Windows
Analysis Report
FYI - Important.eml
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- OUTLOOK.EXE (PID: 4048 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\De sktop\FYI - Importan t.eml" MD5: 91A5292942864110ED734005B7E005C0) - ai.exe (PID: 7016 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "22E B0C63-9B42 -4784-B71C -C70308A83 814" "F512 E8D3-4DD5- 4B58-BB01- CFD3898B71 C7" "4048" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD) - OUTLOOK.EXE (PID: 6520 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\Ap pData\Loca l\Microsof t\Windows\ INetCache\ Content.Ou tlook\TDRX 3DDW\James Garland s hared _Roa d To Succe ss Project _ with you _.eml" MD5: 91A5292942864110ED734005B7E005C0) - chrome.exe (PID: 5952 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// survey.res ponsly.com /f/6nKA5Dy z MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 3424 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2172 --fi eld-trial- handle=197 2,i,589853 4851097829 859,178971 0026041935 1848,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: frack113: |
Click to jump to signature section
Phishing |
---|
Source: | Matcher: |
Source: | OCR Text: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | File created: |
Source: | File read: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | Window found: |
Source: | Window detected: |
Source: | Key opened: |
Persistence and Installation Behavior |
---|
Source: | LLM: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | File Volume queried: |
Source: | Process information queried: |
Source: | Queries volume information: |
Source: | Key value queried: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Registry Run Keys / Startup Folder | 1 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | Security Account Manager | 13 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
survey.responsly.com | 188.114.96.3 | true | false | unknown | |
a.nel.cloudflare.com | 35.190.80.1 | true | false | unknown | |
prdia888neu0aks.mkt.dynamics.com | 52.146.128.240 | true | false | unknown | |
static.cloudflareinsights.com | 104.16.79.73 | true | false | unknown | |
cdnjs.cloudflare.com | 104.17.24.14 | true | false | unknown | |
s-part-0017.t-0009.fb-t-msedge.net | 13.107.253.45 | true | false | unknown | |
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | unknown | |
www.google.com | 142.250.184.228 | true | false | unknown | |
wikia.nocookie.net | 74.120.188.194 | true | false | unknown | |
app.responsly.com | 188.114.96.3 | true | false | unknown | |
prdia888weu0aks.mkt.dynamics.com | 40.113.183.0 | true | false | unknown | |
play.vidyard.com | unknown | unknown | false | unknown | |
use.typekit.net | unknown | unknown | false | unknown | |
static.wikia.nocookie.net | unknown | unknown | false | unknown | |
p.typekit.net | unknown | unknown | false | unknown | |
public-eur.mkt.dynamics.com | unknown | unknown | false | unknown | |
assets-eur.mkt.dynamics.com | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown | ||
true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.186.46 | unknown | United States | 15169 | GOOGLEUS | false | |
216.58.206.72 | unknown | United States | 15169 | GOOGLEUS | false | |
13.107.246.45 | s-part-0017.t-0009.t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
173.194.76.84 | unknown | United States | 15169 | GOOGLEUS | false | |
20.42.65.85 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
74.120.188.204 | unknown | United States | 22300 | WIKIAUS | false | |
151.101.65.181 | unknown | United States | 54113 | FASTLYUS | false | |
142.250.186.131 | unknown | United States | 15169 | GOOGLEUS | false | |
35.190.80.1 | a.nel.cloudflare.com | United States | 15169 | GOOGLEUS | false | |
104.16.79.73 | static.cloudflareinsights.com | United States | 13335 | CLOUDFLARENETUS | false | |
142.250.184.228 | www.google.com | United States | 15169 | GOOGLEUS | false | |
74.120.188.194 | wikia.nocookie.net | United States | 22300 | WIKIAUS | false | |
88.221.110.179 | unknown | European Union | 20940 | AKAMAI-ASN1EU | false | |
52.113.194.132 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.184.195 | unknown | United States | 15169 | GOOGLEUS | false | |
104.17.24.14 | cdnjs.cloudflare.com | United States | 13335 | CLOUDFLARENETUS | false | |
142.250.186.78 | unknown | United States | 15169 | GOOGLEUS | false | |
23.32.185.131 | unknown | United States | 16625 | AKAMAI-ASUS | false | |
40.113.183.0 | prdia888weu0aks.mkt.dynamics.com | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
52.109.68.130 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
216.58.206.67 | unknown | United States | 15169 | GOOGLEUS | false | |
13.107.253.45 | s-part-0017.t-0009.fb-t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
2.19.126.219 | unknown | European Union | 16625 | AKAMAI-ASUS | false | |
216.58.206.42 | unknown | United States | 15169 | GOOGLEUS | false | |
216.58.206.46 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.106 | unknown | United States | 15169 | GOOGLEUS | false | |
2.19.126.198 | unknown | European Union | 16625 | AKAMAI-ASUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
172.217.18.106 | unknown | United States | 15169 | GOOGLEUS | false | |
151.101.129.181 | unknown | United States | 54113 | FASTLYUS | false | |
188.114.96.3 | survey.responsly.com | European Union | 13335 | CLOUDFLARENETUS | false | |
52.146.128.240 | prdia888neu0aks.mkt.dynamics.com | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.186.168 | unknown | United States | 15169 | GOOGLEUS | false |
IP |
---|
192.168.2.16 |
192.168.2.23 |
192.168.2.13 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1548353 |
Start date and time: | 2024-11-04 11:15:10 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | FYI - Important.eml |
Detection: | MAL |
Classification: | mal52.phis.winEML@19/59@44/271 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Excluded IPs from analysis (whitelisted): 52.113.194.132
- Excluded domains from analysis (whitelisted): ecs.office.com, s-0005.s-msedge.net, ecs.office.trafficmanager.net, s-0005-office.config.skype.com, ecs-office.s-0005.s-msedge.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- Report size getting too big, too many NtSetValueKey calls found.
- VT rate limit hit for: FYI - Important.eml
Input | Output |
---|---|
URL: Model: claude-3-5-sonnet-latest | { "explanation": [ "Email sent to 'Undisclosed recipients' which is a red flag for mass phishing", "Vague subject line 'FYI - Important' with minimal content is typical of phishing", "Attachment name suggests file sharing bait, likely containing malware" ], "phishing": true, "confidence": 9 } |
{ "date": "Wed, 30 Oct 2024 10:04:37 +0000", "subject": "FYI - Important", "communications": [ "CAUTION: This email originated from outside of the organisation. If in doubt please use the report message button to Security.\n\nPlease find the file.\n\n\n\nKind regards,\n\nJames.\n\n\n\n\n" ], "from": "James Garland <james.garland@r2s.org.uk>", "to": "Undisclosed recipients:;", "attachements": [ "James Garland shared _Road To Success Project_ with you..eml" ] } | |
URL: Email Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "CAUTION: This email is private from outside of the organization. It is not please, as the report message author is Security.", "prominent_button_name": "unknown", "text_input_field_labels": "unknown", "pdf_icon_visible": false, "has_visible_captcha": false, "has_urgent_text": true, "has_visible_qrcode": false } |
URL: Email Model: claude-3-haiku-20240307 | ```json { "brands": [ "CAUTION", "Please find the file" ] } |
URL: Model: claude-3-5-sonnet-latest | { "typosquatting": false, "unusual_query_string": false, "suspicious_tld": false, "ip_in_url": false, "long_subdomain": false, "malicious_keywords": false, "encoded_characters": false, "redirection": false, "contains_email_address": false, "known_domain": false, "brand_spoofing_attempt": false, "third_party_hosting": false } |
URL: URL: https://survey.responsly.com | |
URL: https://survey.responsly.com/f/6nKA5Dyz Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "REVIEW DOCUMENT HERE", "prominent_button_name": "Send", "text_input_field_labels": "unknown", "pdf_icon_visible": false, "has_visible_captcha": false, "has_urgent_text": false, "has_visible_qrcode": false } |
URL: https://survey.responsly.com/f/6nKA5Dyz Model: claude-3-haiku-20240307 | ```json { "brands": [ "Microsoft Corporation", "Responsly" ] } |
URL: https://assets-eur.mkt.dynamics.com/50217418-308e-ef11-8a66-000d3ade3052/digitalassets/standaloneforms/46a79031-fd94-ef11-8a69-6045bde08fb3 Model: claude-3-haiku-20240307 | ```json { "contains_trigger_text": true, "trigger_text": "MFA Verification", "prominent_button_name": "Continue Sign in", "text_input_field_labels": [ "Enter the characters you see *" ], "pdf_icon_visible": false, "has_visible_captcha": true, "has_urgent_text": true, "has_visible_qrcode": false } |
URL: Model: claude-3-5-sonnet-latest | { "typosquatting": false, "unusual_query_string": false, "suspicious_tld": false, "ip_in_url": false, "long_subdomain": false, "malicious_keywords": false, "encoded_characters": false, "redirection": false, "contains_email_address": false, "known_domain": true, "brand_spoofing_attempt": false, "third_party_hosting": false } |
URL: URL: https://assets-eur.mkt.dynamics.com | |
URL: https://assets-eur.mkt.dynamics.com/50217418-308e-ef11-8a66-000d3ade3052/digitalassets/standaloneforms/46a79031-fd94-ef11-8a69-6045bde08fb3 Model: claude-3-haiku-20240307 | ```json { "brands": [ "Microsoft" ] } |
URL: https://assets-eur.mkt.dynamics.com/50217418-308e-ef11-8a66-000d3ade3052/digitalassets/standaloneforms/46a79031-fd94-ef11-8a69-6045bde08fb3 Model: gpt-4o | ```json{ "legit_domain": "dynamics.com", "classification": "wellknown", "reasons": [ "The brand 'Microsoft' is well-known and commonly associated with the domain 'dynamics.com'.", "The URL 'assets-eur.mkt.dynamics.com' is a subdomain of 'dynamics.com', which is a legitimate domain owned by Microsoft.", "The presence of 'dynamics.com' in the URL suggests it is related to Microsoft's Dynamics services.", "The URL structure does not contain suspicious elements such as misspellings or unusual domain extensions." ], "riskscore": 2} |
URL: assets-eur.mkt.dynamics.com Brands: Microsoft Input Fields: Enter the characters you see * | |
URL: Model: claude-3-5-sonnet-latest | { "typosquatting": false, "unusual_query_string": false, "suspicious_tld": false, "ip_in_url": false, "long_subdomain": false, "malicious_keywords": false, "encoded_characters": false, "redirection": false, "contains_email_address": false, "known_domain": false, "brand_spoofing_attempt": false, "third_party_hosting": false } |
URL: URL: https://responsly.com |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 231348 |
Entropy (8bit): | 4.387875266789989 |
Encrypted: | false |
SSDEEP: | |
MD5: | FFF2468DF757F643808D76BDB78D6A95 |
SHA1: | 712BA674853F1A2122B0756251386EB02B0981A3 |
SHA-256: | D997B6B97B85433E8BAA20B5A61CE924338050C045D2751FB0CD60782C42C71C |
SHA-512: | AB4C4201D626C9A4CCABC8CD72370157883A05425DF7CBB812C0970DCC7FF3F73B178BFBC49CF6D6C5520BF53B213A097BE1F84653AF790CB599A7E4C65D8F95 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 1869 |
Entropy (8bit): | 5.085992323264559 |
Encrypted: | false |
SSDEEP: | |
MD5: | ACAF51D11A3B43BABB87F7E230DF5E0D |
SHA1: | 31453AA5C99CFFA7D9300D8410B82446046FF3A7 |
SHA-256: | 1E41F0E6075AC71B28FA0064AC1092F7BAC191595C0EB51B615977F7EA6983D5 |
SHA-512: | 2D18DF4E0BE4C8B86E363DFA7F61CD5888F514AAFBB26997C56375AF4BD05E21AB99EF95C3FD0B1396F4F434803488AD0FE588E189877A33B21AB03D5516DB8A |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 0.04575125179552959 |
Encrypted: | false |
SSDEEP: | |
MD5: | 81321044D7EB31E75C3A108CB2B65A36 |
SHA1: | 724308AA2C052A4E4583697210E6FE61A3F150B1 |
SHA-256: | AFF8A82870E5FE159F4F19E9AFBFDBB27F0C8C928D30379E5FE582683A807AD4 |
SHA-512: | F8CAFBCA4083304541B0B43EF4793F13B70648B366C212E6515BBE433D40BCC6297EE1C2454078F3BAEBBC279DDAF0808AFCA25A9DC24682A9660E82C826D638 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 49472 |
Entropy (8bit): | 0.48537903814731376 |
Encrypted: | false |
SSDEEP: | |
MD5: | D0F2BB5617777C920617799FA91549BA |
SHA1: | F8B9DBAF6C8DC849CD5B2B21FB01376E0A9B34FF |
SHA-256: | 4B551F47F35310D78C39F4B44982052BEB81194EC2F3C6E72EB47BFDF8825754 |
SHA-512: | 5895CD36394A19CB6E765CDF1B42C2A529D234BBC31DEA6F959EC16F0D0157B13F301C0C7C25E30E2A0EF9B1B4E05AACF36DB890410194E6E742E3AEC096D975 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 16320 |
Entropy (8bit): | 7.757707103931911 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9FA5125290B9651F0C0A06E46C010A37 |
SHA1: | 8FEA2FCCD52D11DE03680FC0200C4E2F4ABEC1F0 |
SHA-256: | E248402AE5155BE4132C57172385AB577785B9C2B67CDC4C3695400A4D611AEE |
SHA-512: | 8EA3948EB0146769ED845CFB94C9E8C639449BF3B89536444064B69557FBF98DD2015C726968464313D6DD8885CD45FCE5A30E95722D4EE74780EBAAAF83D8AD |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\TDRX3DDW\James Garland shared _Road To Success Project_ with you_ (002).eml:Zone.Identifier
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | |
MD5: | FBCCF14D504B7B2DBCB5A5BDA75BD93B |
SHA1: | D59FC84CDD5217C6CF74785703655F78DA6B582B |
SHA-256: | EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913 |
SHA-512: | AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\TDRX3DDW\James Garland shared _Road To Success Project_ with you_.eml
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 26211 |
Entropy (8bit): | 6.113467777125025 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4A2E8CAE22FF11E0833D03BE17526CB1 |
SHA1: | FE3A0C4535BBF46FBC26333C36A1213647D16C79 |
SHA-256: | 8396D5D5E6A6AFF41D37077700970F0D999EB93D39663B6D2A5516F815B561F7 |
SHA-512: | 70BD1A3E273D16DF5511F32CBC1E6EF047D279A7DF968057BEAC5FA9462B288DD8BF3C27955B895EC61AB4EA8803F0AB76788F1827FF73C2337D1B2FF73B14A6 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{A098BD05-AB43-49C8-8E84-10BE86655A92}.tmp
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1604 |
Entropy (8bit): | 0.6354480769286553 |
Encrypted: | false |
SSDEEP: | |
MD5: | B4214FF8B225C1B57920A0CC6BEF988C |
SHA1: | 4ACD3FC5406959648CA5D0FCADDE73A1719D4AFA |
SHA-256: | 425E9493E83D132661EA73A73B06B1C7F8FF9C6A537B8CF0725E6648C1CB6FD0 |
SHA-512: | CB73CCB4057AEF14AE9E93BBE3E4A61A0D2A6BB8D4D86A8803611094F6C340CAC77E7E6C1B0165835FB38EF3E4C5C55238DCD65887DA9F3CCC94920E759D9F73 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1730715338305172700_951086B9-F119-4ED9-B56F-3B1BF49D5945.log
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.17734548511123469 |
Encrypted: | false |
SSDEEP: | |
MD5: | 132FC187A0E09F2276DDC75F75E918D0 |
SHA1: | D7088774B23173D3FA6D575137B5DF4AB6500E5F |
SHA-256: | 7D0D21A94F6C990286C517866EBEE22222B0A82B5F1C5D10D2A64D3B256F2ACD |
SHA-512: | 96EA1B00DBDA0AA1DE8541F280BF1C363BB4E1ADB76D18CCE5B845F348D764F51F7FBF4B181100C5E73C14906FCC9F10EABE09F306CA11F4803223CF51411D6A |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1730715338305995500_951086B9-F119-4ED9-B56F-3B1BF49D5945.log
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8F4E33F3DC3E414FF94E5FB6905CBA8C |
SHA1: | 9674344C90C2F0646F0B78026E127C9B86E3AD77 |
SHA-256: | CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC |
SHA-512: | 7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241104T0515380104-4048.etl
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 122880 |
Entropy (8bit): | 4.503109862637518 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0474751233338CA164ED2848D9BD899B |
SHA1: | 6EAFEE41616A4720606D8D1CE0E46380E1D7EBE9 |
SHA-256: | 64CAAD4D09C68A9230EC527D7D70691A35A494176CCF1F5C9480D4D82ED1BA18 |
SHA-512: | 93435C9C62685D23639BBCF9237466AAA0477253344C24FB8F2A23D8A94AC4309EBA3F4EFDDC5EB76FB4EBB5E5D3CD8183D2372859A687A9974ACA86573A08D1 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241104T0515580422-6520.etl
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 3.5737272658199872 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0B55C6197589A105CE7A3AD8951D8BA3 |
SHA1: | 9848417478478EBC84AA79E0187446D1CD76E810 |
SHA-256: | 75BD9FEAF3B1302AF82B43D331B262E01E5BA279CD5929A9AC925F6FA8F58D68 |
SHA-512: | BEB747FE868B5B07A0F31209FF095CB2270652FB2301C206595AE455EDCA0AD4F518C9E62E87FB1D4940D8D38EBAEA4DA8BFD90AEF9CAE9750327D1C66455527 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 30 |
Entropy (8bit): | 1.2389205950315936 |
Encrypted: | false |
SSDEEP: | |
MD5: | DE376AFDE391564F058F22B33B92D8D1 |
SHA1: | 2CAC3B795109391CB2538210C2698372CD709089 |
SHA-256: | 6A3ED9AC0D88B4767198A50780F7C8A61E6E652EC298E6AB0D370FC02BD719AA |
SHA-512: | FDB0355051D1D9A944231DF38675D1D45BD02B719DCF6C7DF80B07E212C41B02510D58A188E8E3EADB0B741A86AE137229B293D115C322263DFC92C5729DE3DE |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.982721881067214 |
Encrypted: | false |
SSDEEP: | |
MD5: | F8AFBD54DD40BC6904AF9AB6446F9A96 |
SHA1: | B81CA0E5CFCAB8D14DF6BDD92CDB062C369F032D |
SHA-256: | D34DBF785AA61D010FFAA7A982E3CE3A8930C775D44F30E20A00BDF93F6BE76E |
SHA-512: | 6F1E2BCA54D3E85D930162EC441874D8CFA50CBE02A99F83A95C8ABED083D0C482C03DBE6C4E862F2DB2D64463D50DF4C9E3D39D37BDF9A98095AB3C31319432 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 3.9975328191557233 |
Encrypted: | false |
SSDEEP: | |
MD5: | 43A626F6539E88D2487A05C1A974C3E1 |
SHA1: | 2EC93AC98E3456E3ED1E2507DCCA0C858EB29A39 |
SHA-256: | F5CA2FC138E772D22F74A5AC16B5BE932016D1E3010EF852C0F6D67CEF107C9D |
SHA-512: | E22509A79613D2E878D3272635B1CC4B8B75868A31C3DCE1F4381BDB5B2A40A0FDB1695723CBC8261371EC467A649F3FA73BB73FFF67418986A2991725837637 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.008349834938445 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4A8D5EAD9B9FC010DE01484988ABB644 |
SHA1: | 7439B32B1CA2DA5E3EBB86000E254D2CD3341349 |
SHA-256: | 3D9174BC6A75B963F418A244EFFBB7D26797DA130D95BE69ABB911A101D01502 |
SHA-512: | 0ED4FBA443345661768E50D62A74FF9E06B68637F2235461DC2D4E31E4A121BC5F1067A7156F7AD4E136663C7C29C46FDB606F03D0E49AF339D6BEA2F7F32634 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9978498296403786 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7A7BB83D52899934DF3148ABE4622D23 |
SHA1: | C6E2DE3E0A28418B64F401DC31B198D93C84F184 |
SHA-256: | 03712735710BC979F60EBEF60CB037CF7286826074B1F3A4BA5AB795C2D2F525 |
SHA-512: | D7D3B09831CD681B4FC22D85E8942F039F5C87545F7356D6552CA33082F96C0DA05EA749E516A36F55C8CBCA2C20A5D022D49DCB119218BE59DC8CA49A6D1C82 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9850490564298564 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0EECD9D4F38763379C379848DFF769CB |
SHA1: | 733F5E0FFFAEB62C46064EF0263856BEF3B9CE3A |
SHA-256: | 26EBDB11124E8ED0A761C6BC79997AC43B0579D1254CAA85DBBF11131C2DF6C6 |
SHA-512: | 90E9E0E81BEC8D7FD11A49A165093A72596F54954F10D502765F4CD84F2DEA8FD73B6CB6D6544107F5BC6FDC52520F16D1BC1DA6001D955EBFDF06E3F8126533 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.993559884882427 |
Encrypted: | false |
SSDEEP: | |
MD5: | C9C8738EB655C0A22C2D8678BAC20B9A |
SHA1: | 987447BF8450D57BA1FC8F3EF89E1755C1A74935 |
SHA-256: | 6F3289CB915EE9F0ADBFE4600C41B58BA09B5782D567FCC137113D454FC0BE98 |
SHA-512: | 21D355F76A3DAD02995640FF427A44CE948B3E251BF9EE5DE30854CD23340141907A323219C417D23D4846CB1821D0A3B7D3A89F3E5A8431CF8FE8146449CC01 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 271360 |
Entropy (8bit): | 4.534665142436502 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9C7325E1F374B7F119F94B545885E2B4 |
SHA1: | D58923F246EE110F6FB7C5B7E391039B7B7E90E1 |
SHA-256: | 1EEE549979561DE8239BBC8B675A82AADDF28B23C91C8143E6274C04995A9D65 |
SHA-512: | 9022335035436FC1AD825CEFFB7F1AF35D51F96A0337BCBC9FFE4C8210F657833A844B76D2EDE7DBBA1769B1F30DBB81C31C2472F5824B0F384C8888761E671C |
Malicious: | true |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 5.501695408425233 |
Encrypted: | false |
SSDEEP: | |
MD5: | E8E43A952E27A60072CA8F3A9BEB1796 |
SHA1: | 344F75114BD3FC47FE24BD3EF7C3B30029D45F45 |
SHA-256: | 56434AB56FEB53AAA1C4A026C6401FEEE9911D6EE5F2E095C16C3663DEE9DBC3 |
SHA-512: | 9D4EB1E4C5DFEAC55DAADE8B6AA1E78B8B4B22A9C3888C80FFBFE0B83343C3549D408730499359F8A19FAB4C1DBE8F633934DF5D7D43F5B046F18BB2D7F95010 |
Malicious: | true |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 103217 |
Entropy (8bit): | 7.974705071500389 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5BFF99A0992BD4F73B2B62570E73DA4F |
SHA1: | 17B7B80D0FEFD1B94CEC4A6E7D1B690FBD26F069 |
SHA-256: | FB8F9B86F95F80D6E521F64E4841591D2273EA29DDEECAA3F32B6C8FE78E3C10 |
SHA-512: | CA8AB41982343D24A4F60CEBE19E9C3995DF7D09FABBC5DC3CE9283D3CA76BEA1A768A64B8624E9B01A8111FBFA715555C616EE3F7F06D74465D25626F5C85CA |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 77160 |
Entropy (8bit): | 7.996509451516447 |
Encrypted: | true |
SSDEEP: | |
MD5: | AF7AE505A9EED503F8B8E6982036873E |
SHA1: | D6F48CBA7D076FB6F2FD6BA993A75B9DC1ECBF0C |
SHA-256: | 2ADEFCBC041E7D18FCF2D417879DC5A09997AA64D675B7A3C4B6CE33DA13F3FE |
SHA-512: | 838FEFDBC14901F41EDF995A78FDAC55764CD4912CCB734B8BEA4909194582904D8F2AFDF2B6C428667912CE4D65681A1044D045D1BC6DE2B14113F0315FC892 |
Malicious: | false |
Reputation: | unknown |
URL: | https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/fonts/fontawesome-webfont.woff2?v=4.7.0 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 5053 |
Entropy (8bit): | 5.166146721931131 |
Encrypted: | false |
SSDEEP: | |
MD5: | 956C98FEF547F4A0A03220AA2C84149A |
SHA1: | E1F1F62BB58F34B52259F7FA9C78BF08CDC8EDEC |
SHA-256: | 6CD2C195F9FEFA164DE077D97E4627E0469B1880CC060DF6127C289F8E4AA189 |
SHA-512: | 2EA716B9FA65EE6111962D1938B1B4F245F813B19CC3048AF58B0872D3171A137A7AFD4321CA49A721A7EBCFA318ED134CE4F9D61EB08C254903606F1E05C6B3 |
Malicious: | false |
Reputation: | unknown |
URL: | https://survey.responsly.com/ |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 7615 |
Entropy (8bit): | 7.096403551516808 |
Encrypted: | false |
SSDEEP: | |
MD5: | 563A41948AA94C4FF6D5E918D846C488 |
SHA1: | 803C01DE983417650B6780269699191D5AC73357 |
SHA-256: | 20765C1AA45654ABA95D64A80B64434ED8F8FFBD77371E660291A7FB6AAEFB7A |
SHA-512: | BFFB85AE116C0D7028968E1A692B7D500C5CC335FAAAA3A2DE8FE5D4A84C3936EC71A0D15CEF7404F77F9E3F9B989A89AD7497733AD8F6198A8B597C04921944 |
Malicious: | false |
Reputation: | unknown |
URL: | https://cxppusa1formui01cdnsa01-endpoint.azureedge.net/eur/Captcha/Images/hig_progcircle_animated.gif?vv=100 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 23130 |
Entropy (8bit): | 5.458199984436493 |
Encrypted: | false |
SSDEEP: | |
MD5: | C094F5EA6C0D18A65B4C84E800BB0FFB |
SHA1: | 2F0D2E94D61FC4A894DB19A11E14DEBEF02BF223 |
SHA-256: | 179D1F6500825CAA4B515E751D8D560434322B74D57DEA6772FEA51F959E44AC |
SHA-512: | 20F226D3D225C5D2642856361681FCC2A54330B8A19985D1118C3B45D12F6F604248EF1957F27D9499FF27F5F52F412535B379501AF5030EDDF6D89CAFF2EA4F |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 31000 |
Entropy (8bit): | 4.746143404849733 |
Encrypted: | false |
SSDEEP: | |
MD5: | 269550530CC127B6AA5A35925A7DE6CE |
SHA1: | 512C7D79033E3028A9BE61B540CF1A6870C896F8 |
SHA-256: | 799AEB25CC0373FDEE0E1B1DB7AD6C2F6A0E058DFADAA3379689F583213190BD |
SHA-512: | 49F4E24E55FA924FAA8AD7DEBE5FFB2E26D439E25696DF6B6F20E7F766B50EA58EC3DBD61B6305A1ACACD2C80E6E659ACCEE4140F885B9C9E71008E9001FBF4B |
Malicious: | false |
Reputation: | unknown |
URL: | https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16638 |
Entropy (8bit): | 7.981322833236873 |
Encrypted: | false |
SSDEEP: | |
MD5: | EE1D07D10B6E784C828D2E2BCB9DBAA3 |
SHA1: | 5DAEEDB841F38A3CD18B71CF73FFE577ED32147E |
SHA-256: | B9A010653DCD1C628149EBBAD1E3F4C6A79BA7841BF80FA610523AC533D524D7 |
SHA-512: | 49158752E488039B3D6F9B39F353A4B61E3AD0263DD5BE7F945C34C4CCBC7D5D04CCD20C7B9AAE972C02AB19DB9C96A2816D20DC63E7B8819D84DB5822D35AE0 |
Malicious: | false |
Reputation: | unknown |
URL: | https://static.wikia.nocookie.net/windows/images/c/c6/Microsoft_Authenticator_iOS_icon.png?/revision/latest?cb=20221227091618 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 721323 |
Entropy (8bit): | 5.5601925711109965 |
Encrypted: | false |
SSDEEP: | |
MD5: | AC826B3063F6CFC9E8AED8F417D46379 |
SHA1: | F893A40D7792F9D7FB6D7FC193FE9540ED85BF4E |
SHA-256: | A1AEC55A5FCFCF17DFD88FEF6BAAD75BC441DDAF0FE9FAF320CB62346DD314D5 |
SHA-512: | 89DD044E8FFD225A1F0F5457510B95B8871BD2C4170F3E52197630F1E06D5F8286A90D8CA72225F390B503CC20F35539ED2FCCCB7810B90B9D2842F94AE8ED2E |
Malicious: | false |
Reputation: | unknown |
URL: | https://survey.responsly.com/assets/js/form.7c894a93.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 19948 |
Entropy (8bit): | 5.261902742187293 |
Encrypted: | false |
SSDEEP: | |
MD5: | EC18AF6D41F6F278B6AED3BDABFFA7BC |
SHA1: | 62C9E2CAB76B888829F3C5335E91C320B22329AE |
SHA-256: | 8A18D13015336BC184819A5A768447462202EF3105EC511BF42ED8304A7ED94F |
SHA-512: | 669B0E9A545057ACBDD3B4C8D1D2811EAF4C776F679DA1083E591FF38AE7684467ABACEF5AF3D4AABD9FB7C335692DBCA0DEF63DDAC2CD28D8E14E95680C3511 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1406 |
Entropy (8bit): | 6.9625715064169444 |
Encrypted: | false |
SSDEEP: | |
MD5: | EDC04C500AABFD192F40829677C98F92 |
SHA1: | 512666C28EC5192D3AB146BE7F37CE0ED980C554 |
SHA-256: | 389CBCE1A5663E245A5D086E7FF31883F10E0DAAC5D1FCC86BD8E51107624493 |
SHA-512: | 7A248ABB2686539C35F9B19276286FCA147631647F9471A9BE9426C5BBC8A6B3108DF5ACFB3BC69DA0ACD20D25CE461D944B8F62D68659A2407701961D5E78D6 |
Malicious: | false |
Reputation: | unknown |
URL: | https://survey.responsly.com/images/icons/favicon-32x32.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 171486 |
Entropy (8bit): | 5.043877429718187 |
Encrypted: | false |
SSDEEP: | |
MD5: | B7AF9FB8EB3F12D3BAA37641537BEDC2 |
SHA1: | A3FBB622FD4D19CDB371F0B71146DD9F2605D8A4 |
SHA-256: | 928ACFBA36CCD911340D2753DB52423F0C7F6FEAA72824E2A1EF6F5667ED4A71 |
SHA-512: | 1023C4D81F68C73E247850F17BF048615DDABB69ACF2429644BDAF8DC2A95930F7A29CEAE6FBD985E1162897483A860C8248557CDA2F1F3D3FF0589158625A49 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www.microsoft.com/onerfstatics/marketingsites-eas-prod/west-european/shell/_scrf/css/themes=default.device=uplevel_web_pc/1b-9d8ed9/c9-be0100/a6-e969ef/43-9f2e7c/82-8b5456/a0-5d3913/43-5a5ab8/ca-ae3ce4?ver=2.0&_cf=02242021_3231 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 548 |
Entropy (8bit): | 4.688532577858027 |
Encrypted: | false |
SSDEEP: | |
MD5: | 370E16C3B7DBA286CFF055F93B9A94D8 |
SHA1: | 65F3537C3C798F7DA146C55AEF536F7B5D0CB943 |
SHA-256: | D465172175D35D493FB1633E237700022BD849FA123164790B168B8318ACB090 |
SHA-512: | 75CD6A0AC7D6081D35140ABBEA018D1A2608DD936E2E21F61BF69E063F6FA16DD31C62392F5703D7A7C828EE3D4ECC838E73BFF029A98CED8986ACB5C8364966 |
Malicious: | false |
Reputation: | unknown |
URL: | https://assets-eur.mkt.dynamics.com/dist/vendor.css?v=7LdzUNeemfUwSUDAcdGthlh5VuAXcOGXTq6H8wbI1Ac |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 18042 |
Entropy (8bit): | 5.340916093635662 |
Encrypted: | false |
SSDEEP: | |
MD5: | 134299E45BA1EC6A7F27751C9FA29386 |
SHA1: | 4C39675655CACE35F83D46C13BC0D593AC064CAC |
SHA-256: | C08E11CA159584D59D45E9F4FFDD2BBE130F670FC8E7223601787DADAD8351D5 |
SHA-512: | 8B46C54D5A3A2FDD6FFB1DCB19E5540570B3896B33C36B3B13A1D8DB1918FF2DD25583EF747458DB5963EF1BF18939E3135FA00C936644B8F15B181073A0D676 |
Malicious: | false |
Reputation: | unknown |
URL: | "https://fonts.googleapis.com/css?family=Open+Sans:regular,bold,extrabold&subset=latin-ext&display=swap" |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 23130 |
Entropy (8bit): | 5.457017572168636 |
Encrypted: | false |
SSDEEP: | |
MD5: | 95DDD1F3E43323A925DD9D112A87C3B3 |
SHA1: | EC5658FABF22EF58BA37C8026C5EC89EC5520287 |
SHA-256: | 6AD34A63645EF3CE4A452812119D161F0FED086F99755B822E5F7A0CABD128FC |
SHA-512: | 6E442330C596BDDFD97BBE0CFD88595DE4C5C63EE121189E1C46F7EDB3A4C444A85ECCAE6DA85A65286FF4E8C3CAB170AEC633F1223B2BCB9867AF4A1CBD8403 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 304478 |
Entropy (8bit): | 5.578396321475368 |
Encrypted: | false |
SSDEEP: | |
MD5: | BA22850F4F779C595781C905DF1C7C6C |
SHA1: | FB9CEAA0CAFF1B1696A11CB94C8D9C45D21A3C6F |
SHA-256: | 4ACFF6274C9CEF897A49AEDC46C61F6A75C9596F2B165F70984BD7A4F96B5B78 |
SHA-512: | 57BE49B7738219B47F62CF0020FD52477903C0DD8D06C4192C56B68AF0E0E6050443EA2B9B0F8CB16B99B16573DEA690023536DF1F343D03BA7CEC2F1E615E14 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8293 |
Entropy (8bit): | 7.903272950728756 |
Encrypted: | false |
SSDEEP: | |
MD5: | 96B5A116DF039196E7A649739102962E |
SHA1: | 29301F45ADFCCF1F2A28E8B9B66CB0A203AF90B0 |
SHA-256: | E992BC36C11861C24EF2C79A412D02437DB69473BF186ABF076A6F73F73028D4 |
SHA-512: | 93D18F2460DC1EE79CCD267AA07275AD8A5D0E14D52F68641BEE149FB96E42A5611A04C0A4D751568EFC6C2D669093AAD1F96745A4A1579AAF106510FED0364E |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16071 |
Entropy (8bit): | 5.390774139543091 |
Encrypted: | false |
SSDEEP: | |
MD5: | CBA5286D55138D746F7074FCA84C4C8E |
SHA1: | F6A52FC84AAC4ED64946F67821E31060B2AE7980 |
SHA-256: | 86897D4BDB5CED68C265F806A165DF5F890FD81078BFF398DB0652E1D951CDDA |
SHA-512: | 8BFA1D98F0BD0EA29936F5EF0EA817730C09E3A773A1661F0C252366672DADAC28DF4206ADCD9CE5E1376B391CC8ADB6B40DA69E35F3AE97475FFB5961D9FBC8 |
Malicious: | false |
Reputation: | unknown |
URL: | https://survey.responsly.com/f/6nKA5Dyz |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 304478 |
Entropy (8bit): | 5.5783800116889415 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8897A6F24D85C6EFDCC8803284B5C850 |
SHA1: | 32070A18DC5361B6C29055C15109AFE1905BC0D0 |
SHA-256: | 5BADC31FEC90A385B7F5F37B73DCFD956C110FB6DAFEB91C800B5FDBDBEF84A2 |
SHA-512: | FF2AD53BB1931DBBC3A424EEEA2F6664A5D4C0E61DC946A949188797C63CA6AA3874EFF4004A69369A91840AC11563A4F7ACAB906FB003FDD16490081069DBA8 |
Malicious: | false |
Reputation: | unknown |
URL: | https://www.googletagmanager.com/gtag/js?id=G-412PZZWYCX |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 751705 |
Entropy (8bit): | 5.442952156335887 |
Encrypted: | false |
SSDEEP: | |
MD5: | E45E9257A51A995E0F3116815FA42313 |
SHA1: | 14AACD347147AC83FEDFA0005161C786A7E56045 |
SHA-256: | 746B51E5AE659B23B4980BB109BDED2D8000938930AD847F9079D5E3739BC142 |
SHA-512: | 34CBFEF794150440D398D374743C8BE87F80A019E35282D661935ED4B82F155FE5BCFE6B01EB562FFF88E64F40E766F676BA0629C7B10FEF61C0CCFFCE2566DC |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 5 |
Entropy (8bit): | 1.5219280948873621 |
Encrypted: | false |
SSDEEP: | |
MD5: | 83D24D4B43CC7EEF2B61E66C95F3D158 |
SHA1: | F0CAFC285EE23BB6C28C5166F305493C4331C84D |
SHA-256: | 1C0FF118A4290C99F39C90ABB38703A866E47251B23CCA20266C69C812CCAFEB |
SHA-512: | E6E84563D3A55767F8E5F36C4E217A0768120D6E15CE4D01AA63D36AF7EC8D20B600CE96DCC56DE91EC7E55E83A8267BADDD68B61447069B82ABDB2E92C6ACB6 |
Malicious: | false |
Reputation: | unknown |
URL: | https://p.typekit.net/p.css?s=1&k=rix3wkt&ht=tk&f=139.140.175.176&a=620586&app=typekit&e=css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 6076 |
Entropy (8bit): | 7.96415812460558 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9586DECC7194B970D37B2CAA47EA05AE |
SHA1: | 96DA32E49FC8C3817B2767BF01D011DE992BFEB0 |
SHA-256: | 839A0BF526F6C9A2A11182B5DEA4291506FD0B2A37DEE83A38FBE12721041EDC |
SHA-512: | 6A327FF63C80BB343C5CFA95CD64E2D56483367D31E7D6E223429E7E9196ED24CE2FB60A55D3B17222498EE497923194B7007FD43732E671D6A5AAC149D408D7 |
Malicious: | false |
Reputation: | unknown |
URL: | https://survey.responsly.com/assets/fonts/responslycon.9586decc.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1011 |
Entropy (8bit): | 5.216432800278142 |
Encrypted: | false |
SSDEEP: | |
MD5: | AEFC8130206B1E0798A9502B0E5D0B40 |
SHA1: | 90AF264A5A206098161E5617C24CBEBFF32E0F63 |
SHA-256: | 2155D18ADEC13FEC19324318C2223075A2EDDBFDF4908407A6314FA6808A79A5 |
SHA-512: | 9EC6E7571CDD5CDDD60C4BE0C84F413A92FB58CEF4ACF6DDCF36090F9077A16AA16C5CF15531FFC5C99BB5F8B402DC00ADADEE1D1EA1927B6B5BF923E73C8809 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1282 |
Entropy (8bit): | 4.695064346385326 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8D30025E69BC896ACC2064D1791F5A88 |
SHA1: | 1F14560FD3D30F0A2C291CE503CCB490C94E0C3E |
SHA-256: | 769442A29597F6DB303853931D749780EF46D2855412843431DAC07A9D72CCB0 |
SHA-512: | 7363382D59DF760A37A8C48F6D7037EF9C57CE97EFA0AFDDD19FE133952EE825B9043C84227F4E0B6D4AED310E9DF0053294BF6EB991CC3FBE7338C853C51888 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 28 |
Entropy (8bit): | 4.208966082694623 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8B30FE8C2588DFC5BEBE98D9ED97835A |
SHA1: | 1DCFC7725B4BF504402C2853E478467CBD991755 |
SHA-256: | C25E7BEA50F64A9C6FB1E879F25A406AF2C7DF0960E1D186E2E14F8D6D261D46 |
SHA-512: | 7C65E03E8AEF3EFF1482329EF86A38F0E73E742D19F0A5873D036B29F134C44D502DCE01C4F48521E14613A6E0CDC400567A9B05D9E4BB1F8DC511F69F5EED31 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISFwmFpiSMdAKSiRIFDb2Fgw8SBQ3kVTB_?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 6635 |
Entropy (8bit): | 7.887137632069421 |
Encrypted: | false |
SSDEEP: | |
MD5: | 11F12327EF25BB8A289EC85DB9889AA4 |
SHA1: | 5DC55FE019552EC9C6980425038B40E29EF26B9A |
SHA-256: | A46E8971C294FC3BF44F66D68086367AF115592BA245C1B71357409385EF7287 |
SHA-512: | 1C2B73D12C4A7D1EBC163C1E810530E75EFFDE14F4C5E35AADA80CEFFFECBD5597FD0CB73F19B04CF2153F007738BB213A0C7CAA5E12023884F398AE3BC955FD |
Malicious: | false |
Reputation: | unknown |
URL: | https://public-eur.mkt.dynamics.com/api/v1.0/orgs/50217418-308e-ef11-8a66-000d3ade3052/landingpageforms/captcha/challenge/visual?flowId=a4aabe7c-c6e6-4cfc-afed-df12bc642442&rnd=f36340be3504487fa378d6d5299c79d6&market=en |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 23130 |
Entropy (8bit): | 5.457988887410901 |
Encrypted: | false |
SSDEEP: | |
MD5: | A2102256B393FB8F88A1C7676963F40F |
SHA1: | 20B3DF26B1E9BE285639114C871154C043EF5B1F |
SHA-256: | E47C094BBF9B24BF5265B2BD075D00BACCCA6F542AF270FB1EB248A12EB8E062 |
SHA-512: | 59E4BB491B37AB2DDA1644B54CFD6EF4CD2F0EA5535029DF7C0272325E7F7A16E02462921AC29F6FF1211E537E05F202CA2F129D01E469E6BBB8E50E2CE391D7 |
Malicious: | false |
Reputation: | unknown |
URL: | https://public-eur.mkt.dynamics.com/api/v1.0/orgs/50217418-308e-ef11-8a66-000d3ade3052/landingpageforms/captcha/script?fid=a4aabe7c-c6e6-4cfc-afed-df12bc642442&type=visual&rnd=68cdf9f2-4f7a-441c-97a1-25b107606af2&mkt=en |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1037 |
Entropy (8bit): | 5.818249601446592 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4A4AC4A62EA5F3E19022F354AE737B0A |
SHA1: | EF7FBABD1745A73D05650CC76643980AC496B323 |
SHA-256: | 97AADED71C0575ACE10FABD282FBA4CFA72352C70349D86FB5F2F297A84834B1 |
SHA-512: | 4320D0107599CB2406256F008C7D423FE89242968050F864F3B26AC13D99D492AA18DC8C63E709C69CA185E9074C72ABE79DE0D0AEC926E2A5A9C7AE519AC648 |
Malicious: | false |
Reputation: | unknown |
URL: | https://cxppusa1formui01cdnsa01-endpoint.azureedge.net/eur/Captcha/Images/icon_err.gif?vv=100 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 3324 |
Entropy (8bit): | 5.257223365742762 |
Encrypted: | false |
SSDEEP: | |
MD5: | FA61C923AB21E8F8EDEF308693D1F8A8 |
SHA1: | 527A3E1DFCDECE9F8564B90BEE157B5EA5CDB061 |
SHA-256: | AB91887477FD64AE82E5AF4C2F17DD2FB7CD13213C827AB0F8582D82E4D417EC |
SHA-512: | A4135C9980521B52D133659BD0E705E46441ACEC59AD8F3DE896ED5E185EC5435FDC4DA14158D513B4F256301817E8C0A55FDB7E744CE9833DD99A111774B276 |
Malicious: | false |
Reputation: | unknown |
URL: | https://use.typekit.net/rix3wkt.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 23130 |
Entropy (8bit): | 5.45764162914579 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6130845EFC9FF3D224CC6C2E20C1E3FC |
SHA1: | 64D692B28D372ED491352ED8BCCFE0BFB90EC762 |
SHA-256: | 9C2619FE52639D6FF4D52DD85FFFBB2D6FB88741E5F540E0681268D4DEE106E5 |
SHA-512: | 8FC007B0C075A0BC75790321BC2E31E02984D4CD0AC130BFA5FA4B15B2EEF55509C74E76E7F3B37755F98982280EA7F187CE1A344B377B2205830C7929BA3457 |
Malicious: | false |
Reputation: | unknown |
URL: | https://public-eur.mkt.dynamics.com/api/v1.0/orgs/50217418-308e-ef11-8a66-000d3ade3052/landingpageforms/captcha/script?dc=EastUS&mkt=en&fid=a4aabe7c-c6e6-4cfc-afed-df12bc642442&type=visual&c=1&rnd=0.9014102076580259 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 85330 |
Entropy (8bit): | 5.169246768433195 |
Encrypted: | false |
SSDEEP: | |
MD5: | 52BF1D4143D45FCA56002ACBF025041F |
SHA1: | 7AAE30F79B36CEE0670F0A1DB2F93DBBCACD1E2A |
SHA-256: | CD95CD888F97D373435B17B94E6F122B719ECAC4914341343280B10172FCAC05 |
SHA-512: | 46A443E67F178E285F54DFE0BEA18426CD1AAA79AFCB392FCF0D47B12F2D5823985D04BA17841070704C261B2DB9D73C6F4220E4B5EE3D171A84DC566DAF478F |
Malicious: | false |
Reputation: | unknown |
URL: | https://survey.responsly.com/assets/css/form.1d4d2b47.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 150140 |
Entropy (8bit): | 5.999654080589821 |
Encrypted: | false |
SSDEEP: | |
MD5: | 926D5177CD94C4BE28915EC9A0278AE2 |
SHA1: | 5680B4BA5B419B62D10F3AA122FC72C51EAFFBA4 |
SHA-256: | FF0A0AC278FF4FC8E84E8A8EB58B72D6302285A1E1DC1E7418D5245D0AF51387 |
SHA-512: | FBA199111C8F6EA6F79C2328035FB834023525F02D19361FEE800DFDC45E0FCE8E88E1E68812DA4F3E07B3863930E09AD21BC5B762003D45CD52FFAA6392877D |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16 |
Entropy (8bit): | 3.875 |
Encrypted: | false |
SSDEEP: | |
MD5: | C79ACB86AFB721AC49A511937F416F7A |
SHA1: | 08A998839C183DEBD73B820BF4DFE3D32523488B |
SHA-256: | F7A08A0606E5A0C0657ED109900A6C2F29807852FB9EEB1EF582B007A72F4711 |
SHA-512: | B204142816ECD205CDAB749FE52FBEBB8588CE0F391005B1C2F5B65B4728D0AA66934A544BBE491A8A141C2864C39EFC3E3D7920189648D639D05606CD6F494D |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAkV18ax6FRNLBIFDcROmWY=?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 470 |
Entropy (8bit): | 4.234435218685777 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1A725E55D9845CF44F1C26C218BB347B |
SHA1: | 38A4F78CF1C0CFEB1D9664B80F12771825989A4D |
SHA-256: | 584C12228990075A000BB38235975C325BABE10E34ABC47F45144851E29FBDF9 |
SHA-512: | 6746DC89B5647B1CE664DD9B8C8805D193323C025235ECCF39FEA2CB030B543EF01BB5FBD2EAA1EC7F749D3BE06A3ADDB5C80BEE458C631034AA137D99B1C4D9 |
Malicious: | false |
Reputation: | unknown |
URL: | https://survey.responsly.com/images/icons/site.webmanifest |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4054 |
Entropy (8bit): | 7.797012573497454 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9F14C20150A003D7CE4DE57C298F0FBA |
SHA1: | DAA53CF17CC45878A1B153F3C3BF47DC9669D78F |
SHA-256: | 112FEC798B78AA02E102A724B5CB1990C0F909BC1D8B7B1FA256EAB41BBC0960 |
SHA-512: | D4F6E49C854E15FE48D6A1F1A03FDA93218AB8FCDB2C443668E7DF478830831ACC2B41DAEFC25ED38FCC8D96C4401377374FED35C36A5017A11E63C8DAE5C487 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 491 |
Entropy (8bit): | 5.080011546605829 |
Encrypted: | false |
SSDEEP: | |
MD5: | B82D0B2C4AC82C41D723B1B541934350 |
SHA1: | 056F835657BFBC4B4E5DD4B98E46A29126C2EBE5 |
SHA-256: | 86F2E8441D5B3C1AE9CCEC4FADED78396648CB017C645825DC8DC4B4283CC1AA |
SHA-512: | D7318688CFCE18C462EBFCD69CD4BABE3BB6D12E1F6730CB1C752D7A71F2CB300A1238FAA14118950098ABBD2A600D71101D7B28E0E08797E3D37555376212E9 |
Malicious: | false |
Reputation: | unknown |
URL: | https://assets-eur.mkt.dynamics.com/50217418-308e-ef11-8a66-000d3ade3052/digitalassets/standaloneforms/46a79031-fd94-ef11-8a69-6045bde08fb3 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5669 |
Entropy (8bit): | 7.878217183856959 |
Encrypted: | false |
SSDEEP: | |
MD5: | 938C20D1573A1481EB1200A8F15794E6 |
SHA1: | 6EA192F9896A533F8A480C11F355CCB61D6F8CFC |
SHA-256: | BA96D73C6BD72689FCB3E50E71E938D298E1497035FB7F94CCCB255359843E6C |
SHA-512: | 687E7B3C0AC93C77EC810B760C96D2D9237C3BFF08FE92AD89B764267507FE3E6803B39A61873576F55D246687E1DB91EA41CB1CBE55BB193F688C898BA6FCBF |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 48236 |
Entropy (8bit): | 7.994912604882335 |
Encrypted: | true |
SSDEEP: | |
MD5: | 015C126A3520C9A8F6A27979D0266E96 |
SHA1: | 2ACF956561D44434A6D84204670CF849D3215D5F |
SHA-256: | 3C4D6A1421C7DDB7E404521FE8C4CD5BE5AF446D7689CD880BE26612EAAD3CFA |
SHA-512: | 02A20F2788BB1C3B2C7D3142C664CDEC306B6BA5366E57E33C008EDB3EB78638B98DC03CDF932A9DC440DED7827956F99117E7A3A4D55ACADD29B006032D9C5C |
Malicious: | false |
Reputation: | unknown |
URL: | https://fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 6845 |
Entropy (8bit): | 7.896115142024024 |
Encrypted: | false |
SSDEEP: | |
MD5: | CFFFA1EDAB9259B98392A5C42B880329 |
SHA1: | FA9F28905D4CBB5687F65B0600F121984E289092 |
SHA-256: | 374C9F4FBA04F65C04DD3A6ACA91B44479184027936317E431E73951FA415941 |
SHA-512: | FF458DCF3C522195E8B121497614F3B0DB4D1ED7BEBB22F2069B92121AACD6B904878352B8F6D04A4D70996E26B86B47C805272CE2B29728EA1AAB3C1DAD6E03 |
Malicious: | false |
Reputation: | unknown |
URL: | https://public-eur.mkt.dynamics.com/api/v1.0/orgs/50217418-308e-ef11-8a66-000d3ade3052/landingpageforms/captcha/challenge/visual?flowId=a4aabe7c-c6e6-4cfc-afed-df12bc642442&rnd=f272fc83bee44c769962a012698d7a01&market=en |
Preview: |
File type: | |
Entropy (8bit): | 6.105908144397714 |
TrID: |
|
File name: | FYI - Important.eml |
File size: | 68'234 bytes |
MD5: | 1d808b896c084387d7c3499e52ab3c3e |
SHA1: | e425661c11311dd281d65476c459d8dc0612a0ef |
SHA256: | f18d137f53c4dc3a6fab99cef9b67ee0390bb130aa13c78b9ac8b541fb84f278 |
SHA512: | 4cc3b13b696f3baf4807ee1b1eeeb305710fac5c8a7c1ac7e0372de970130c3b35719f73a5af9481be48b11f14ad902c6b8a0e9ace9d235e941580229a664739 |
SSDEEP: | 1536:5vEmMwXX14FMH0jRrZ2mx6V/hJFqNZlFfQxjAv:5sinOSNV/hJFqN98jG |
TLSH: | 0D639E858F943430F66229EE8E147C0E52713A8F98F7AEC036D9A4875F9F5271F17609 |
File Content Preview: | Received: from VI2PR03MB10715.eurprd03.prod.outlook.com.. (2603:10a6:800:27b::22) by AM9PR03MB7664.eurprd03.prod.outlook.com with.. HTTPS; Wed, 30 Oct 2024 10:05:35 +0000..ARC-Seal: i=3; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=fail;.. b=Fr8e |
Subject: | FYI - Important |
From: | James Garland <james.garland@r2s.org.uk> |
To: | Undisclosed recipients:; |
Cc: | |
BCC: | |
Date: | Wed, 30 Oct 2024 10:04:37 +0000 |
Communications: |
|
Attachments: |
|
Key | Value |
---|---|
Received | from DBAPR08MB5719.eurprd08.prod.outlook.com ([fe80::13e9:913b:978a:5048]) by DBAPR08MB5719.eurprd08.prod.outlook.com ([fe80::13e9:913b:978a:5048%5]) with mapi id 15.20.8093.025; Wed, 30 Oct 2024 10:04:38 +0000 |
ARC-Seal | i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=OsYQ9Kcq2hsHvJSgntMwb6UOjoWWi3NYULvPjiVzE5uUzEGGnwf3wZ1xHqI7lip6QkO4NYaDpXEbpSGzfbvCfUSt8KWONgL+NSG1iFtB8DNpRywG3nxXx9KSODYY2dB8gA3b4PrwIVfOKGfH2VylOctiBNMsNElWnfHm19wPgcjtREjanlQgBmx4pGJUFH5OsypGUv9FoZiiOnEuK831K5hlDgTbjCMKabnrax2jj14g9vorEhEDxAWJynhnFGG3SUTgE9HlM0ZJunh6p8mABz9TIjEcUh2bK7FSV82na+9ehjokPbreEl0lahv6FeJrHZHxMiqUvveCUKonsBYcGg== |
ARC-Message-Signature | i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=grAzTgVMfa7lZKZt7huhpe9GcgapnxS2xiTvmdkXmlg=; b=wf3imYAQA8089H/sm/w/ZS4QFNIPprJZnSNFpZ6dKwZbOlYsVZobICjz6h47bZ7zoxxK22295H1uJStzSpTJzA3xylZ1t72dG8iPNqzT06F9e0qdZZ8LBpfgSA7U6QyxY7kbuW/S61WSrcnHk5MYjKOybZng4SPlL9a4RnneJqCA9cwhDW+bcSEPMqwlSNUnnSVEdkDIZPosqOwiccw/iLry/9pzH7E6lxL3ajzHYmFwKZR+UhM+aIERfGp1nLtodLNC7VVYRw39b1XbOcanu72kqSrOVPCyMJCFC5hO2j00d1jxnvyhZKR6yU+OoMP+hFIvqgifcYU3skBjXNy02Q== |
ARC-Authentication-Results | i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=r2s.org.uk; dmarc=pass action=none header.from=r2s.org.uk; dkim=pass header.d=r2s.org.uk; arc=none |
Authentication-Results | spf=fail (sender IP is 198.154.180.198) smtp.mailfrom=r2s.org.uk; dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=r2s.org.uk;compauth=fail reason=001 |
Received-SPF | Pass (protection.outlook.com: domain of r2s.org.uk designates 40.107.22.97 as permitted sender) receiver=protection.outlook.com; client-ip=40.107.22.97; helo=EUR05-AM6-obe.outbound.protection.outlook.com; pr=C |
X-Sophos-Product-Type | Mailflow |
X-Sophos-Email-ID | bf219f95e97546c0adf5e0547691a9f3 |
Authentication-Results-Original | dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=r2s.org.uk; |
From | James Garland <james.garland@r2s.org.uk> |
Subject | FYI - Important |
Thread-Topic | FYI - Important |
Thread-Index | Adsqsgb+YycJzBBeT+6m9R/Zt/xNxA== |
Date | Wed, 30 Oct 2024 10:04:37 +0000 |
Message-ID | <DBAPR08MB571930F14434922C44C28B7080542@DBAPR08MB5719.eurprd08.prod.outlook.com> |
Accept-Language | en-GB, en-US |
Content-Language | en-US |
X-MS-Has-Attach | yes |
X-MS-TNEF-Correlator | |
x-ms-traffictypediagnostic | DBAPR08MB5719:EE_|PA4PR08MB6045:EE_|AM2PEPF0001C712:EE_|VI2PR03MB10620:EE_|AM4PEPF00025F99:EE_|VI2PR03MB10715:EE_|AM9PR03MB7664:EE_ |
X-MS-Office365-Filtering-Correlation-Id | ab7e67a2-d32e-4dfa-44e3-08dcf8ca6417 |
x-ms-exchange-senderadcheck | 1 |
x-ms-exchange-antispam-relay | 0 |
X-Microsoft-Antispam-Untrusted | BCL:0;ARA:13230040|35042699022|8096899003; |
X-Microsoft-Antispam-Message-Info-Original | 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 |
X-Forefront-Antispam-Report-Untrusted | CIP:40.107.22.97; CTRY:NL; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:EUR05-AM6-obe.outbound.protection.outlook.com; PTR:mail-am6eur05on2097.outbound.protection.outlook.com; CAT:NONE; SFS:(13230040)(35042699022)(8096899003); DIR:INB; |
X-MS-Exchange-AntiSpam-MessageData-Original-ChunkCount | 1 |
X-MS-Exchange-AntiSpam-MessageData-Original-0 | UD68iklez/GNRB4lOAkvb99pYbmINcPU0H2PmJkO4U2JReCVyF0a2nkktvMFQ0TijlDREPYFV1HQddSurRC1Q01IeVQbKqEka30kg38ViMPglSw6MuXUSzTMNpvf+cKUpv2RCYCiISTeJ8WredbGzrq5E60Mpo4MxSATAfx320E6Q3f/f4H+55eRQVLVOn2gKM0SMowDm3ogNkMinEHxiC+xnlv8panYbrxEnbG4DWBmjcGoR/y6k2vDJYBv9xuYmF9TbChamw8XbWHEO2Rq/LxjtlD0gv4Gnu0HeBO+eNu9aYJu+FTXl+X/sS3JaUPOUCfHO4ZifbpBSDlnWeKNL1iKDoBU6wIyqyM1m9dx0OsQOLRu+LZeXgraWxHG+xsel4h6lcbzW4JbEVAsgjauDdSy5SiTCtGoRZM11+r86fl3UFnPyqT9JMuW+bts6y4GArxyHWBc0lnmoZKq4kki4YlF8Ir6Bw5P2/TwzRb/Z1I6K7j4ItTWHZ/3fuMPOsgPtLtOhIX10EoqQvaol5eckJI0btQxIhKfb32ZZddNJeFAEH5WnflEXFAn2/EX9pWRqvDHdDeGbLV1sFJv4en9YHQg2yZLutz2LeRP9lFS5wQdlQXWE7sE/eGUv8ru+L7OhRc8zKtJ62W1OoeBB37Bd5zgm425ruesHHg21zs3KbPh4PIcUsschBeIrpja+MgXqrKN+7GfJzUlHWyGBFYUqy9W/Awh85MKnkKbVtjZYfoz24QOhuzXxgr3N/fZaTImWRY1KpVX4yu88oHpSUjzf5Wp72nxkv16SQ+z6nSIJ4LWHZRYPWkVhgFMJ8PpZ5MH49hK5TIAM3HeojnAFT7eDB3bTKHo1QPJBY1iNkOBlIpINOTWdYO2ck905Iga8zHPmnVh/Zbet9g/swsosAlAu/02mjip02jTzycOFjLklrusNg8VZ8UDjtVaam5As4buXBZ+9sdpgJJ9v2R5sBBBw2K+K+vsjBaBhijSGK7U5DoCx6buaQbqyYP3e4g5IYdHzKnGlFKJRkiPm/XZVHQ+Ljqy4Qh/5VzPVZQDLdAXoB+yNr1hTirrM1H52z64fuEBlbLpsASX1wDZ3TW97AnQfEVXkwIHctMrwNBPEnogwkiSsZZK3G8n75M8ZJeawBpvUM1j6A4mOceMPOi6meoRWY/WgfP8BQxM87KgcRA3mBRIvLUSHVrpvVBNjFZW/pL6LRxOItQ9suad6d4rqyuUUCujiIUDBWYUO0wVrw6nCPnI4rFUJAaQcKm0SF+jtqMhn77+vNgoaecvjjz86HdyLhuY2hZ8y4JtBs6YAbIrKFHHcpsLThffhyJADSpe/EAN2JDXG/Ey7zGhwMN+eyc9AJo1kW25rOd2xNE0vmuzbgnj7m2qkW2saZvT7CpxWYo3hlW6fmQBO92tJd0CgJP7LRUedR5LLmioSVOcnmsmXYSsg44zhn6M3cJ9pwq6iP64Md5EguxJ0uZA5zytdPbaiXX1sv/gZNGVOMJC4R/jzZD+ISSiDRIPzMIbhipdkHXQrlfbJaE7XkA2NuJmj/YbYq85ooTEQlZdT+heAbvMYt8YMeLsBaJtW1BO42iItepv |
Content-Type | multipart/mixed; boundary="_004_DBAPR08MB571930F14434922C44C28B7080542DBAPR08MB5719eurp_" |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | VI2PR03MB10715 |
To | Undisclosed recipients:; |
X-EOPAttributedMessage | 1 |
X-EOPTenantAttributedMessage | 7956b84e-0c99-46b5-81c6-28689cfa7221:1 |
X-MS-Exchange-Transport-CrossTenantHeadersStripped | AM4PEPF00025F99.EURPRD83.prod.outlook.com |
X-MS-Exchange-Transport-CrossTenantHeadersPromoted | AM2PEPF0001C712.eurprd05.prod.outlook.com |
X-MS-Office365-Filtering-Correlation-Id-Prvs | da3d2f5d-7ac1-4cf0-85ba-08dcf8ca4508 |
X-Sophos-Email-Scan-Details | 27140d1e1540510e7e771140550e7d75 |
X-Sophos-Email | [eu-west-1] Antispam-Engine: 6.0.0, AntispamData: 2024.10.30.93916 |
X-Sophos-SenderHistory | ip=40.107.22.97, fs=109150877, fso=152181990, da=223741336, mc=366629, sc=522, hc=366107, sp=0, re=4, sd=0, hd=30 |
X-Sophos-DomainHistory | d=r2s.org.uk, fs=8, fso=8, da=84484160, mc=4, sc=0, hc=4, sp=0, re=0, sd=0, hd=0 |
X-LASED-From-ReplyTo-Diff | From:<cardfactory.co.uk>:11, From:<printcraft.co.uk>:11 |
X-LASED-SpamProbability | 0.109097 |
X-LASED-Hits | ARCAUTH_PASSED 0.000000, BODYTEXTH_SIZE_10000_LESS 0.000000, BODYTEXTP_SIZE_3000_LESS 0.000000, BODYTEXTP_SIZE_400_LESS 0.000000, BODY_SIZE_10000_PLUS 0.000000, BODY_SIZE_25K_PLUS 0.000000, DQ_S_H 0.000000, EMAIL_ATTACHED 0.000000, HTML_90_100 0.100000, HTML_95_100 0.100000, IMP_FROM_NOTSELF 0.000000, INBOUND_SOPHOS 0.000000, INBOUND_SOPHOS_TOP_REGIONS 0.000000, KNOWN_MTA_TFX 0.000000, MULTIPLE_RCPTS 0.100000, NO_CTA_URI_FOUND 0.000000, NO_FUR_HEADER 0.000000, NO_URI_FOUND 0.000000, NO_URI_HTTPS 0.000000, OBFU_SHORT_10CHARS 0.500000, SXL_IP_TFX_WM 0.000000, TO_HAS_SPACES 0.000000, TO_UNDISCLOSED_RECIPIENTS 0.000000, WEBMAIL_SOURCE 0.000000, __ARCAUTH_DKIM_NONE 0.000000, __ARCAUTH_DKIM_PASSED 0.000000, __ARCAUTH_DMARC_PASSED 0.000000, __ARCAUTH_PASSED 0.000000, __ARC_SEAL_MICROSOFT 0.000000, __ARC_SIGNATURE_MICROSOFT 0.000000, __ATTACHMENT_NOT_IMG 0.000000, __ATTACHMENT_SIZE_25_50K 0.000000, __ATTACH_CTE_BASE64 0.000000, __ATTACH_CTE_QUOTED_PRINTABLE 0.000000, __AUTH_RES_ORIG_DKIM_NONE 0.000000, __AUTH_RES_ORIG_DMARC_NONE 0.000000, __AUTH_RES_PASS 0.000000, __BEC_SUBJ_KEYWORD 0.000000, __BODY_NO_MAILTO 0.000000, __BODY_TEXT_X4 0.000000, __CT 0.000000, __CTYPE_HAS_BOUNDARY 0.000000, __CTYPE_MULTIPART 0.000000, __CTYPE_MULTIPART_MIXED 0.000000, __DQ_DOMAIN_SUSP_1 0.000000, __DQ_DOMAIN_SUSP_2 0.000000, __DQ_D_H 0.000000, __DQ_IP_FSO_LARGE 0.000000, __DQ_NEG_DOMAIN 0.000000, __DQ_NEG_HEUR 0.000000, __DQ_NEG_IP 0.000000, __DQ_S_DOMAIN_100K 0.000000, __DQ_S_DOMAIN_10K 0.000000, __DQ_S_DOMAIN_1K 0.000000, __DQ_S_DOMAIN_FSO_100K 0.000000, __DQ_S_DOMAIN_FSO_10K 0.000000, __DQ_S_DOMAIN_FSO_1K 0.000000, __DQ_S_DOMAIN_FSO_1M 0.000000, __DQ_S_DOMAIN_FSO_3M 0.000000, __DQ_S_DOMAIN_FSO_600K 0.000000, __DQ_S_DOMAIN_HD_0 0.000000, __DQ_S_DOMAIN_HIST_1 0.000000, __DQ_S_DOMAIN_MC_1_P 0.000000, __DQ_S_DOMAIN_RE_0 0.000000, __DQ_S_DOMAIN_RE_49_L 0.000000, __DQ_S_DOMAIN_RE_4_L 0.000000, __DQ_S_DOMAIN_RE_99_L 0.000000, __DQ_S_DOMAIN_RE_9_L 0.000000, __DQ_S_DOMAIN_SP_0_P 0.000000, __DQ_S_HIST_1 0.000000, __DQ_S_HIST_2 0.000000, __DQ_S_IP_HD_10_P 0.000000, __DQ_S_IP_MC_100_P 0.000000, __DQ_S_IP_MC_10_P 0.000000, __DQ_S_IP_MC_1K_P 0.000000, __DQ_S_IP_MC_1_P 0.000000, __DQ_S_IP_MC_5_P 0.000000, __DQ_S_IP_RE_49_L 0.000000, __DQ_S_IP_RE_4_L 0.000000, __DQ_S_IP_RE_99_L 0.000000, __DQ_S_IP_RE_9_L 0.000000, __DQ_S_IP_SC_100_P 0.000000, __DQ_S_IP_SC_10_P 0.000000, __DQ_S_IP_SC_1_P 0.000000, __DQ_S_IP_SC_5_P 0.000000, __DQ_S_IP_SP_0_P 0.000000, __EML_ATTACHED1 0.000000, __EML_ATTACHED2 0.000000, __FRAUD_SUBJ_A 0.000000, __FROM_DOMAIN_NOT_IN_BODY 0.000000, __FROM_NAME_NOT_IN_BODY 0.000000, __FUR_RDNS_OUTLOOK 0.000000, __HAS_ATTACHMENT 0.000000, __HAS_ATTACHMENT1 0.000000, __HAS_ATTACHMENT2 0.000000, __HAS_FROM 0.000000, __HAS_HTML 0.000000, __HAS_MSGID 0.000000, __HAS_X_FF_ASR 0.000000, __HAS_X_FF_ASR_CAT 0.000000, __HAS_X_FF_ASR_SFV 0.000000, __HTML_TAG_DIV 0.000000, __IMP_FROM_NOTSELF_MULTI 0.000000, __INBOUND_SOPHOS_EU_WEST_1 0.000000, __JSON_HAS_MODELS 0.000000, __JSON_HAS_SCHEMA_VERSION 0.000000, __JSON_HAS_SENDER_AUTH 0.000000, __JSON_HAS_TENANT_DOMAINS 0.000000, __JSON_HAS_TENANT_ID 0.000000, __JSON_HAS_TENANT_SCHEMA_VERSION 0.000000, __JSON_HAS_TENANT_VIPS 0.000000, __JSON_HAS_TRACKING_ID 0.000000, __MIME_ATTACHMENT_1_N 0.000000, __MIME_ATTACHMENT_N_2 0.000000, __MIME_HTML 0.000000, __MIME_TEXT_H 0.000000, __MIME_TEXT_H1 0.000000, __MIME_TEXT_H2 0.000000, __MIME_TEXT_P 0.000000, __MIME_TEXT_P1 0.000000, __MIME_TEXT_P2 0.000000, __MIME_VERSION 0.000000, __MODEL_THREAT_GE_25 0.000000, __MODEL_THREAT_SINGLE_GE_25 0.000000, __MSGID_32_64_CAPS 0.000000, __MTHREAT_45 0.000000, __MTL_45 0.000000, __OCTET_STREAM_ATTACHED 0.000000, __PART_TYPE_HTML 0.000000, __PHISH_SPEAR_STRUCTURE_1 0.000000, __PHISH_SPEAR_SUBJ_ALERT 0.000000, __RCVD_PASS 0.000000, __RDNS_WEBMAIL 0.000000, __SANE_MSGID 0.000000, __SCAN_DETAILS 0.000000, __SCAN_DETAILS_SANE 0.000000, __SCAN_DETAILS_TL_0 0.000000, __STYLE_RATWARE_NEG 0.000000, __STYLE_TAG 0.000000, __SUBJ_ALPHA_END 0.000000, __SUBJ_SHORT 0.000000, __TAG_EXISTS_BODY 0.000000, __TAG_EXISTS_HEAD 0.000000, __TAG_EXISTS_HTML 0.000000, __TAG_EXISTS_META 0.000000, __TO_MALFORMED_3 0.000000, __URI_NO_MAILTO 0.000000, __X_FF_ASR_SCL_NSP 0.000000, __X_FF_ASR_SFV_NSPM 0.000000 |
X-LASED-Impersonation | False |
X-LASED-Spam | NonSpam |
X-Sophos-MH-Mail-Info-Key | NFhkalJ3MW1jbXpSaFIzLTE3Mi4xOS4wLjI3 |
Return-Path | james.garland@r2s.org.uk |
X-MS-Exchange-Organization-ExpirationStartTime | 30 Oct 2024 10:05:32.6096 (UTC) |
X-MS-Exchange-Organization-ExpirationStartTimeReason | OriginalSubmit |
X-MS-Exchange-Organization-ExpirationInterval | 1:00:00:00.0000000 |
X-MS-Exchange-Organization-ExpirationIntervalReason | OriginalSubmit |
X-MS-Exchange-Organization-Network-Message-Id | ab7e67a2-d32e-4dfa-44e3-08dcf8ca6417 |
X-MS-Exchange-Organization-MessageDirectionality | Incoming |
X-MS-PublicTrafficType | |
X-MS-Exchange-Organization-AuthSource | AM4PEPF00025F99.EURPRD83.prod.outlook.com |
X-MS-Exchange-Organization-AuthAs | Anonymous |
X-MS-Exchange-Organization-SCL | -1 |
X-Microsoft-Antispam | BCL:0;ARA:13230040|35042699022|8096899003; |
X-Forefront-Antispam-Report | CIP:198.154.180.198;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:SKN;H:mfid-euw1.prod.hydra.sophos.com;PTR:mfid-euw1.prod.hydra.sophos.com;CAT:NONE;SFS:(13230040)(35042699022)(8096899003);DIR:INB; |
X-MS-Exchange-CrossTenant-OriginalArrivalTime | 30 Oct 2024 10:05:32.5159 (UTC) |
X-MS-Exchange-CrossTenant-Network-Message-Id | ab7e67a2-d32e-4dfa-44e3-08dcf8ca6417 |
X-MS-Exchange-CrossTenant-Id | 7956b84e-0c99-46b5-81c6-28689cfa7221 |
X-MS-Exchange-CrossTenant-AuthSource | AM4PEPF00025F99.EURPRD83.prod.outlook.com |
X-MS-Exchange-CrossTenant-AuthAs | Anonymous |
X-MS-Exchange-CrossTenant-FromEntityHeader | Internet |
X-MS-Exchange-Transport-EndToEndLatency | 00:00:03.2140499 |
X-MS-Exchange-Processed-By-BccFoldering | 15.20.8093.023 |
X-Microsoft-Antispam-Mailbox-Delivery | ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003); |
X-Microsoft-Antispam-Message-Info | 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 |
MIME-Version | 1.0 |
Icon Hash: | 46070c0a8e0c67d6 |