / Startup Folder
1
Process Injection
Security Account Manager13
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Extra Window Memory Injection
1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
File Deletion
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Extra Window Memory Injection
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Windows\SystemTemp\chrome_PuffinComponentUnpacker_BeginUnzipping1996_1404197370\Google.Widevine.CDM.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
static.cloudflareinsights.com
104.16.79.73
truefalse
    unknown
    rsms.me
    104.21.234.234
    truefalse
      unknown
      euroservis.basiic.net
      188.114.97.3
      truetrue
        unknown
        z-p42-instagram.c10r.instagram.com
        157.240.0.174
        truefalse
          unknown
          platform.twitter.map.fastly.net
          199.232.188.157
          truefalse
            unknown
            stats.g.doubleclick.net
            74.125.133.156
            truefalse
              unknown
              partnerlinks.io
              104.18.31.133
              truefalse
                unknown
                rum-static.pingdom.net
                104.22.54.104
                truefalse
                  unknown
                  scontent.xx.fbcdn.net
                  157.240.0.6
                  truefalse
                    unknown
                    code.jquery.com
                    151.101.130.137
                    truefalse
                      unknown
                      cdnjs.cloudflare.com
                      104.17.24.14
                      truefalse
                        unknown
                        stripe.com
                        54.76.53.164
                        truefalse
                          unknown
                          sni1gl.wpc.omegacdn.net
                          152.199.21.175
                          truefalse
                            unknown
                            www.google.com
                            142.250.186.68
                            truefalse
                              unknown
                              grsm.io
                              104.18.10.212
                              truefalse
                                unknown
                                stackpath.bootstrapcdn.com
                                104.18.10.207
                                truefalse
                                  unknown
                                  5102487645.my.id
                                  162.241.71.126
                                  truefalse
                                    unknown
                                    a.nel.cloudflare.com
                                    35.190.80.1
                                    truefalse
                                      unknown
                                      sessions.bugsnag.com
                                      35.190.88.7
                                      truefalse
                                        unknown
                                        maxcdn.bootstrapcdn.com
                                        104.18.10.207
                                        truefalse
                                          unknown
                                          s-part-0017.t-0009.fb-t-msedge.net
                                          13.107.253.45
                                          truefalse
                                            unknown
                                            stripecdn.map.fastly.net
                                            151.101.128.176
                                            truefalse
                                              unknown
                                              euroservis.circle.so
                                              104.18.39.141
                                              truefalse
                                                unknown
                                                prod-dem-collector-elb-611025824.eu-west-1.elb.amazonaws.com
                                                54.228.145.139
                                                truefalse
                                                  unknown
                                                  ger.file.myqcloud.com
                                                  162.62.150.187
                                                  truefalse
                                                    unknown
                                                    m.stripe.com
                                                    54.200.229.67
                                                    truefalse
                                                      unknown
                                                      challenges.cloudflare.com
                                                      104.18.94.41
                                                      truefalse
                                                        unknown
                                                        dexeqbeb7giwr.cloudfront.net
                                                        3.161.82.129
                                                        truefalse
                                                          unknown
                                                          analytics.google.com
                                                          142.250.186.142
                                                          truefalse
                                                            unknown
                                                            td.doubleclick.net
                                                            216.58.212.130
                                                            truefalse
                                                              unknown
                                                              js.partnerstack.com
                                                              104.18.6.218
                                                              truefalse
                                                                unknown
                                                                instagram.c10r.instagram.com
                                                                157.240.251.63
                                                                truefalse
                                                                  unknown
                                                                  cdn.embedly.com
                                                                  unknown
                                                                  unknownfalse
                                                                    unknown
                                                                    m.stripe.network
                                                                    unknown
                                                                    unknownfalse
                                                                      unknown
                                                                      5102487645-1323985617.cos.eu-frankfurt.myqcloud.com
                                                                      unknown
                                                                      unknownfalse
                                                                        unknown
                                                                        platform.instagram.com
                                                                        unknown
                                                                        unknownfalse
                                                                          unknown
                                                                          platform.twitter.com
                                                                          unknown
                                                                          unknownfalse
                                                                            unknown
                                                                            aadcdn.msftauth.net
                                                                            unknown
                                                                            unknownfalse
                                                                              unknown
                                                                              rum-collector-2.pingdom.net
                                                                              unknown
                                                                              unknownfalse
                                                                                unknown
                                                                                connect.facebook.net
                                                                                unknown
                                                                                unknownfalse
                                                                                  unknown
                                                                                  www.instagram.com
                                                                                  unknown
                                                                                  unknownfalse
                                                                                    unknown
                                                                                    js.stripe.com
                                                                                    unknown
                                                                                    unknownfalse
                                                                                      unknown
                                                                                      NameMaliciousAntivirus DetectionReputation
                                                                                      https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40dafalse
                                                                                        unknown
                                                                                        https://euroservis.basiic.net/4fHFE/true
                                                                                          unknown
                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs
                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          142.250.186.68
                                                                                          www.google.comUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          151.101.0.176
                                                                                          unknownUnited States
                                                                                          54113FASTLYUSfalse
                                                                                          35.190.88.7
                                                                                          sessions.bugsnag.comUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          151.101.130.137
                                                                                          code.jquery.comUnited States
                                                                                          54113FASTLYUSfalse
                                                                                          2.19.126.160
                                                                                          unknownEuropean Union
                                                                                          16625AKAMAI-ASUSfalse
                                                                                          151.101.66.137
                                                                                          unknownUnited States
                                                                                          54113FASTLYUSfalse
                                                                                          157.240.0.174
                                                                                          z-p42-instagram.c10r.instagram.comUnited States
                                                                                          32934FACEBOOKUSfalse
                                                                                          35.190.80.1
                                                                                          a.nel.cloudflare.comUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          162.241.71.126
                                                                                          5102487645.my.idUnited States
                                                                                          26337OIS1USfalse
                                                                                          34.104.35.123
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          1.1.1.1
                                                                                          unknownAustralia
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          54.228.145.139
                                                                                          prod-dem-collector-elb-611025824.eu-west-1.elb.amazonaws.comUnited States
                                                                                          16509AMAZON-02USfalse
                                                                                          18.245.86.52
                                                                                          unknownUnited States
                                                                                          16509AMAZON-02USfalse
                                                                                          104.21.234.234
                                                                                          rsms.meUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          104.18.95.41
                                                                                          unknownUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          151.101.128.176
                                                                                          stripecdn.map.fastly.netUnited States
                                                                                          54113FASTLYUSfalse
                                                                                          239.255.255.250
                                                                                          unknownReserved
                                                                                          unknownunknownfalse
                                                                                          188.114.97.3
                                                                                          euroservis.basiic.netEuropean Union
                                                                                          13335CLOUDFLARENETUStrue
                                                                                          3.161.82.129
                                                                                          dexeqbeb7giwr.cloudfront.netUnited States
                                                                                          16509AMAZON-02USfalse
                                                                                          142.250.186.142
                                                                                          analytics.google.comUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          152.199.21.175
                                                                                          sni1gl.wpc.omegacdn.netUnited States
                                                                                          15133EDGECASTUSfalse
                                                                                          199.232.188.157
                                                                                          platform.twitter.map.fastly.netUnited States
                                                                                          54113FASTLYUSfalse
                                                                                          142.250.184.238
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          142.250.185.72
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          104.18.31.133
                                                                                          partnerlinks.ioUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          74.125.133.156
                                                                                          stats.g.doubleclick.netUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          104.18.10.207
                                                                                          stackpath.bootstrapcdn.comUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          172.217.18.14
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          104.18.94.41
                                                                                          challenges.cloudflare.comUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          216.58.206.36
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          142.250.185.202
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          157.240.0.6
                                                                                          scontent.xx.fbcdn.netUnited States
                                                                                          32934FACEBOOKUSfalse
                                                                                          142.250.185.163
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          104.18.39.141
                                                                                          euroservis.circle.soUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          52.109.89.19
                                                                                          unknownUnited States
                                                                                          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                                          157.240.251.63
                                                                                          instagram.c10r.instagram.comUnited States
                                                                                          32934FACEBOOKUSfalse
                                                                                          104.16.90.50
                                                                                          unknownUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          13.89.178.26
                                                                                          unknownUnited States
                                                                                          8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                                          104.16.79.73
                                                                                          static.cloudflareinsights.comUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          216.58.212.130
                                                                                          td.doubleclick.netUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          172.217.18.10
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          216.239.36.178
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          142.250.186.99
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          52.113.194.132
                                                                                          unknownUnited States
                                                                                          8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                                          104.17.24.14
                                                                                          cdnjs.cloudflare.comUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          104.18.10.212
                                                                                          grsm.ioUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          13.107.253.45
                                                                                          s-part-0017.t-0009.fb-t-msedge.netUnited States
                                                                                          8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                                          54.76.53.164
                                                                                          stripe.comUnited States
                                                                                          16509AMAZON-02USfalse
                                                                                          104.22.55.104
                                                                                          unknownUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          142.250.185.136
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          104.18.6.218
                                                                                          js.partnerstack.comUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          157.240.251.9
                                                                                          unknownUnited States
                                                                                          32934FACEBOOKUSfalse
                                                                                          104.18.11.207
                                                                                          unknownUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          142.250.185.170
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          162.62.150.176
                                                                                          unknownSingapore
                                                                                          132203TENCENT-NET-AP-CNTencentBuildingKejizhongyiAvenueCNfalse
                                                                                          64.233.184.84
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          184.28.90.27
                                                                                          unknownUnited States
                                                                                          16625AKAMAI-ASUSfalse
                                                                                          142.250.186.168
                                                                                          unknownUnited States
                                                                                          15169GOOGLEUSfalse
                                                                                          54.200.229.67
                                                                                          m.stripe.comUnited States
                                                                                          16509AMAZON-02USfalse
                                                                                          104.22.54.104
                                                                                          rum-static.pingdom.netUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          IP
                                                                                          192.168.2.16
                                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                                          Analysis ID:1541128
                                                                                          Start date and time:2024-10-24 13:39:03 +02:00
                                                                                          Joe Sandbox product:CloudBasic
                                                                                          Overall analysis duration:
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:full
                                                                                          Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                          Number of analysed new started processes analysed:12
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • EGA enabled
                                                                                          Analysis Mode:stream
                                                                                          Analysis stop reason:Timeout
                                                                                          Sample name:attachment(1).eml
                                                                                          Detection:MAL
                                                                                          Classification:mal48.phis.winEML@33/39@124/557
                                                                                          Cookbook Comments:
                                                                                          • Found application associated with file extension: .eml
                                                                                          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                                                                                          • Excluded IPs from analysis (whitelisted): 52.113.194.132
                                                                                          • Excluded domains from analysis (whitelisted): ecs.office.com, slscr.update.microsoft.com, s-0005.s-msedge.net, ecs.office.trafficmanager.net, s-0005-office.config.skype.com, ecs-office.s-0005.s-msedge.net
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                          • VT rate limit hit for: attachment(1).eml
                                                                                          InputOutput
                                                                                          URL: Model: claude-3-5-sonnet-20240620
                                                                                          {
                                                                                              "explanation": [
                                                                                                  "The email appears to be a legitimate file sharing notification from a known sender (Furio Sterni) within the same company (Euroservis)",
                                                                                                  "The email contains standard company disclaimers and privacy notices, which are typical for legitimate business communications",
                                                                                                  "The email is generated through Microsoft 365, a common business email platform, and doesn't contain suspicious external links"
                                                                                              ],
                                                                                              "phishing": false,
                                                                                              "confidence": 8
                                                                                          }
                                                                                          Is this email content a phishing attempt? Please respond only in valid JSON format:
                                                                                              Email content converted to JSON:
                                                                                          {
                                                                                              "date": "Thu, 24 Oct 2024 11:35:52 +0200", 
                                                                                              "subject": "I: Furio Sterni ha condiviso la cartella \"Documentazione\" con te", 
                                                                                              "communications": [
                                                                                                  " Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch  importante CAUTION: This email sent from an EXTERNAL SENDER. Please BE CAREFUL to links and attachments! Salve, Vedi allegato. Grazie. FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 Euroservis S.r.l. Riva Tommaso Gulli, 12  34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu  www.euroservis.eu  Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella \"Documentazione\" con te Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl.    /* Font Definitions */ @font-face {font-family:\"Cambria Math\"; panose-1:2 4 5 3 5 4 6 3 2 4;} @font-face {font-family:userbri; panose-1:2 15 5 2 2 2 4 3 2 4;} @font-face {font-family:Aptos;} @font-face {font-family:\"Segoe UI Emoji\"; panose-1:2 11 5 2 4 2 4 2 2 3;} @font-face {font-family:\"Avenir Next LT Pro\";} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in; font-size:12.0pt; font-family:\"Aptos\",sans-serif;} a:link, span.MsoHyperlink {mso-style-priority:99; color:blue; text-decoration:underline;} span.entitydelimiterbefore {mso-style-name:entitydelimiterbefore;} span.entity {mso-style-name:_entity;} span.entitydelimiterafter {mso-style-name:entitydelimiterafter;} span.EmailStyle22 {mso-style-type:personal-compose; font-family:\"Times New Roman\",serif; color:black;} .MsoChpDefault {mso-style-type:export-only; font-size:10.0pt; mso-ligatures:none;} @page WordSection1 {size:8.5in 11.0in; margin:1.0in 1.0in 1.0in 1.0in;} div.WordSection1 {page:WordSection1;} --> Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch  importante CAUTION: This email sent from an EXTERNAL SENDER. Please BE CAREFUL to links and attachments! Salve, Vedi allegato. Grazie. FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 Euroservis S.r.l. Riva Tommaso Gulli, 12  34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu  www.euroservis.eu  Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella \"Documentazione\" con te Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch  importante Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch  importante Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch  importante Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch  importante Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch  importante Scopri perch  importante https://aka.ms/LearnAboutSenderIdentification CAUTION: This email sent from an EXTERNAL SENDER. Please BE CAREFUL to links and attachments! Salve, Vedi allegato. Grazie. FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 Euroservis S.r.l. Riva Tommaso Gulli, 12  34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu  www.euroservis.eu  Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella \"Documentazione\" con te Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. CAUTION: This email sent from an EXTERNAL SENDER. Please BE CAREFUL to links and attachments! CAUTION: Salve, Vedi allegato. Grazie. FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 Euroservis S.r.l. Riva Tommaso Gulli, 12  34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu  www.euroservis.eu  Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella \"Documentazione\" con te Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Salve, Vedi allegato. Grazie. FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 Euroservis S.r.l. Riva Tommaso Gulli, 12  34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu  www.euroservis.eu  Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella \"Documentazione\" con te Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Salve, Vedi allegato. Grazie. FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 Euroservis S.r.l. Riva Tommaso Gulli, 12  34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu  www.euroservis.eu  Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Salve, Salve, Salve, Vedi allegato. Vedi allegato. Vedi allegato. Grazie. Grazie. Grazie. FURIO STERNI FURIO STERNI FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 furio.sterni@euroservis.eu +39 328 0122969 furio.sterni@euroservis.eu mailto:furio.sterni@euroservis.eu https://www.facebook.com/EuroservisSrl/ https://www.linkedin.com/company/euro-servis-srl/?originalSubdomain=it https://www.youtube.com/channel/UCupR1c7OEA0ALczt32sENDQ Euroservis S.r.l. Riva Tommaso Gulli, 12  34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu  www.euroservis.eu Euroservis S.r.l. Euroservis S.r.l. Riva Tommaso Gulli, 12  34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu  www.euroservis.eu info@euroservis.eu mailto:info@euroservis.eu info@euroservis.eu www.euroservis.eu www.euroservis.eu https://euroservis.eu/ www.euroservis.eu  Please consider the environment before printing this email.  Please consider the environment before printing this email. Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella \"Documentazione\" con te Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella \"Documentazione\" con te Da: Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella \"Documentazione\" con te Inviato: A: Oggetto: Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Ecco la cartella che Furio Sterni ha condiviso con te. Ecco la cartella che Furio Sterni ha condiviso con te. Ecco la cartella che Furio Sterni ha condiviso con te. Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Documentazione Documentazione Documentazione Documentazione Documentazione https://euroservissrl-my.sharepoint.com/:f:/r/personal/furio_sterni_euroservis_eu/Documents/Documentazione?e=5%3ad20090fe3a75485dba5eb06c7a124e15&sharingv2=true&fromShare=true&at=9 Documentazione Documentazione   Documentazione Documentazione Documentazione https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da   Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Apri Condividi Apri Condividi Apri Condividi Apri Condividi Apri Condividi Apri Apri Apri   Apri Apri Apri https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da   Condividi Condividi Condividi   Condividi Condividi Condividi https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da   Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. "
                                                                                              ], 
                                                                                              "from": "Furio Sterni <furio.sterni@euroservis.eu>", 
                                                                                              "to": "Furio Sterni <furio.sterni@euroservis.eu>"
                                                                                          }
                                                                                          URL: Email Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "contains_trigger_text": true,
                                                                                            "trigger_text": "CLICK HERE TO VIEW DOCUMENT",
                                                                                            "prominent_button_name": "unknown",
                                                                                            "text_input_field_labels": [
                                                                                              "furio.sterni@euroservis.eu",
                                                                                              "+39 328 0122969"
                                                                                            ],
                                                                                            "pdf_icon_visible": false,
                                                                                            "has_visible_captcha": false,
                                                                                            "has_urgent_text": true,
                                                                                            "has_visible_qrcode": false
                                                                                          }
                                                                                          URL: Email Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "brands": [
                                                                                              "Euroservis"
                                                                                            ]
                                                                                          }
                                                                                          URL: https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "contains_trigger_text": false,
                                                                                            "trigger_text": "unknown",
                                                                                            "prominent_button_name": "unknown",
                                                                                            "text_input_field_labels": "unknown",
                                                                                            "pdf_icon_visible": false,
                                                                                            "has_visible_captcha": false,
                                                                                            "has_urgent_text": false,
                                                                                            "has_visible_qrcode": false
                                                                                          }
                                                                                          URL: https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "contains_trigger_text": false,
                                                                                            "trigger_text": "unknown",
                                                                                            "prominent_button_name": "unknown",
                                                                                            "text_input_field_labels": "unknown",
                                                                                            "pdf_icon_visible": false,
                                                                                            "has_visible_captcha": false,
                                                                                            "has_urgent_text": false,
                                                                                            "has_visible_qrcode": false
                                                                                          }
                                                                                          URL: https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "brands": [
                                                                                              "Amiella's Community"
                                                                                            ]
                                                                                          }
                                                                                          URL: https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "brands": [
                                                                                              "Amiella's Community"
                                                                                            ]
                                                                                          }
                                                                                          URL: https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "contains_trigger_text": true,
                                                                                            "trigger_text": "Redirecting",
                                                                                            "prominent_button_name": "unknown",
                                                                                            "text_input_field_labels": "unknown",
                                                                                            "pdf_icon_visible": false,
                                                                                            "has_visible_captcha": false,
                                                                                            "has_urgent_text": false,
                                                                                            "has_visible_qrcode": false
                                                                                          }
                                                                                          URL: https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "brands": [
                                                                                              "Amiella's Community"
                                                                                            ]
                                                                                          }
                                                                                          URL: https://euroservis.basiic.net/4fHFE/ Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "contains_trigger_text": true,
                                                                                            "trigger_text": "Secure browsing setup in process",
                                                                                            "prominent_button_name": "unknown",
                                                                                            "text_input_field_labels": "unknown",
                                                                                            "pdf_icon_visible": false,
                                                                                            "has_visible_captcha": false,
                                                                                            "has_urgent_text": false,
                                                                                            "has_visible_qrcode": false
                                                                                          }
                                                                                          URL: https://euroservis.basiic.net/4fHFE/ Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "brands": [
                                                                                              "Cloudflare"
                                                                                            ]
                                                                                          }
                                                                                          URL: https://euroservis.basiic.net/4fHFE/ Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "contains_trigger_text": true,
                                                                                            "trigger_text": "Sign In",
                                                                                            "prominent_button_name": "Next",
                                                                                            "text_input_field_labels": [
                                                                                              "Email, phone, or Skype"
                                                                                            ],
                                                                                            "pdf_icon_visible": false,
                                                                                            "has_visible_captcha": false,
                                                                                            "has_urgent_text": false,
                                                                                            "has_visible_qrcode": false
                                                                                          }
                                                                                          URL: https://euroservis.basiic.net/4fHFE/ Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "brands": [
                                                                                              "Microsoft"
                                                                                            ]
                                                                                          }
                                                                                          URL: https://euroservis.basiic.net/4fHFE/ Model: gpt-4o
                                                                                          ```json{  "legit_domain": "microsoft.com",  "classification": "wellknown",  "reasons": [    "The brand 'Microsoft' is classified as 'wellknown'.",    "The legitimate domain for Microsoft is 'microsoft.com'.",    "The provided URL 'euroservis.basiic.net' does not match the legitimate domain for Microsoft.",    "The domain 'basiic.net' is unrelated to Microsoft and could be a potential phishing attempt.",    "The use of a subdomain 'euroservis' and an unrelated main domain 'basiic.net' is suspicious.",    "The input fields 'Email, phone, or Skype' are commonly targeted in phishing attempts to collect personal information."  ],  "riskscore": 9}
                                                                                          Google indexed: False
                                                                                          URL: euroservis.basiic.net
                                                                                                      Brands: Microsoft
                                                                                                      Input Fields: Email, phone, or Skype
                                                                                          URL: https://euroservis.basiic.net/4fHFE/ Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "contains_trigger_text": true,
                                                                                            "trigger_text": "We couldn't find an account with that username. Try another account.",
                                                                                            "prominent_button_name": "next",
                                                                                            "text_input_field_labels": [
                                                                                              "steve@outlook.it"
                                                                                            ],
                                                                                            "pdf_icon_visible": false,
                                                                                            "has_visible_captcha": false,
                                                                                            "has_urgent_text": false,
                                                                                            "has_visible_qrcode": false
                                                                                          }
                                                                                          URL: https://euroservis.basiic.net/4fHFE/ Model: claude-3-haiku-20240307
                                                                                          ```json
                                                                                          {
                                                                                            "brands": [
                                                                                              "Microsoft"
                                                                                            ]
                                                                                          }
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):231348
                                                                                          Entropy (8bit):4.394749151135462
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:18F8B51800C3E215D7D63932022A21DD
                                                                                          SHA1:632BA0EADDEEC8386B52ABDFD73FCB940C4B51D0
                                                                                          SHA-256:EC80C6BE0C02F73A8D0C3EBEBF9EEE25AE6DBBEFE50B4F76E81EE2D93F489FFA
                                                                                          SHA-512:0DF090067107D7BA803EDC7187E53907FE0C805D17332F82683519397010768439787D959D2CE09A86761AA1E13BFB174BB922498331376CF930B5395D161B8B
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:TH02...... .0.&`.&......SM01X...,...`..`.&..........IPM.Activity...........h...............h............H..h$........Gp....h........`...H..h\cal ...pDat...h....0..........h.E.............h........_`Ok...h.D..@...I.lw...h....H...8.Tk...0....T...............d.........2h...............k_.D.....e.....!h.............. h.............#h....8.........$h`.......8....."hP.............'h..............1h.E..<.........0h....4....Tk../h....h.....TkH..h.5..p...$.....-h ............+hCB.......................... ..............F7..............FIPM.Activity....Form....Standard....Journal Entry...IPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000.GwwMicrosoft...This form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:XML 1.0 document, ASCII text, with very long lines (2195), with no line terminators
                                                                                          Category:modified
                                                                                          Size (bytes):2195
                                                                                          Entropy (8bit):5.113312154345127
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:C880940B984DF9EBD4753C9DC0AE847C
                                                                                          SHA1:EA093DD2C26F58FDA3ABDC04686FA34557868341
                                                                                          SHA-256:81883EB5BAFC3DEDC9B95BED97FCE18E498DE4C292E329950B249D60D8AD9D3D
                                                                                          SHA-512:0227BC0F22342EE968BC4D9773C71586220908E6D0C7CC6A9879EDD5F3DD8DC8A5DA1CB0161B04B9BB9257DC8CC7E4AD9FECA4303946F60D81808898E3CB3001
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?><root><version>1</version><Count>14</Count><Resource><Id>Aptos_26215680</Id><LAT>2024-10-24T11:39:53Z</LAT><key>29939506207.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos_45876480</Id><LAT>2023-10-06T09:25:29Z</LAT><key>27160079615.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_26215424</Id><LAT>2023-10-06T09:25:29Z</LAT><key>31558910439.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Display_26215680</Id><LAT>2023-10-06T09:25:29Z</LAT><key>23001069669.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_45876224</Id><LAT>2023-10-06T09:25:29Z</LAT><key>24153076628.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Display_45876480</Id><LAT>2023-10-06T09:25:29Z</LAT><key>30264859306.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos_
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:JSON data
                                                                                          Category:dropped
                                                                                          Size (bytes):521377
                                                                                          Entropy (8bit):4.9084889265453135
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:C37972CBD8748E2CA6DA205839B16444
                                                                                          SHA1:9834B46ACF560146DD7EE9086DB6019FBAC13B4E
                                                                                          SHA-256:D4CFBB0E8B9D3E36ECE921B9B51BD37EF1D3195A9CFA1C4586AEA200EB3434A7
                                                                                          SHA-512:02B4D134F84122B6EE9A304D79745A003E71803C354FB01BAF986BD15E3BA57BA5EF167CC444ED67B9BA5964FF5922C50E2E92A8A09862059852ECD9CEF1A900
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:{"MajorVersion":4,"MinorVersion":40,"Expiration":14,"Fonts":[{"a":[4294966911],"f":"Abadi","fam":[],"sf":[{"c":[1,0],"dn":"Abadi","fs":32696,"ful":[{"lcp":983041,"lsc":"Latn","ltx":"Abadi"}],"gn":"Abadi","id":"23643452060","p":[2,11,6,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":26215680},{"c":[1,0],"dn":"Abadi Extra Light","fs":22180,"ful":[{"lcp":983042,"lsc":"Latn","ltx":"Abadi Extra Light"}],"gn":"Abadi Extra Light","id":"17656736728","p":[2,11,2,4,2,1,4,2,2,4],"sub":[],"t":"ttf","u":[2147483651,0,0,0],"v":197263,"w":13108480}]},{"a":[4294966911],"f":"ADLaM Display","fam":[],"sf":[{"c":[536870913,0],"dn":"ADLaM Display Regular","fs":140072,"ful":[{"lcp":983040,"lsc":"Latn","ltx":"ADLaM Display"}],"gn":"ADLaM Display","id":"31965479471","p":[2,1,0,0,0,0,0,0,0,0],"sub":[],"t":"ttf","u":[2147491951,1107296330,0,0],"v":131072,"w":26215680}]},{"a":[4294966911],"f":"Agency FB","fam":[],"sf":[{"c":[536870913,0],"dn":"Agency FB Bold","fs":54372,"ful":[{"lcp":9830
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:TrueType Font data, 20 tables, 1st "GDEF", 32 names, Macintosh, Copyright \251 2004 - 2017 Monotype GmbH. All rights reserved.Avenir Next LT ProBoldMonotype Ima
                                                                                          Category:dropped
                                                                                          Size (bytes):103956
                                                                                          Entropy (8bit):6.311905251881408
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:DC3944D3250416223933AC60B076E979
                                                                                          SHA1:292C506D0F84C6EDFF4E04B1E3637EFD095E4390
                                                                                          SHA-256:28023B68E674F3BE1CE0EEEB89D08129EC78D9A1F0BF3CACFB9BB9EEC1ECC35E
                                                                                          SHA-512:3255DC91849286F7C4FE5C6DA5A2615CEF434D61BDF02332E8C5CFA743003443A74C9A7333033F9B485C6C003421F3263DEF1188811CAB80FE8C310766AD5145
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:...........@GDEF...w.._....*GPOS......_...#.GSUB.s..........OS/2..\........`VDMXo.v.........cmap.a.........2cvt .T..........fpgm...........&gasp......_.....glyf.OS...!....bhead."Z....L...6hhea...........$hmtx.y.,...(....kern.b.J......r.loca..H....@...`maxp........... metap..1.......0namei?...?.....post...O..O.....prep.<@.... ...........=-.|._.<..................m.A......................................................./...../.d...N.........\...|.G...............3.......3.......f.7................P. J........MONO. .............. .............. ...................................................D...R.....R...R.1...1...........................'.R.........................;.......5.......R...R.....R...R...R...R...R...P...R.'.R...........J.N...................................u...3.......Z...Z...Z.....P...P...D...D...D...D...D...D...D.1.D.F.....P...P.D.P...P...P...P...P...P...P.....D.P.....^.o.^...^...^...^...d.......b...d.............P...P...P...P...P...1...P...P.B...F...B.P.+...........V..
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:TrueType Font data, 20 tables, 1st "GDEF", 32 names, Macintosh, Copyright \251 2004 - 2017 Monotype GmbH. All rights reserved.Avenir Next LT ProRegularMonotype
                                                                                          Category:dropped
                                                                                          Size (bytes):102824
                                                                                          Entropy (8bit):6.304446798040571
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:C47CF8935E2F2DC88FED986342229F50
                                                                                          SHA1:EC799EEA286C31349BD40A70A9057BC81217082E
                                                                                          SHA-256:0924698340C40827289297AD9B9C5D36D3F91D2E7A7E75E76AE4B8D82C46616A
                                                                                          SHA-512:81F61D3120CF0F893B1CC32288E7E6165C1F49ECBADDC0A8AC10365370D50F7BACA9AE463C148A5A80480636470EDB8DE0FE3BDEF5E2C2BF29FEE1C40106DDD7
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:...........@GDEF...w..]....*GPOS".Ky..^...!VGSUB.s.....`....OS/2.sY".......`VDMXo.v.........cmap.a.........2cvt ./.{........fpgm...........&gasp......].....glyf...9..!.....head..Y....L...6hhea...........$hmtx"......(....kern...W.....q.loca......X...`maxp........... metap..1...x...0name9:.u..>|...{post...O..M.....prep..... ...........=.o.._.<..................m.B.\...............................\.m.................../...../.l...W.........\...K.I.......4.......3.......3.......f.7................P. J........MONO.@.............. .............. .............................................................s...s.................................;.s...........................3.......................s...s...s...s...s...s...s...............s.......f...f.................................1.'...............?...?.F.q.F.q.F.q.F.q.F.q.F.q.F.q...s.......s...s...s...b...s...s...s...s...s.\.....s...................................................s...s...s...s...s...b...s...s...........s.......N...N....
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:TrueType Font data, 10 tables, 1st "OS/2", 7 names, Microsoft, language 0x409, \251 2018 Microsoft Corporation. All Rights Reserved.msofp_4_40RegularVersion 4.40;O365
                                                                                          Category:dropped
                                                                                          Size (bytes):773040
                                                                                          Entropy (8bit):6.55939673749297
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:4296A064B917926682E7EED650D4A745
                                                                                          SHA1:3953A6AA9100F652A6CA533C2E05895E52343718
                                                                                          SHA-256:E04E41C74D6C78213BA1588BACEE64B42C0EDECE85224C474A714F39960D8083
                                                                                          SHA-512:A25388DDCE58D9F06716C0F0BDF2AEFA7F68EBCA7171077533AF4A9BE99A08E3DCD8DFE1A278B7AA5DE65DA9F32501B4B0B0ECAB51F9AF0F12A3A8A75363FF2C
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:........... OS/29....(...`cmap.s.,.......pglyf..&....|....head2..........6hheaE.@v.......$hmtx...........@loca.U.....8...Dmaxp........... name.P+........post...<...... .........b~1_.<...........<......r......Aa...................Q....Aa....Aa.........................~...................................................3..............................MS .@.......(...Q................. ...........d...........0...J.......8.......>..........+a..#...,................................................/...K.......z...............N......*...!...-...+........z.......h..%^..3...&j..+...+%..'R..+..."....................k......$A...,.......g...&...=.......X..&........*......&....B..(B...............#.......j...............+...P...5...@...)..........#...)Q...............*...{.. ....?..'...#....N...7......<...;>.............. ]...........5......#....s.......$.......$.......^..................+...>....H.......%...7.......6.......O...V...........K......"........c...N......!...............$...&...*p..
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):322260
                                                                                          Entropy (8bit):4.000299760592446
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:CC90D669144261B198DEAD45AA266572
                                                                                          SHA1:EF164048A8BC8BD3A015CF63E78BDAC720071305
                                                                                          SHA-256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
                                                                                          SHA-512:16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:51253fe60063c31af0d295afb42228b0:v2:2:1:1590:2:8479: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
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:ASCII text, with no line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):10
                                                                                          Entropy (8bit):2.321928094887362
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:7537E6A2BD113548F3866F71B5F269EA
                                                                                          SHA1:BBA89D45692D079AEAED80C3B063C35FE9F5AF21
                                                                                          SHA-256:DCD6E793BF6CDA12CD4336470EA424D7862DE0AB628429C41B4AC0660E095BB8
                                                                                          SHA-512:20B716C09E1312F3D64132A371F6F3F7849162F8BE50605C97384EE5D45B54E24584B393A7992C766588439421262DE6899080942244F8FFF97D27B54325BFD0
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:1729769995
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:SQLite Rollback Journal
                                                                                          Category:dropped
                                                                                          Size (bytes):4616
                                                                                          Entropy (8bit):0.13760166725504608
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:FE981A6130A7192B97B3926833CCC213
                                                                                          SHA1:599FE047532A71980646C79A9FA615FD68EE3AB7
                                                                                          SHA-256:2E6E0A555A8C1F6837B541E25D81C2BD4FDAB33C34E78BDE21FAC6A241918790
                                                                                          SHA-512:0357EB87B4A2434BE9E3312676D7899E13920F025E24A7191E9BB80F141E067E884366783DDCD457389DF726E4F980CA45047116D36EA1E0DFC796D34EB74C30
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:.... .c.......%....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ .......................................................................... .................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 177x177, components 3
                                                                                          Category:dropped
                                                                                          Size (bytes):25867
                                                                                          Entropy (8bit):7.698778588626363
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:8892E439B5CFAFDE3D87E6EBC6103F26
                                                                                          SHA1:C28F83FD79763BCEC5C6955C73C5B02A0562CD5D
                                                                                          SHA-256:59218FE5DCE5EEAFBA91D8883D0840C96C9DE925FD8196F0D013321E5B9E6308
                                                                                          SHA-512:49730A1F4C87EE2FB418ABF153F89BB806A975EBC0C3A57F0620FEDA6D4310903E392CDEC84487BAD500F751DBA293705031734C33F943C7023D41E4CB59EA75
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:......JFIF.....,.,.....dPhotoshop 3.0.8BIM.......,..Z...%G.........>..20201127..?..122551+01008BIM.%.........+lD..C-.,..3N....http://ns.adobe.com/xap/1.0/.<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="XMP Core 5.4.0"> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmpMM:InstanceID="xmp.iid:f543af56-7936-42e7-9db9-33792480737f" xmpMM:DocumentID="adobe:docid:photoshop:7e77c88b-a574-4141-8af3-c577192a759d" xmpMM:OriginalDocumentID="xmp.did:d42309b0-6de5-475a-aa5b-58c84a606b35" xmp:ModifyDate="2020-11-27T12:25:51+01:00" xmp:CreatorTool="Adobe Photoshop 21.2 (Macintosh)" xmp:MetadataDate="2020-11-27T12:25:51+01:00" xmp:CreateDate="2020-11-27T12:25:
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:PNG image data, 40 x 40, 8-bit/color RGBA, non-interlaced
                                                                                          Category:dropped
                                                                                          Size (bytes):560
                                                                                          Entropy (8bit):7.391782030480221
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:B17C3DA71EF9089E6B4D93CC3710178E
                                                                                          SHA1:2E252640729F0A957398DAC7545317F225DF18B6
                                                                                          SHA-256:6EFF14D37801903459C3952A38FE9D2509001BE32DA489A6DDBE482D784ED6C9
                                                                                          SHA-512:C228C5E0FBCD65E0FD92FE6AF7B33E9F7330B955341E0BEFE8A8338AEC6435A681BC902F6B81D741A225C883D595AFC9369AF0476DC974F68950CE0E5EEA69B2
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:.PNG........IHDR...(...(........m....pHYs...%...%.IR$.....sRGB.........gAMA......a.....IDATx..m.0.E/Q.h7....J7..4..(.....@...t.f.2B....u.T.N.......~.......$$..0.'..a..i. X.V.....B\.B.p...B.}.e[.$$.%q?Bp].i. >p....^e..[.h4.K.n.J.\_...B$R..<.........2....#O$[.7B.1....D..U.[..*P.J......>..X..T..S`.$..g%.E..y....._.M.........'...|NAd-.t}.u|NJ.O..f.....`'PJDJ.....~?.-...u.+)....7C...kNJhnq.jV.M5.l...g`.~&%.r...q e:..r..%gZ.\.7&..%`.Cs...X...}71mc.yN.;W.lQ...5..}...Q.N...6.y.(..v.......j*.Lv.....!...Z...0N.y....M..8...%.......IEND.B`.
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced
                                                                                          Category:dropped
                                                                                          Size (bytes):560
                                                                                          Entropy (8bit):7.202675966728479
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:C8BF8E6B73F65643F299721BE280AFD4
                                                                                          SHA1:3C1302210ED6D13A3D98E8D512F4F72DA066E2E9
                                                                                          SHA-256:C201EFFC2BAD916AD6DFCF3A43F301B300F76EAF297BE0A3E024AA6BCC0B693B
                                                                                          SHA-512:378E599691264A337FE122BB250CC95291812A30B81DB188286B875BD2FB3129E9B03B0C29B6E3F87EE06A522511E99D67A6489F4CAA8077E9AFEB852772E9E5
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:.PNG........IHDR...`...`......w8....tEXtSoftware.Adobe ImageReadyq.e<....IDATx...N.A...o[.P.4."6."..........b........h-.G..@T.B0.h.-...2.......lV.1..g.............Yd.0.R...Yu...y.......0,~.5....B..`........l.:...e.jz.. ;..........y..:!..,.J.m.}#...a.4Z..........k..^%.....:QNx.......]d.. ..V...$.../..49'.nI3.f...-.=..S.+.t...}0G..P/............q....6..?..J@.../......f........0.........a:.#<...t...!L.....8lAlA....p....1.!.. :.t..P..........`..?.....3..w..}+.t..x..x.D.......VWQ1J.....B>......|....N).........0.>....Ev>..:.....IEND.B`.
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 177x177, components 3
                                                                                          Category:dropped
                                                                                          Size (bytes):31208
                                                                                          Entropy (8bit):7.573712932465293
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:F3B97ABD4EE80B01A637FC4812697A78
                                                                                          SHA1:2349C7A1FDF00761E7142E9AAB58DD79AF36D8F5
                                                                                          SHA-256:4B2EE52489AFBC050F0B37B739C07E590A32183E2A9BFC3841D29010F00ADB27
                                                                                          SHA-512:F7261ED442850E15DE2298D18F193FE07BE2D30254523563587264164D96AD964F9B02A3D5667B11ECEFD35D7773BE306464FA5D68F005A48A5153502456CB51
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:......JFIF.....,.,......Photoshop 3.0.8BIM.......,..Z...%G.........>..20201127..?..122551+01008BIM.%.........+lD..C-.,..3N8BIM.:....................printOutput........PstSbool.....Inteenum....Inte....Clrm....printSixteenBitbool.....printerNameTEXT.....C.A.N.O.N.-.R.E.C.E.P.T.I.O.N......printProofSetupObjc.....I.m.p.o.s.t.a. .p.r.o.v.a......proofSetup........Bltnenum....builtinProof....proofCMYK.8BIM.;.....-..............printOutputOptions........Cptnbool.....Clbrbool.....RgsMbool.....CrnCbool.....CntCbool.....Lblsbool.....Ngtvbool.....EmlDbool.....Intrbool.....BckgObjc..........RGBC........Rd doub@o..........Grn doub@o..........Bl doub@o..........BrdTUntF#Rlt............Bld UntF#Rlt............RsltUntF#Pxl@r..........vectorDatabool.....PgPsenum....PgPs....PgPC....LeftUntF#Rlt............Top UntF#Rlt............Scl UntF#Prc@Y..........cropWhenPrintingbool.....cropRectBottomlong........cropRectLeftlong........cropRectRightlong........cropRectToplong.....8BIM.........,.......,......8BIM
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:PNG image data, 96 x 96, 8-bit/color RGBA, non-interlaced
                                                                                          Category:dropped
                                                                                          Size (bytes):2877
                                                                                          Entropy (8bit):7.9028514706867385
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:1E13EE0ED09C4AF1ADFB6C0D280879B0
                                                                                          SHA1:1192A79F7B4C4FF814583743F8C66ACA7ECB8ACF
                                                                                          SHA-256:E2395FBA25D3FB8A971345CA65D144F7D9C9D933F70409165446E63D18C0958D
                                                                                          SHA-512:4D86A41DE4B3CA8BB73BF641838953BE03FFF34A890B7BDDC506276186D42979BC99A7DC5553005F135AA1C02137C85C6A2623498C78A617CC195E28FD8B3C95
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:.PNG........IHDR...`...`......w8....sRGB.........IDATx..\}l.G..o..Z....$%i....4P5. Q......*...@...nZ.wg.....%.$M........-.T>$..B.........MA..4Q...v...g..v....q..H.}......};o.D:h.4.....F.rC ..MBp..6.n@x..{(.?.6..1..z.............&....D....P.3A. ....).?.4...2..*.&..?.$...J.d...a&....M@5..^..A....".LBo.q.d.......B.a_I.....i....#...k.. 'h..-.;QmTG...1an...cN..i.."%....5...j...'bQ-...$.s.......T.8.. .$..N...Y..k..P...a..g....>`...Y[#.-..._M.m. *.$.^Ed,.Z..}Y..}.2.c..X....c...$.e{..I.+.+.n.TH........7..k..wCm.....6.'..rd..U0.A..WT.vi.O@"..Jq'F...........NH`.:eb.9.gJ.5..=s.....\...F;.."@fH.i..%\..Z......N3.x..%.n...............}.i..a.....~.I*L.c...7...b....j.!<...ufR.{.._....>..wc...b+.\..._....8.L..f..&..".0...@.%.g ..%...I.-R*D..3!^!..2.(k[..VS.......&.w.I......-..;.{.p..H.4..G.C./.z..UpB.S.2=.U.s.U..]....c...x.4P...c2.{.>.g..v....T.=G..`....:AqJb..{.v.4.......3h.R...3....$u......oVZ.7..a.)b.T..!........Z5.y.H.....h.UCgdr-.?...~..~yF.R,.{.$Hg.=..LB.3!.W...
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:PNG image data, 177 x 177, 8-bit/color RGB, non-interlaced
                                                                                          Category:dropped
                                                                                          Size (bytes):9450
                                                                                          Entropy (8bit):7.885865767097977
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:42BE735F0B6DCF7CFE2DB8798E7510AB
                                                                                          SHA1:4DE2BC672F40D18A7B4B2F2B241CCFC89F76BD37
                                                                                          SHA-256:038D77190A791C976F49F20A906BE7EE229EAB17888BAB6852CEAA4BE7D2E924
                                                                                          SHA-512:1728A030554D12962B282227D0539309BDDD4C841B7287C7BB901AC7061959746742C0687522CD4D23A0DE4329A7B2DF21D839A201C85DD59FE211B942BD1A5C
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:.PNG........IHDR..............K.....pHYs...#...#.x.?v....iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c002 79.164460, 2020/05/12-16:04:17 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmp:CreatorTool="Adobe Photoshop 21.2 (Macintosh)" xmp:CreateDate="2020-11-27T12:24:31+01:00" xmp:MetadataDate="2020-11-27T12:24:31+01:00" xmp:ModifyDate="2020-11-27T12:24:31+01:00" xmpMM:InstanceID="xmp.iid:47fb4f26-90d4-4833-bfcd-edcf764f2bf3" xmpMM:DocumentID="adobe:docid:photoshop:a8006e65-e353-0242-a373-e91f17b0947e" xmpMM:OriginalDocumentID="xmp.did:96ad4c69-93ef-445a-80a0-8ca1fc91373d" dc:format="im
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):26
                                                                                          Entropy (8bit):3.95006375643621
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
                                                                                          SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
                                                                                          SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
                                                                                          SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:[ZoneTransfer]..ZoneId=3..
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:PNG image data, 1994 x 651, 8-bit/color RGB, non-interlaced
                                                                                          Category:dropped
                                                                                          Size (bytes):62036
                                                                                          Entropy (8bit):7.906956676977432
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:8876D85ABFA5E6712EBD0B4A0AC3EEE2
                                                                                          SHA1:C1BCE7BB240717D902A5166594BD97BA3675F150
                                                                                          SHA-256:2B7826546E82266BFCC9B90411046B13F57C0D72EA402B9DBB9904CE0E3F37A6
                                                                                          SHA-512:B90A996A77545E7E625302BB372DFBC4BB227A60886A2970106DF701E070AF97F7CF31A1D07850C27E691C84EF04985A2BCE1035CE9317CDC1DC9760E57E6BEF
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:.PNG........IHDR.....................pHYs...#...#.x.?v.. .IDATx....P\.}....,..{1.dE.AB.b..R.m..*....e.L..{......n'_}....8Q.z.L.N....s#......u\.k-q|.:.@..J.D.EA....v....:2&...r~.....X..|.s@.^../.N........`W.....r{`7..`45.V.5..#......x...........jR.]l*..LuI..bO.!;..h...S#.7.R.............Q6.v...V.WC..(.....R_r.Q...J.m.......Q...D...[..].L.>r@...h$d.......r..`.......g6.Lq..6._p9r.]...1...0."..4h.:...............jf.a.....9.>.k........O..M..N.a?......9..../.0?...X..Q.N-d..m.8...x...+b'_.......L.T....J"5HE..b.x]33.w`.x......9.&..I..!X......v ...d...v.i..Q.~-d.FZ....bie\.i.uU..V.......(..k..d.).!.x]33C`.q..&5.L...LZ.O.5.|..>N.......lH.;......k.JB..2..*.q7..S...`T....J......... .P.(.5q....=^...#....FBv..T./9.(.l.F.........[Y...../..r.`.....x...+b.{.8.".`]..s........,rD]...y_XK.x]#..'{wM.....6.......]..........d...v....[.....k..S..0...o.uE.................5....#..!d.lB...gk..{........#LO,....8......kT._...V....H+..H.../8.................F..S...=5..fBv.4ie<
                                                                                          Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):30
                                                                                          Entropy (8bit):1.2389205950315936
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:96C9159E9F05B0419E3DCC4EBE20F368
                                                                                          SHA1:0C677F90B03A974B471B8D608C12706F1E743FC9
                                                                                          SHA-256:1ED5DF17D4A58C96388ACAD96F8F123C6DE5A61839752580A842DBD0F4553F2C
                                                                                          SHA-512:E9BA938D072FE01DA27C8951039790DA7FB245AF4CC519ECA4BD95381CDC6D6345C4645E62C755C268FF7B8C76543F66C3E3DC2C0C7341A0A88353E660FB4347
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:....a.........................
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 10:40:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                          Category:dropped
                                                                                          Size (bytes):2673
                                                                                          Entropy (8bit):3.983443441337046
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:9C425B248C7BF7D646604E02934F1B9E
                                                                                          SHA1:256885ED7402BD091EDD3C1D158BC39F3334E731
                                                                                          SHA-256:4C9ADC30D4D6FE2728345C5912A262895F6EE2C67C5C2A9DE7C98144E3502803
                                                                                          SHA-512:229EF50BAB9E97C377890310F7F73EB89BE1BB9F8DC02A7F96F76BA9A8DC5E0D3738691942352D180440A4AAA88C70F2D9B43081994A579F5A10E95CE96535CC
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:L..................F.@.. ...$+.,......m{.&..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IXY.\....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VXY.]....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VXY.]....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VXY.]..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VXY.]...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............kB......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 10:40:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                          Category:dropped
                                                                                          Size (bytes):2675
                                                                                          Entropy (8bit):4.000223881614656
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:56585D9192EA3543C5E3DC5F5EB0A8C2
                                                                                          SHA1:470ADC52F5B0D12C2E72A158742E14FB89DE358A
                                                                                          SHA-256:6B9F22725D3D923A9E9E6129B4CEAE738EBABBB534F153E8BBFE0A427A61AF7A
                                                                                          SHA-512:183A7BC3EE924914EB91995AD288DBE12026133880130DEBD94EB77D92DB5BD9C50C07508BBEE87463AF2DF8D484D4A33A9BC5FF4C698FB55D6827B0FBBF3F57
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:L..................F.@.. ...$+.,......\{.&..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IXY.\....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VXY.]....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VXY.]....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VXY.]..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VXY.]...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............kB......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                          Category:dropped
                                                                                          Size (bytes):2689
                                                                                          Entropy (8bit):4.007277491500882
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:5259F31A15D3C65584D6E02ADEF51BA9
                                                                                          SHA1:654F53D7F2F7B4A59D382F4D0CF7636EB16B64A4
                                                                                          SHA-256:D1C4C8F6AEE0C3C01D4BA8482F8D80CD87567659A862883A51B0AEF91DBDFD70
                                                                                          SHA-512:4B0E6643430766FB2744579221E24A68C1F1A87B01AE8AA018E416461F9980E9D52BF3339D94B8FA736B69F0B21ED407DE603E2B0532E4E5CB6196733B72F491
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IXY.\....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VXY.]....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VXY.]....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VXY.]..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............kB......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 10:40:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                          Category:dropped
                                                                                          Size (bytes):2677
                                                                                          Entropy (8bit):3.99707149647577
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:21637D76B252CA4FC8B7251241367138
                                                                                          SHA1:2C2DE0267BBC5313F44B690C8A72CA6AFBDC6707
                                                                                          SHA-256:CF8D47DE630B79AA705D91669F9C451741A1FBBA595B71818D7C4071AD0A451E
                                                                                          SHA-512:285E184E7AA6D366990BC3A1F49F238EF2B1926E5559BBD21A586AAA175578C3DC0F381622BB51E682ABE611D85AFC3C62C8C460F18EF2A568192511A22E89F1
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:L..................F.@.. ...$+.,......V{.&..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IXY.\....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VXY.]....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VXY.]....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VXY.]..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VXY.]...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............kB......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 10:40:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                          Category:dropped
                                                                                          Size (bytes):2677
                                                                                          Entropy (8bit):3.9869587655153826
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:A3DAB4925CC55D43578FD3BCB3C11450
                                                                                          SHA1:791016A75A0C1DC7B1CA288E25C25EE1587A29D5
                                                                                          SHA-256:71C785336691CA6780052C7D947715793647129BBE74E4C23D67313E6A63715B
                                                                                          SHA-512:6DAB50EF01A3BAA8A4537ECD59F583E7EB61061E26037B2E3C78BBE9E6B54EF064FD63D8DB25708FAEA37394383A19264333B9E58A113B8B6E3F70ABF56C562A
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:L..................F.@.. ...$+.,......c{.&..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IXY.\....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VXY.]....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VXY.]....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VXY.]..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VXY.]...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............kB......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 24 10:40:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                          Category:dropped
                                                                                          Size (bytes):2679
                                                                                          Entropy (8bit):3.9932744483415346
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:17DF757506AA39D29FB376277C35E29E
                                                                                          SHA1:BCC7D74C106AC37399CCDB10B3E6E27424E72C9A
                                                                                          SHA-256:4753881154FA4E2431160A9BA7763B10278F5651F6941C88E9997734126528DD
                                                                                          SHA-512:70D67D449A8248DDE1064C870534A0E97726A13A1880C6BD720D1379976C9B84E0711DB2583D638963A657199911755FD2906F4494ED63687DCFCCCC5AAC926F
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:L..................F.@.. ...$+.,.....CL{.&..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IXY.\....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VXY.]....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VXY.]....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VXY.]..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VXY.]...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............kB......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):2877728
                                                                                          Entropy (8bit):6.868480682648069
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:477C17B6448695110B4D227664AA3C48
                                                                                          SHA1:949FF1136E0971A0176F6ADEA8ADCC0DD6030F22
                                                                                          SHA-256:CB190E7D1B002A3050705580DD51EBA895A19EB09620BDD48D63085D5D88031E
                                                                                          SHA-512:1E267B01A78BE40E7A02612B331B1D9291DA8E4330DEA10BF786ACBC69F25E0BAECE45FB3BAFE1F4389F420EBAA62373E4F035A45E34EADA6F72C7C61D2302ED
                                                                                          Malicious:false
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                          Reputation:unknown
                                                                                          Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....fd.........." ......(..........A&.......................................,.......,...`A.........................................V*......V*......`,......`+..p....+. )...p,......D*.8....................C*.(.....(.8...........p\*..............................text.....(.......(................. ..`.rdata..h.....(.......(.............@..@.data....l....*..&....*.............@....pdata...p...`+..r....*.............@..@.00cfg..(.....+......p+.............@..@.gxfg....$....+..&...r+.............@..@.retplnel.... ,.......+..................tls.........0,.......+.............@....voltbl.D....@,.......+................._RDATA.......P,.......+.............@..@.rsrc........`,.......+.............@..@.reloc.......p,.......+.............@..B........................................................................................................................................
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:JSON data
                                                                                          Category:dropped
                                                                                          Size (bytes):1778
                                                                                          Entropy (8bit):6.02086725086136
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:3E839BA4DA1FFCE29A543C5756A19BDF
                                                                                          SHA1:D8D84AC06C3BA27CCEF221C6F188042B741D2B91
                                                                                          SHA-256:43DAA4139D3ED90F4B4635BD4D32346EB8E8528D0D5332052FCDA8F7860DB729
                                                                                          SHA-512:19B085A9CFEC4D6F1B87CC6BBEEB6578F9CBA014704D05C9114CFB0A33B2E7729AC67499048CB33823C884517CBBDC24AA0748A9BB65E9C67714E6116365F1AB
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:[{"description":"treehash per file","signed_content":{"payload":"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","signatures":[{"header":{"kid":"publisher"},"protected":"eyJhbGciOiJSUzI1NiJ9","signature":"KTPeHzS0ybFaz3_br3ASYWHjb6Ctul92067u2JMwtNYYm-4KxLiSkJZNBIzhm6hNSEW2p5kUEvHD0TjhhFGCZnWm9titj2bqJayCOAGxZb5BO74JJCRfy5Kwr1KSS4nvocsZepnHBmCiG2OV3by-Lyf1h1uU3X3bDfD92O0vJzrA8rwL2LrwIk-BolLo5nlM0I_MZwg8DhZ8SFBu9GGRVB2XrailDrv4SgupFE9gqA1HY6kjRjoyoAHbRRxZdBNNt9IKNdxNyaF9NcNRY8dAedNQ9Tw3YNp5jB7R9lcjO4knn58RdH2h_GiJ4l96StcXA4e7cqbJ77P-c
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:ASCII text, with no line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):66
                                                                                          Entropy (8bit):3.974403644129192
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:D30A5BBC00F7334EEDE0795D147B2E80
                                                                                          SHA1:78F3A6995856854CAD0C524884F74E182F9C3C57
                                                                                          SHA-256:A08C1BC41DE319392676C7389048D8B1C7424C4B74D2F6466BCF5732B8D86642
                                                                                          SHA-512:DACF60E959C10A3499D55DC594454858343BF6A309F22D73BDEE86B676D8D0CED10E86AC95ECD78E745E8805237121A25830301680BD12BFC7122A82A885FF4B
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:1.c900ba9a2d8318263fd43782ee6fd5fb50bad78bf0eb2c972b5922c458af45ed
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:JSON data
                                                                                          Category:dropped
                                                                                          Size (bytes):145
                                                                                          Entropy (8bit):4.595307058143632
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:BBC03E9C7C5944E62EFC9C660B7BD2B6
                                                                                          SHA1:83F161E3F49B64553709994B048D9F597CDE3DC6
                                                                                          SHA-256:6CCE5AD8D496BC5179FA84AF8AFC568EEBA980D8A75058C6380B64FB42298C28
                                                                                          SHA-512:FB80F091468A299B5209ACC30EDAF2001D081C22C3B30AAD422CBE6FEA7E5FE36A67A8E000D5DD03A30C60C30391C85FA31F3931E804C351AB0A71E9A978CC0F
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:{. "manifest_version": 2,. "name": "windows-mf-cdm",. "version": "1.0.2738.0",. "accept_arch": [. "x64",. "x86_64",. "x86_64h". ].}
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):74272
                                                                                          Entropy (8bit):5.535436646838848
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:B23DD5B6ECCB460003EA37BA0F5E3730
                                                                                          SHA1:FD444553CB7699F84CE7E5664232771673DCF67D
                                                                                          SHA-256:7F7F432C27D97DEE184DCD3EA20F731674C008BE849C0136F9C5358E359F3EA9
                                                                                          SHA-512:7E47BD172C4BD4C65F063A8FA3FB33ED47F29156EB20E42D4E8EA73C6F02526A30FFE907BE5B7C1406D4EAA71FBEC7C0D557C376DCCD0A1A961E2F61B3431181
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:............0.8.@.R.-728x90...........0.8.@.R.adtdp.com^..........0.8.@.R.yomeno.xyz^..........0.8.@.R.yellowblue.io^..........0.8.@.R.thubanoa.com^..........0.8.@.R.ad999.biz^..........0.8.@.R._468_60...........0.8.@.R.adrecover.com^..........0.8.@.R.pemsrv.com^..........0.8.@.R.mnaspm.com^..........0.8.@.R..ar/ads/."......0.8.@.R./plugins/cactus-ads/.,........0.8.@.R.mysmth.net/nForum/*/ADAgent_.>........*...worldstar.com0.8.@.R.js.assemblyexchange.com/wana...........0.8.@.R.indoleads.com^.%......0.8.@.R.discordapp.com/banners/.(........0.8.@.R.looker.com/api/internal/.#........0.8.@.R.broadstreetads.com^.(........0.8.@.R.shikoku-np.co.jp/img/ad/..........0.8.@.R./banner.cgi?..........0.8.@.R./in/track?data=.!......0.8.@.R.linkbucks.com/tmpl/..........0.8.@.R.clicktripz.com^..........0.8.@.R.-ad-manager/..........0.8.@.R./page-links-to/dist/new-tab.js........0.8.@.R.files.slack.com^.$........0.8.@.R.admitad-connect.com^.2........0.8.@.R"cloudfront.net/js/common/invoke.js..........0.8
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):24623
                                                                                          Entropy (8bit):4.588307081140814
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:D33AAA5246E1CE0A94FA15BA0C407AE2
                                                                                          SHA1:11D197ACB61361657D638154A9416DC3249EC9FB
                                                                                          SHA-256:1D4FF95CE9C6E21FE4A4FF3B41E7A0DF88638DD449D909A7B46974D3DFAB7311
                                                                                          SHA-512:98B1B12FF0991FD7A5612141F83F69B86BC5A89DD62FC472EE5971817B7BBB612A034C746C2D81AE58FDF6873129256A89AA8BB7456022246DC4515BAAE2454B
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:EasyList Repository Licences.... Unless otherwise noted, the contents of the EasyList repository.. (https://github.com/easylist) is dual licensed under the GNU General.. Public License version 3 of the License, or (at your option) any later.. version, and Creative Commons Attribution-ShareAlike 3.0 Unported, or.. (at your option) any later version. You may use and/or modify the files.. as permitted by either licence; if required, "The EasyList authors.. (https://easylist.to/)" should be attributed as the source of the.. material. All relevant licence files are included in the repository..... Please be aware that files hosted externally and referenced in the.. repository, including but not limited to subscriptions other than.. EasyList, EasyPrivacy, EasyList Germany and EasyList Italy, may be.. available under other conditions; permission must be granted by the.. respective copyright holders to authorise the use of their material.......Creative Commons Attribut
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:JSON data
                                                                                          Category:dropped
                                                                                          Size (bytes):1529
                                                                                          Entropy (8bit):5.990179229242317
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:2FF08C4B4128F634CBBFEA0C1C44AA2E
                                                                                          SHA1:45D11E57DDF29E843AC8545C7D06CDDB5DF3E962
                                                                                          SHA-256:33B6F2ECD5FB7F9FAF538F29808716EFA337A653809943A8E4B5E450B734DA09
                                                                                          SHA-512:14BD9E921E1DB9AC8720C1177897DB624292865D29B976ED9CCCEE572726D7D123A8F39E470987DF796AE0552861FBAE056CDB395F0CB8B0E699C28F5E221999
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:[{"description":"treehash per file","signed_content":{"payload":"eyJjb250ZW50X2hhc2hlcyI6W3siYmxvY2tfc2l6ZSI6NDA5NiwiZGlnZXN0Ijoic2hhMjU2IiwiZmlsZXMiOlt7InBhdGgiOiJGaWx0ZXJpbmcgUnVsZXMiLCJyb290X2hhc2giOiJpQTVSR2RtNXU1ZjM2ZTJ0QlhPcmJEcEJQX0NxTFc1VW9GZ0NTQ0diU01rIn0seyJwYXRoIjoiTElDRU5TRS50eHQiLCJyb290X2hhc2giOiIyaWswNmk0TFlCdVNHNWphRGFIS253NE9pdnVSRzZsQ0JKMVk0TGtzRFJJIn0seyJwYXRoIjoibWFuaWZlc3QuanNvbiIsInJvb3RfaGFzaCI6IkZ3Q2hIOUhsZzJlMFVLUWJLdVg5SnV5MXpiUlpocHg1YkgzZUdQSFREM00ifV0sImZvcm1hdCI6InRyZWVoYXNoIiwiaGFzaF9ibG9ja19zaXplIjo0MDk2fV0sIml0ZW1faWQiOiJnY21qa21nZGxnbmtrY29jbW9laW1pbmFpam1tam5paSIsIml0ZW1fdmVyc2lvbiI6IjkuNTEuMCIsInByb3RvY29sX3ZlcnNpb24iOjF9","signatures":[{"header":{"kid":"publisher"},"protected":"eyJhbGciOiJSUzI1NiJ9","signature":"ifBoq-woYhqxB78EqRoo2fPRIEfkuykYMlD9kWeeG2QS6-R5YvGNJ9n5OljLXGjvK5U3MDFRLi-UCguxuUaoFjU_QeSCiOLxvDS5JHdk8Bbba8fCW6ZKnH_fvocQD8W7Hj0reH3gOPmD7sIraz8IvG86GRuGPqsxbgc_BRtOCa5KRgqaxfjt7tKlOtaUoO3_qsNlf_8F8k0tNZh131RRIEaXw53z3ZzGpWtgYC0u6s0JKag8l
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:ASCII text, with no line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):66
                                                                                          Entropy (8bit):3.8568101737886993
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:6DBEDE254AF8A23D6CB2ABAEA8D2E38F
                                                                                          SHA1:A827D46FA5D53CB7B134F143CC15A30BA015ED21
                                                                                          SHA-256:376ED55CD5AB45C0F7BAA1AF0AC2637C33DEA6D1D4683B729AE7CE764F70DAA1
                                                                                          SHA-512:0F28FD8AF582C18ECCCC1321B94902501D31C4B6C1D11684780DED6217C14E1B313F58A644516F37AE69232F1C2861915337A4D84185E18124F40C629A50B7F9
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:1.3651711652892acf34795b2c7e4d401ed2274c20e952f65cf52deeeef5bbf9b5
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:JSON data
                                                                                          Category:dropped
                                                                                          Size (bytes):114
                                                                                          Entropy (8bit):4.547350270682037
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:3448D97DA638C7EF0FBCA9B6949FFC8F
                                                                                          SHA1:36D8434F26F0316FAB4627F7856FCA7291FE8ADF
                                                                                          SHA-256:1700A11FD1E58367B450A41B2AE5FD26ECB5CDB459869C796C7DDE18F1D30F73
                                                                                          SHA-512:9BF9055B2EF82BD1D2A1E94009FED2D3481FE2DC336D306FA0DB786658EFA5B72C9A9A214A829B9FCC4222476051871FF012009C64F09B9109072ABDF3DEF8CC
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:{. "manifest_version": 2,. "name": "Subresource Filtering Rules",. "ruleset_format": 1,. "version": "9.51.0".}
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:ASCII text
                                                                                          Category:dropped
                                                                                          Size (bytes):1558
                                                                                          Entropy (8bit):5.11458514637545
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:EE002CB9E51BB8DFA89640A406A1090A
                                                                                          SHA1:49EE3AD535947D8821FFDEB67FFC9BC37D1EBBB2
                                                                                          SHA-256:3DBD2C90050B652D63656481C3E5871C52261575292DB77D4EA63419F187A55B
                                                                                          SHA-512:D1FDCC436B8CA8C68D4DC7077F84F803A535BF2CE31D9EB5D0C466B62D6567B2C59974995060403ED757E92245DB07E70C6BDDBF1C3519FED300CC5B9BF9177C
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:// Copyright 2015 The Chromium Authors. All rights reserved..//.// Redistribution and use in source and binary forms, with or without.// modification, are permitted provided that the following conditions are.// met:.//.// * Redistributions of source code must retain the above copyright.// notice, this list of conditions and the following disclaimer..// * Redistributions in binary form must reproduce the above.// copyright notice, this list of conditions and the following disclaimer.// in the documentation and/or other materials provided with the.// distribution..// * Neither the name of Google Inc. nor the names of its.// contributors may be used to endorse or promote products derived from.// this software without specific prior written permission..//.// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS.// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT.// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR.// A PARTICULAR
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:JSON data
                                                                                          Category:dropped
                                                                                          Size (bytes):1864
                                                                                          Entropy (8bit):6.021127689065198
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:68E6B5733E04AB7BF19699A84D8ABBC2
                                                                                          SHA1:1C11F06CA1AD3ED8116D356AB9164FD1D52B5CF0
                                                                                          SHA-256:F095F969D6711F53F97747371C83D5D634EAEF21C54CB1A6A1CC5B816D633709
                                                                                          SHA-512:9DC5D824A55C969820D5D1FBB0CA7773361F044AE0C255E7C48D994E16CE169FCEAC3DE180A3A544EBEF32337EA535683115584D592370E5FE7D85C68B86C891
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:[{"description":"treehash per file","signed_content":{"payload":"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","signatures":[{"header":{"kid":"publisher"},"protected":"eyJhbGciOiJSUzI1NiJ9","signature":"dU2MmRUQSugaJAJvEN4uaQHx-KXdOkjj0yK8_aH4Afr3kN7DPOZRt6yLTS3UchBE5M-dgPPPBuKADj4KEK4B22SO6WQquL5J27AUPqQBGgr44-iFGVJdOLLlfirFlJmcYv6DUFRYiPsQFGMr1JFqInj19jgkOxzR6qqcNuTCB0wGEMeTU80r-igCjeQG6TIzPro7yKd_-UxsxO6OGAySmlIJIoU54X0p0ATNoZyAfkhb8kb0oN8unOU
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:ASCII text, with no line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):66
                                                                                          Entropy (8bit):3.9159446964030753
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:CFB54589424206D0AE6437B5673F498D
                                                                                          SHA1:D1EF6314F0F68EFDD0BA8F6CA9E59BFF863B1609
                                                                                          SHA-256:285AC183C35350B4B77332172413902F83726CA8F53D63859B5DA082FD425A1C
                                                                                          SHA-512:70FDCA4A1E6B7A5FFED3414E2DB74FECA7E0FD17482B8CB30393DFEE20AB9AD2B0B00FF0C590DD0E8D744D0EAD876CE8844519AF66618ED14666BCA56DF2DA21
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:1.dbf288588465463a914bdfc5e86d465fb3592b2f1261dc0e40fcc5c1adc8e7e4
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:JSON data
                                                                                          Category:dropped
                                                                                          Size (bytes):85
                                                                                          Entropy (8bit):4.4533115571544695
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:C3419069A1C30140B77045ABA38F12CF
                                                                                          SHA1:11920F0C1E55CADC7D2893D1EEBB268B3459762A
                                                                                          SHA-256:DB9A702209807BA039871E542E8356219F342A8D9C9CA34BCD9A86727F4A3A0F
                                                                                          SHA-512:C5E95A4E9F5919CB14F4127539C4353A55C5F68062BF6F95E1843B6690CEBED3C93170BADB2412B7FB9F109A620385B0AE74783227D6813F26FF8C29074758A1
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:{. "manifest_version": 2,. "name": "First Party Sets",. "version": "2024.8.10.0".}
                                                                                          Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          File Type:JSON data
                                                                                          Category:dropped
                                                                                          Size (bytes):9748
                                                                                          Entropy (8bit):4.629326694042306
                                                                                          Encrypted:false
                                                                                          SSDEEP:
                                                                                          MD5:EEA4913A6625BEB838B3E4E79999B627
                                                                                          SHA1:1B4966850F1B117041407413B70BFA925FD83703
                                                                                          SHA-256:20EF4DE871ECE3C5F14867C4AE8465999C7A2CC1633525E752320E61F78A373C
                                                                                          SHA-512:31B1429A5FACD6787F6BB45216A4AB1C724C79438C18EBFA8C19CED83149C17783FD492A03197110A75AAF38486A9F58828CA30B58D41E0FE89DFE8BDFC8A004
                                                                                          Malicious:false
                                                                                          Reputation:unknown
                                                                                          Preview:{"primary":"https://bild.de","associatedSites":["https://welt.de","https://autobild.de","https://computerbild.de","https://wieistmeineip.de"],"serviceSites":["https://www.asadcdn.com"]}.{"primary":"https://blackrock.com","associatedSites":["https://blackrockadvisorelite.it","https://cachematrix.com","https://efront.com","https://etfacademy.it","https://ishares.com"]}.{"primary":"https://cafemedia.com","associatedSites":["https://cardsayings.net","https://nourishingpursuits.com"]}.{"primary":"https://caracoltv.com","associatedSites":["https://noticiascaracol.com","https://bluradio.com","https://shock.co","https://bumbox.com","https://hjck.com"]}.{"primary":"https://carcostadvisor.com","ccTLDs":{"https://carcostadvisor.com":["https://carcostadvisor.be","https://carcostadvisor.fr"]}}.{"primary":"https://citybibleforum.org","associatedSites":["https://thirdspace.org.au"]}.{"primary":"https://cognitiveai.ru","associatedSites":["https://cognitive-ai.ru"]}.{"primary":"https://drimer.io","asso
                                                                                          File type:RFC 822 mail, ASCII text, with CRLF line terminators
                                                                                          Entropy (8bit):6.025119309004493
                                                                                          TrID:
                                                                                          • E-Mail message (Var. 5) (54515/1) 100.00%
                                                                                          File name:attachment(1).eml
                                                                                          File size:1'119'972 bytes
                                                                                          MD5:0dede3f92bef4730ef21e6e143c87140
                                                                                          SHA1:5617a99b3e4d541a36a45f8fe35a3a364601ea08
                                                                                          SHA256:1c6d6635a271e90527917b6493ea85c0c7b8011f421ba6338bfe55d91162ca44
                                                                                          SHA512:7ed9e3e3d74d05be5e90c86b0700fa6956baba36aacf08996087d3fe3afde57c2301f16980f6b3297e9746b3df3e0dceb096799a80c24661a758fa80560c8455
                                                                                          SSDEEP:12288:Zt75FNWVLpHNWVL3oNWVL3bNWVLCRNWVLbDNWVLeo+ZIyW47+ZIyW2E+ZIyW+i++:ZXaraYaBamataRwWYwWBwWvwWPwWtwWN
                                                                                          TLSH:373502732DA17FE65B21C5D360CD28E21FDC379744A0542AB8B8AD9531DA0D0ABF642F
                                                                                          File Content Preview:Received: from PA4PR07MB7389.eurprd07.prod.outlook.com (::1) by.. VI1PR07MB9755.eurprd07.prod.outlook.com with HTTPS; Thu, 24 Oct 2024 09:36:09.. +0000..Received: from DBBPR09CA0020.eurprd09.prod.outlook.com (2603:10a6:10:c0::32).. by PA4PR07MB7389.eurprd
                                                                                          Subject:I: Furio Sterni ha condiviso la cartella "Documentazione" con te
                                                                                          From:Furio Sterni <furio.sterni@euroservis.eu>
                                                                                          To:Furio Sterni <furio.sterni@euroservis.eu>
                                                                                          Cc:
                                                                                          BCC:
                                                                                          Date:Thu, 24 Oct 2024 11:35:52 +0200
                                                                                          Communications:
                                                                                          • Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch importante CAUTION: This email sent from an EXTERNAL SENDER. Please BE CAREFUL to links and attachments! Salve, Vedi allegato. Grazie. FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 Euroservis S.r.l. Riva Tommaso Gulli, 12 34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu www.euroservis.eu Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella "Documentazione" con te Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. <!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4;} @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4;} @font-face {font-family:Aptos;} @font-face {font-family:"Segoe UI Emoji"; panose-1:2 11 5 2 4 2 4 2 2 3;} @font-face {font-family:"Avenir Next LT Pro";} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in; font-size:12.0pt; font-family:"Aptos",sans-serif;} a:link, span.MsoHyperlink {mso-style-priority:99; color:blue; text-decoration:underline;} span.entitydelimiterbefore {mso-style-name:entitydelimiterbefore;} span.entity {mso-style-name:_entity;} span.entitydelimiterafter {mso-style-name:entitydelimiterafter;} span.EmailStyle22 {mso-style-type:personal-compose; font-family:"Times New Roman",serif; color:black;} .MsoChpDefault {mso-style-type:export-only; font-size:10.0pt; mso-ligatures:none;} @page WordSection1 {size:8.5in 11.0in; margin:1.0in 1.0in 1.0in 1.0in;} div.WordSection1 {page:WordSection1;} --> Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch importante CAUTION: This email sent from an EXTERNAL SENDER. Please BE CAREFUL to links and attachments! Salve, Vedi allegato. Grazie. FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 Euroservis S.r.l. Riva Tommaso Gulli, 12 34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu www.euroservis.eu Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella "Documentazione" con te Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch importante Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch importante Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch importante Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch importante Non ricevi spesso messaggi di posta elettronica da furio.sterni@euroservis.eu. Scopri perch importante Scopri perch importante https://aka.ms/LearnAboutSenderIdentification CAUTION: This email sent from an EXTERNAL SENDER. Please BE CAREFUL to links and attachments! Salve, Vedi allegato. Grazie. FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 Euroservis S.r.l. Riva Tommaso Gulli, 12 34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu www.euroservis.eu Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella "Documentazione" con te Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. CAUTION: This email sent from an EXTERNAL SENDER. Please BE CAREFUL to links and attachments! CAUTION: Salve, Vedi allegato. Grazie. FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 Euroservis S.r.l. Riva Tommaso Gulli, 12 34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu www.euroservis.eu Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella "Documentazione" con te Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Salve, Vedi allegato. Grazie. FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 Euroservis S.r.l. Riva Tommaso Gulli, 12 34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu www.euroservis.eu Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella "Documentazione" con te Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Salve, Vedi allegato. Grazie. FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 Euroservis S.r.l. Riva Tommaso Gulli, 12 34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu www.euroservis.eu Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Salve, Salve, Salve, Vedi allegato. Vedi allegato. Vedi allegato. Grazie. Grazie. Grazie. FURIO STERNI FURIO STERNI FURIO STERNI RESPONSABILE COMMERCIALE E MARKETING RESPONSABILE COMMERCIALE E MARKETING furio.sterni@euroservis.eu +39 328 0122969 furio.sterni@euroservis.eu +39 328 0122969 furio.sterni@euroservis.eu mailto:furio.sterni@euroservis.eu https://www.facebook.com/EuroservisSrl/ https://www.linkedin.com/company/euro-servis-srl/?originalSubdomain=it https://www.youtube.com/channel/UCupR1c7OEA0ALczt32sENDQ Euroservis S.r.l. Riva Tommaso Gulli, 12 34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu www.euroservis.eu Euroservis S.r.l. Euroservis S.r.l. Riva Tommaso Gulli, 12 34123 Trieste (Italia) t. +39 040 762712 info@euroservis.eu www.euroservis.eu info@euroservis.eu mailto:info@euroservis.eu info@euroservis.eu www.euroservis.eu www.euroservis.eu https://euroservis.eu/ www.euroservis.eu Please consider the environment before printing this email. Please consider the environment before printing this email. Please consider the environment before printing this email. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Ai sensi del Regolamento UE 2016/679 si precisa che le informazioni contenute in questo messaggio sono riservate ed a uso esclusivo del destinatario. Qualora il messaggio in parola Le fosse pervenuto per errore, La invitiamo ad eliminarlo senza copiarlo e a non inoltrarlo a terzi, dandocene gentilmente comunicazione. Grazie. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Pursuant to regulation (Eu) 2016/679 Of The European Parliament And Of The Council, you are hereby informed that this message contains confidential information intended only for the use of the addressee. If you are not the addressee, and have received this message by mistake, please delete it and immediately notify us. You may not copy or disseminate this message to anyone. Thank you. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Osebne podatke varujemo po evropski Sploni uredbi o varstvu osebnih podatkov EU 679/2016 (GDPR). Sporoilo, ki ste ga prejeli, je zaupno in namenjeno izkljuno fizini osebi ali podjetju v naslovu. V primeru, da ste to sporoilo prejeli pomotoma, vas vljudno prosimo, da ga nemudoma izbriete, ne da bi ga kopirali ali posredovali tretjim osebam in nas o tem obvestite. Hvala. Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella "Documentazione" con te Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella "Documentazione" con te Da: Da: Furio Sterni <furio.sterni@euroservis.eu> Inviato: gioved 24 ottobre 2024 11:19 A: Furio Sterni <furio.sterni@euroservis.eu> Oggetto: Furio Sterni ha condiviso la cartella "Documentazione" con te Inviato: A: Oggetto: Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Furio Sterni ti ha invitato a modificare una cartella Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Ecco la cartella che Furio Sterni ha condiviso con te. Ecco la cartella che Furio Sterni ha condiviso con te. Ecco la cartella che Furio Sterni ha condiviso con te. Ecco la cartella che Furio Sterni ha condiviso con te. Documentazione Documentazione Documentazione Documentazione Documentazione Documentazione https://euroservissrl-my.sharepoint.com/:f:/r/personal/furio_sterni_euroservis_eu/Documents/Documentazione?e=5%3ad20090fe3a75485dba5eb06c7a124e15&sharingv2=true&fromShare=true&at=9 Documentazione Documentazione Documentazione Documentazione Documentazione https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Questo invito funzioner solo per te e le persone con accesso esistente. Apri Condividi Apri Condividi Apri Condividi Apri Condividi Apri Condividi Apri Condividi Apri Apri Apri Apri Apri Apri https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da Condividi Condividi Condividi Condividi Condividi Condividi https://euroservis.circle.so/c/docs/secure-9c150fda-a3b5-4727-912d-c98142ae40da Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl. Questo messaggio di posta elettronica viene generato tramite Euroservis Srl'uso di Microsoft 365 e pu contenere contenuto controllato da Euroservis Srl.
                                                                                          Attachments:
                                                                                          • Outlook-facebook.dat
                                                                                          • Outlook-linkedin.dat
                                                                                          • Outlook-facebook.dat
                                                                                          • Outlook-linkedin.dat
                                                                                          • Outlook-facebook.dat
                                                                                          • Outlook-linkedin.dat
                                                                                          • Outlook-facebook.dat
                                                                                          • Outlook-linkedin.dat
                                                                                          • Outlook-facebook.dat
                                                                                          • Outlook-linkedin.dat
                                                                                          • Outlook-facebook.dat
                                                                                          • Outlook-linkedin.dat
                                                                                          Key Value
                                                                                          Receivedfrom DU5PR08MB10561.eurprd08.prod.outlook.com ([fe80::d439:a2a1:26a1:a150]) by DU5PR08MB10561.eurprd08.prod.outlook.com ([fe80::d439:a2a1:26a1:a150%4]) with mapi id 15.20.8093.014; Thu, 24 Oct 2024 09:35:52 +0000
                                                                                          FromFurio Sterni <furio.sterni@euroservis.eu>
                                                                                          ToFurio Sterni <furio.sterni@euroservis.eu>
                                                                                          SubjectI: Furio Sterni ha condiviso la cartella "Documentazione" con te
                                                                                          Thread-TopicFurio Sterni ha condiviso la cartella "Documentazione" con te
                                                                                          Thread-IndexAQHbJfXPd29jpa7p7k6ZPFJ4D9vZ17KVkCmg
                                                                                          X-MS-Exchange-MessageSentRepresentingType1
                                                                                          DateThu, 24 Oct 2024 11:35:52 +0200
                                                                                          Message-ID <DU5PR08MB10561FAA72FA52F9D161080B19F4E2@DU5PR08MB10561.eurprd08.prod.outlook.com>
                                                                                          References <Share-f8ff5ca1-0054-a000-3292-25602afdc5f5-49556b70-7e93-4146-b0b2-9a90591a32d1-r0-SendEmail@odspnotify>
                                                                                          In-Reply-To <Share-f8ff5ca1-0054-a000-3292-25602afdc5f5-49556b70-7e93-4146-b0b2-9a90591a32d1-r0-SendEmail@odspnotify>
                                                                                          Accept-Languageit-IT, en-US
                                                                                          Content-Languageen-US
                                                                                          X-MS-Exchange-Organization-AuthSource DB1PEPF00039232.eurprd03.prod.outlook.com
                                                                                          X-MS-Has-Attachyes
                                                                                          X-MS-Exchange-Organization-Network-Message-Id 8c1cbb36-9440-4b0c-b781-08dcf40f432e
                                                                                          X-MS-Exchange-Organization-SCL1
                                                                                          X-MS-TNEF-Correlator
                                                                                          X-MS-Exchange-Organization-RecordReviewCfmType0
                                                                                          received-spfPass (protection.outlook.com: domain of euroservis.eu designates 40.107.20.128 as permitted sender) receiver=protection.outlook.com; client-ip=40.107.20.128; helo=EUR05-DB8-obe.outbound.protection.outlook.com; pr=C
                                                                                          x-ms-exchange-organization-originalclientipaddress40.107.20.128
                                                                                          x-ms-exchange-organization-originalserveripaddress10.167.8.105
                                                                                          x-ms-publictraffictypeEmail
                                                                                          x-ms-exchange-crosstenant-id6065539e-1467-456e-929c-c87c64b86dd3
                                                                                          X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
                                                                                          X-Microsoft-Antispam-Message-Info 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
                                                                                          Content-Typemultipart/mixed; boundary="_029_DU5PR08MB10561FAA72FA52F9D161080B19F4E2DU5PR08MB10561eu_"
                                                                                          MIME-Version1.0

                                                                                          Icon Hash:46070c0a8e0c67d6