Windows
Analysis Report
FW Important Security Policy Update.msg
Overview
General Information
Detection
Score: | 52 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- OUTLOOK.EXE (PID: 6880 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /f "C:\Users \user\Desk top\FW Imp ortant Sec urity Poli cy Update. msg" MD5: 91A5292942864110ED734005B7E005C0) - ai.exe (PID: 7112 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "9C0 B6627-2B38 -403D-879F -4A9B58272 6E5" "FB03 4C2D-0FA9- 472D-A388- 667D3E8EC4 B6" "6880" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD) - chrome.exe (PID: 5856 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// url.us.m.m imecastpro tect.com/s /qG95CL9mj xiRpjD5uBf gHy_mcS?do main=guru. phishing.g uru MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA) - chrome.exe (PID: 1036 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2148 --fi eld-trial- handle=177 6,i,131638 9721221761 8910,71816 2321116714 265,262144 --disable -features= Optimizati onGuideMod elDownload ing,Optimi zationHint s,Optimiza tionHintsF etching,Op timization TargetPred iction /pr efetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_KnowBe4 | Yara detected KnowBe4 simulated phishing | Joe Security |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: X__Junior (Nextron Systems): |
Click to jump to signature section
Phishing |
---|
Source: | File source: |
Source: | Joe Sandbox AI: |
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | Window found: |
Source: | Window detected: |
Source: | Key opened: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | Key value created or modified: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | File Volume queried: |
Source: | Process information queried: |
Source: | Queries volume information: |
Source: | Key value queried: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Modify Registry | LSASS Memory | 13 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Registry Run Keys / Startup Folder | 1 Registry Run Keys / Startup Folder | 1 Process Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cdn2.hubspot.net | 104.18.90.62 | true | false | high | |
a.nel.cloudflare.com | 35.190.80.1 | true | false | high | |
url.us.m.mimecastprotect.com | 207.211.31.64 | true | false | high | |
s3.amazonaws.com | 52.217.118.144 | true | false | high | |
cdnjs.cloudflare.com | 104.17.24.14 | true | false | high | |
www.google.com | 142.250.186.164 | true | false | high | |
upload.wikimedia.org | 185.15.59.240 | true | false | high | |
secured-login.net | 52.201.152.49 | true | false | high | |
landing.training.knowbe4.com | 52.7.5.107 | true | false | high | |
ipv4.imgur.map.fastly.net | 199.232.192.193 | true | false | high | |
guru.phishing.guru | unknown | unknown | false | unknown | |
i.imgur.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.185.99 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.186.170 | unknown | United States | 15169 | GOOGLEUS | false | |
52.178.17.3 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
52.109.89.18 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
172.217.18.14 | unknown | United States | 15169 | GOOGLEUS | false | |
52.7.5.107 | landing.training.knowbe4.com | United States | 14618 | AMAZON-AESUS | false | |
104.18.90.62 | cdn2.hubspot.net | United States | 13335 | CLOUDFLARENETUS | false | |
142.250.185.227 | unknown | United States | 15169 | GOOGLEUS | false | |
52.109.68.129 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
52.205.64.62 | unknown | United States | 14618 | AMAZON-AESUS | false | |
185.15.59.240 | upload.wikimedia.org | Netherlands | 14907 | WIKIMEDIAUS | false | |
207.211.31.64 | url.us.m.mimecastprotect.com | United States | 14135 | NAVISITE-EAST-2US | false | |
2.19.126.160 | unknown | European Union | 16625 | AKAMAI-ASUS | false | |
52.111.243.42 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
142.250.186.131 | unknown | United States | 15169 | GOOGLEUS | false | |
35.190.80.1 | a.nel.cloudflare.com | United States | 15169 | GOOGLEUS | false | |
52.201.152.49 | secured-login.net | United States | 14618 | AMAZON-AESUS | false | |
52.217.118.144 | s3.amazonaws.com | United States | 16509 | AMAZON-02US | false | |
52.113.194.132 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
104.17.24.14 | cdnjs.cloudflare.com | United States | 13335 | CLOUDFLARENETUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
74.125.133.84 | unknown | United States | 15169 | GOOGLEUS | false | |
199.232.192.193 | ipv4.imgur.map.fastly.net | United States | 54113 | FASTLYUS | false | |
104.18.91.62 | unknown | United States | 13335 | CLOUDFLARENETUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
142.250.186.164 | www.google.com | United States | 15169 | GOOGLEUS | false | |
184.28.90.27 | unknown | United States | 16625 | AKAMAI-ASUS | false |
IP |
---|
192.168.2.17 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1555939 |
Start date and time: | 2024-11-14 17:01:16 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 21 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | FW Important Security Policy Update.msg |
Detection: | MAL |
Classification: | mal52.phis.winMSG@19/38@30/238 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 52.109.89.18, 52.109.68.129, 2.19.126.160, 2.19.126.151, 184.28.90.27, 52.113.194.132, 52.111.243.42, 52.111.243.41, 52.111.243.43, 52.111.243.40, 52.178.17.3
- Excluded domains from analysis (whitelisted): omex.cdn.office.net, slscr.update.microsoft.com, weu-azsc-config.officeapps.live.com, eur.roaming1.live.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, login.live.com, e16604.g.akamaiedge.net, frc-azsc-000.roaming.officeapps.live.com, officeclient.microsoft.com, prod.fs.microsoft.com.akadns.net, a1864.dscd.akamai.net, ecs.office.com, self-events-data.trafficmanager.net, fs.microsoft.com, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, osiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, fe3cr.delivery.mp.microsoft.com, prod1.naturallanguageeditorservice.osi.office.net.akadns.net, nleditor.osi.office.net, prod-eu-resolver.naturallanguageeditorservice.osi.office.net.akadns.net, s-0005.s-msedge.net, config.officeapps.live
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: FW Important Security Policy Update.msg
Input | Output |
---|---|
URL: Model: Joe Sandbox AI | { "explanation": [ "The sender email 'noreply@updates-microsoft365.com' is suspicious and not a legitimate Microsoft domain", "The email contains phishing-like URLs (guru.phishing.guru in the links)", "The message creates urgency by requiring immediate action for 'security policy updates'" ], "phishing": true, "confidence": 10 } |
{ "date": "Thu, 14 Nov 2024 01:21:17 +0100", "subject": "FW: Important Security Policy Update", "communications": [ "External Sender:\n\n________________________________\n\n\nIm wondering if other staff receive these as well and if staff should apply update or should we send out an email that its done in another way?\n\n \n\nTammy Busch\n\nAssistant Superintendent of Business Services\n\nCertified School Risk Manager\n\nRiver Delta Unified School District\n\n707-374-1715\n\ntbusch@rdusd.org <mailto:tbusch@rdusd.org> \n\n \n\n", "From: Microsoft 365 <noreply@updates-microsoft365.com> \nSent: Wednesday, November 13, 2024 3:18 PM\nTo: Tammy Busch <tbusch@rdusd.org>\nSubject: Important Security Policy Update\n\n \n\n <https://upload.wikimedia.org/wikipedia/commons/thumb/9/96/Microsoft_logo_%282012%29.svg/1024px-Microsoft_logo_%282012%29.svg.png> \n\nImportant Security Policy Update\n\nHi Tammy Busch,\n\nA new update was recently released for one or more Microsoft services currently active in your account tbusch@rdusd.org <mailto:tbusch@rdusd.org> .\n\nVersion Release Date: November 13, 2024\nVersion Release Code: 23407142\n\nYou're required to accept the updated policy changes to continue using your account securely.\n\n \n\nApply Update <https://url.us.m.mimecastprotect.com/s/qG95CL9mjxiRpjD5uBfgHy_mcS?domain=guru.phishing.guru> \n\n \n\nMicrosoft 365 Mobile & Desktop Apps Security Patch\n\nWe've released a major security patch to the following update channels for Microsoft 365 Apps: Azure SSL/TLS Security Certificate. When will this happen: We'll be gradually rolling out this update of Microsoft 365 Apps to users on the update channel.\n\nIf you have any questions about this update, please let us know <https://url.us.m.mimecastprotect.com/s/qG95CL9mjxiRpjD5uBfgHy_mcS?domain=guru.phishing.guru> .\n\nThank you,\nMicrosoft 365 Security Team\n\n <https://guru.phishing.guru/XZUd2ZXlxLzNlUGc1d0NKWkJBYWo5YmFEYSt0ZzM2R3djTm5iS1JYdS93YW5hN1p6ZGlkeVcyRGV0VnJadjNpbVl1V0JmTUcxREJuRHUvbUVCK1c1dGdtRnlZbEQ1S2thZi8rOUtRekcraVJwSXJOWS9zRHl1dz09LS1VNmdTRHNPTEh2YUYxeWQ5LS05RFcwVktJSkhHQU94alBBdmlpNXlRPT0=?cid=2279533539> \n\n" ], "from": "Tammy Busch <tbusch@rdusd.org>", "to": "Gabriel Espinoza <gespinoza@mydatapath.com>", "attachements": [] } | |
URL: Email Model: Joe Sandbox AI | ```json { "contains_trigger_text": true, "trigger_text": "You're required to accept the updated policy changes to continue using your account securely.", "prominent_button_name": "unknown", "text_input_field_labels": "unknown", "pdf_icon_visible": false, "has_visible_captcha": false, "has_urgent_text": true, "has_visible_qrcode": false } |
URL: Email Model: Joe Sandbox AI | ```json { "brands": [ "Microsoft" ] } |
URL: Model: Joe Sandbox AI | { "typosquatting": false, "unusual_query_string": false, "suspicious_tld": false, "ip_in_url": false, "long_subdomain": false, "malicious_keywords": true, "encoded_characters": false, "redirection": false, "contains_email_address": false, "known_domain": false, "brand_spoofing_attempt": false, "third_party_hosting": false } |
URL: https://secured-login.net |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 231348 |
Entropy (8bit): | 4.393832477485484 |
Encrypted: | false |
SSDEEP: | |
MD5: | B1897DD53D51B6F09E4FDF9D278E0395 |
SHA1: | 8BA0D0AEC584EC840BB40775F75F97221AD941FE |
SHA-256: | 6EFB8B7567A884BE78B3454B60EFA77B133D03034CB74E361767EFB3C9D8E9E5 |
SHA-512: | 09A3057FF74AFDC1B6BEA0D6C4F7E3BE55BE557636B33BD427714EA4E6152AA2FF0674CC613447D3D08DCF1624DC473E6C7504056265387E8466ECACA00C1927 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 1869 |
Entropy (8bit): | 5.088156953232603 |
Encrypted: | false |
SSDEEP: | |
MD5: | 773A03DBAA8EF4BFEAC942D3F9ECF997 |
SHA1: | A967792CE67ECEABBC9D2986CF3BE61B5FD2C803 |
SHA-256: | D8274EC73C45AA81FE8F1FD81B0E31B2251CD5DF3B624642B2024D05AD777E2F |
SHA-512: | 9DFF78C9EA04BEEB89D8E3113D76269B8315EC5237018678BA62523DA05F99472000034B8697F792A8218912DC59B889D692BB271E13231CCF9212544399011D |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 521377 |
Entropy (8bit): | 4.9084889265453135 |
Encrypted: | false |
SSDEEP: | |
MD5: | C37972CBD8748E2CA6DA205839B16444 |
SHA1: | 9834B46ACF560146DD7EE9086DB6019FBAC13B4E |
SHA-256: | D4CFBB0E8B9D3E36ECE921B9B51BD37EF1D3195A9CFA1C4586AEA200EB3434A7 |
SHA-512: | 02B4D134F84122B6EE9A304D79745A003E71803C354FB01BAF986BD15E3BA57BA5EF167CC444ED67B9BA5964FF5922C50E2E92A8A09862059852ECD9CEF1A900 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\FontCache\4\PreviewFont\flat_officeFontsPreview_4_40.ttf
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 773040 |
Entropy (8bit): | 6.55939673749297 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4296A064B917926682E7EED650D4A745 |
SHA1: | 3953A6AA9100F652A6CA533C2E05895E52343718 |
SHA-256: | E04E41C74D6C78213BA1588BACEE64B42C0EDECE85224C474A714F39960D8083 |
SHA-512: | A25388DDCE58D9F06716C0F0BDF2AEFA7F68EBCA7171077533AF4A9BE99A08E3DCD8DFE1A278B7AA5DE65DA9F32501B4B0B0ECAB51F9AF0F12A3A8A75363FF2C |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bin
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 322260 |
Entropy (8bit): | 4.000299760592446 |
Encrypted: | false |
SSDEEP: | |
MD5: | CC90D669144261B198DEAD45AA266572 |
SHA1: | EF164048A8BC8BD3A015CF63E78BDAC720071305 |
SHA-256: | 89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899 |
SHA-512: | 16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bin
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 10 |
Entropy (8bit): | 2.321928094887362 |
Encrypted: | false |
SSDEEP: | |
MD5: | BF37BF1CD96CBC96B3CD26020ECAAC12 |
SHA1: | B6AE00B7B51E7585D67861CE03FFF8EBE042B3DE |
SHA-256: | E0D1278238D93499BF2BCD30672023B1A2F39C01515C572B817BAD03C1F57F64 |
SHA-512: | 1396FFB7BE1625420712606F8F26B3C75915285C1B328571BC718F3220453F33B5265EC23F46F42FF2ACFEED4379B953AB92C76751900FC78161964C30A6D72B |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\5710B3B5-1F67-422F-A65D-82411643EF22
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 180288 |
Entropy (8bit): | 5.291004143401601 |
Encrypted: | false |
SSDEEP: | |
MD5: | E33CB69A5DE6649126BB07D426559629 |
SHA1: | 240F7C446F3D2ED6385F854ADBF1A4816AE91730 |
SHA-256: | 310148404671476E21BBC98039000CAF3F92DDA519DEE8F1FE0FF758D5A25479 |
SHA-512: | FAD1FCF1F2AFDC84A4093FB6AD062C08E28B3D4817B927C88088F177D57ED32D9A792904728B05D9FC8B7CB9640E74D5D75874F76DA963FC11A69655B203AFC8 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 4616 |
Entropy (8bit): | 0.13640804182083316 |
Encrypted: | false |
SSDEEP: | |
MD5: | 86E6B47D0D2799C82B3D5CCE61443E25 |
SHA1: | 75940F7089296F6B556ED6AB3DD1242F15A88D38 |
SHA-256: | 821DD42C2DCBD90D6635138F328C899C2857FE9884930C477D8EC11A0AA83033 |
SHA-512: | 8D7607371C709F196E19B8E97D33A4C97FC4657D681B606CCD708ED4A8D47D9B408F95654B0B5DEC9D6F1D502EDBDAC9C91A1C2D17E98E82C8D3637AB4BC7590 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\96LGQ1XY\Microsoft_logo_(2012).svg[1].png
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 18274 |
Entropy (8bit): | 7.824973851637045 |
Encrypted: | false |
SSDEEP: | |
MD5: | DAF0E34199D200E2C7BA15BC8CE1BB4C |
SHA1: | CB50C8AF6422F9023C77EEF33F3E02B187D5C28A |
SHA-256: | 2EA031BFBAC97B6FAE94B02DB9A625BF38F83BA7D39FD1B6C233B4D240A3B578 |
SHA-512: | 80D73B5C8BF0725164C66F395858FF670BFEC48D09D18D1B149269663ECE1C980998BF8C6DDEBBB033019A316F3E40EC8A56F6E67A49A057E56C9C7AD553E0C1 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GO30WR0E\XZUd2ZXlxLzNlUGc1d0NKWkJBYWo5YmFEYSt0ZzM2R3djTm5iS1JYdS93YW5hN1p6ZGlkeVcyRGV0VnJadjNpbVl1V0JmTUcxREJuRHUvbUVCK1c1dGdtRnlZbEQ1S2thZi8rOUtRekcraVJwSXJOWS9zRHl1dz09LS1VNmdTRHNPTEh2YUYx[1].gif
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 43 |
Entropy (8bit): | 2.7374910194847146 |
Encrypted: | false |
SSDEEP: | |
MD5: | 07FFF40B5DD495ACA2AC4E1C3FBC60AA |
SHA1: | E8AC224BA9EE97E87670ED6F3A2F0128B7AF9FE4 |
SHA-256: | A065920DF8CC4016D67C3A464BE90099C9D28FFE7C9E6EE3A18F257EFC58CBD7 |
SHA-512: | 49B8DAF1F5BA868BC8C6B224C787A75025CA36513EF8633D1D8F34E48EE0B578F466FCC104A7BED553404DDC5F9FAFF3FEF5F894B31CD57F32245E550FAD656A |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 30 |
Entropy (8bit): | 1.2389205950315936 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5237846606AC2FEA44AFA0131C0B8111 |
SHA1: | 7AC10DB129621C5A9E98D748AE84D319EF97839C |
SHA-256: | 820DF1B6A7B1A32E9BA02C98BA33B19510624C5657E878EC2C755929C312D280 |
SHA-512: | A913B003383B202F278280722454D2C6E67E2150A5128D11F6F2385E776E730B628F5303151354DED0AB85063B9B67CB57439744CA6AA9E8CA48FD75A6215E68 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 18 |
Entropy (8bit): | 2.725480556997868 |
Encrypted: | false |
SSDEEP: | |
MD5: | A5E51FDFAF429614FB5218AB559D299A |
SHA1: | 262EC76760BB9A83BCFF955C985E70820DF567AE |
SHA-256: | 3E82E9F60CE38815C28B0E5323268BDA212A84C3A9C7ACCC731360F998DF0240 |
SHA-512: | 9B68F1C04BDE0024CECFC05A37932368CE2F09BD96C72AB0442E16C8CF5456ED9BB995901095AC1BBDF645255014A5E43AADEE475564F01CA6BE3889C96C29C9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.988946852519709 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8C87DB8A678942D54289E199C942F321 |
SHA1: | 43B5465CE9FCD110C87F431CE7C753EA0B9E88B8 |
SHA-256: | 5095B69BDA1032DB969CC03A1F3459EDCE6D3AA3CAFB27BF8672E56DE2167DF2 |
SHA-512: | 34A9D790BC297A37F13B67EEB1EDC28660DD8B2E865D97150DA9C5E1F248A5D9FBC27800F767400AFB030995B653D72310B0C173C8557F64F9FA25177E269FE5 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.004692993896903 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7CD6662A17B8832ACD3A36BA31A2EF16 |
SHA1: | 4DE65B3E61410E4E87F7A1B86830D0AE490EAA90 |
SHA-256: | C851FAC15742D60C1DFD1E9252011F94EC7F3B3FA7841A7B7E12A0A80985709A |
SHA-512: | 1B4CF77FC3806B62AF8EE939AB4DA656CA9EDE40331157D26AFCF36BBAC2D3F1338F8F4614EC7FBBF8FA9140D9B735CB444B0C04C72810766DE4FF116F68E43E |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2693 |
Entropy (8bit): | 4.015688416431899 |
Encrypted: | false |
SSDEEP: | |
MD5: | 23BB35A1AD6263623263340DC34D425C |
SHA1: | EA6063062A7C50A6858E7835B2011F660E16135B |
SHA-256: | EF38939ADF5A4F75DE5EF1BBFD69738F8A3ED40D2D59C72A83157AAF5CA4DC9C |
SHA-512: | 94C2122E774A4A698D729D29DB1CD5B5A30362BBEB91AC5310542150C915BDD4DBD62C1D5075C2F9E7370530B25E3548217372199017AEF981BDA0FF84D6ADED |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 4.005495238478 |
Encrypted: | false |
SSDEEP: | |
MD5: | DDE2EDEEE55C7A2F3B962FF6CA2237DD |
SHA1: | B11E1F59FF343FCDFE675ECC903F290FDB69228A |
SHA-256: | 163C8106AB1A245AC33EC4C00489C0D3AEB76B90335414AAF5C4D4DA48B5305C |
SHA-512: | 1CD69308AA8DBECCF0E5323B194F27D731AFC1E3F06E5A486AFAD4E5D991477E2C5336FFA888A2BB3FA73311AE71C85832240C4D4347FAC7B1D177C2307CE2FD |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2681 |
Entropy (8bit): | 3.9913371098611985 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2A13E3EBC3842D17C51254B5F1F8006A |
SHA1: | A232A92119D9D9F18F6C7BE7FB919B43D3C84B30 |
SHA-256: | 1CDFA9D8B765170CA85B6B5DC295E155823F2E16AF945B04CCB2B05490ABB475 |
SHA-512: | 023CFB2EE2D4351C881D2A674DBAE0A6053285CF6A043152F68C97F7149E965B9F40DFB0C8FBA9394859C2DF1FC5E198E8BEB46C27D98013DA33F44B542113DD |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2683 |
Entropy (8bit): | 4.001235136060414 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5DE8F8904EEBFD65E953BF27DBADF055 |
SHA1: | B82B13D8E6E9A73DE67671358B250320A9798166 |
SHA-256: | D200467496C0D3688AA30BFCEC641B03E28AF61C9D1D019414247609CE0F8B9B |
SHA-512: | 0C9E87267365A3C9140297DA5BE45AF9A7082C2171AD1ACC83702ADA59D527B5DEC63C0E0FC45FE4BFF73D8E314DD89B4985F04E6E33DFEA4716A0D8C619A981 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 461 |
Entropy (8bit): | 5.855526239618312 |
Encrypted: | false |
SSDEEP: | |
MD5: | 63CFBF5C2BE9A094EB65F01267B10952 |
SHA1: | 283F50122AB8CC6DF3EC01339FB4A7014F296E20 |
SHA-256: | 9F822A2C00679AEA6C6A7DA41548C8C785476598EC212D5F9148D010915FD51F |
SHA-512: | AC082F8DB586DB35349596984B40F50496EE49D54E165AD019247140D4E20358A547135FD0CEBC025446AD0F80413739F005C2FEACCE0429C4B47AC111EAD9FE |
Malicious: | false |
Reputation: | unknown |
URL: | https://guru.phishing.guru/XSUYzMVYwc2t4bjNlQ1R3WDRvTE94bVpNdWdwK3A3dC95eUt0K2xuYit2SmxwQVpTZVFKVlNhOFVVbHMzMWVkNXNXTGc2eDc1OUlhY3dndkYzVG9Fem5ZNzJKamkwQVFBT1pqK1JDYmd5MW55NXRXS1Y0WFNrSkgxRGR0RDJtSDBqTDJQUFg1YkFzdEhtblU0VzgxelErT28zeFlBK1NBQlU5aGw2WGxtdE5oNGlzT09laC9BcmkrV3VRPT0tLWJuNkYzYnZSNXF6dnlzTnUtLWtzbFZOV09uR3ZENlU0blNRaEVBY3c9PQ==?cid=2279533539 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 114165 |
Entropy (8bit): | 6.022852019067385 |
Encrypted: | false |
SSDEEP: | |
MD5: | 310989861B779448774B1FC3330362AF |
SHA1: | 1F768A85EC485E31C893C659E7A95B54DD009E94 |
SHA-256: | 9C450EC04157C7CFCDCF563E3D2D6E10C0F779DC3A1B367A3415E4B4EE27E30E |
SHA-512: | 9C6BEED9226E1811548B9C5FA2DBFCA8DD409996AB2A09CF0B726DEE5CFFB6B4B91867BABCC6DBBE274E2579548863B296F59C73140DD892DE55023422A2DCA1 |
Malicious: | false |
Reputation: | unknown |
URL: | https://secured-login.net/pages/6ed3313ca504/XSUYzMVYwc2t4bjNlQ1R3WDRvTE94bVpNdWdwK3A3dC95eUt0K2xuYit2SmxwQVpTZVFKVlNhOFVVbHMzMWVkNXNXTGc2eDc1OUlhY3dndkYzVG9Fem5ZNzJKamkwQVFBT1pqK1JDYmd5MW55NXRXS1Y0WFNrSkgxRGR0RDJtSDBqTDJQUFg1YkFzdEhtblU0VzgxelErT28zeFlBK1NBQlU5aGw2WGxtdE5oNGlzT09laC9BcmkrV3VRPT0tLWJuNkYzYnZSNXF6dnlzTnUtLWtzbFZOV09uR3ZENlU0blNRaEVBY3c9PQ== |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3168 |
Entropy (8bit): | 7.704911325185365 |
Encrypted: | false |
SSDEEP: | |
MD5: | A907E6E737788176B026FA71DFE8AFFE |
SHA1: | 6844236F638CEDCD652EB0A805476A1A13376CF5 |
SHA-256: | FC5E7621BA0E98C5C6728E3B2BDF802311C0A0953A05E60A7551CB0C7BED00A9 |
SHA-512: | 3A17E66931A15B5C6553DAE241C5A7BB40240699F0608F92ED940CB203CBEA3031CB0FAC23F9C962F50D573F56DB27A3369F1A38ED1AEA0168D7E707803CA27A |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 5934 |
Entropy (8bit): | 4.931906350831601 |
Encrypted: | false |
SSDEEP: | |
MD5: | 134D934420B13974981A9634B7380865 |
SHA1: | 18C01D3711CF8C21C1CD0CF544002358C1C929C6 |
SHA-256: | B3C447F15FCE33DFA869B9D2190364509EDE3937AE05B51BA394A78E28C244BA |
SHA-512: | 7FAE93AD1895DCF7CC58FC2C477BA51D3EB7D7B2884FE117E21C0A7E0160981EB53D23A6ACDA07DA594AF6984F52E1B57B6F157F84220729C7EEBF9AE062C092 |
Malicious: | false |
Reputation: | unknown |
URL: | https://secured-login.net/assets/sei-styles-1837e0b6e1baaf1af90438028a176241b70a365a8a09ff4bf668cf3bf9e3c759.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 18668 |
Entropy (8bit): | 7.988119248989337 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8655D20BBCC8CDBFAB17B6BE6CF55DF3 |
SHA1: | 90EDBFA9A7DABB185487B4774076F82EB6412270 |
SHA-256: | E7AF9D60D875EB1C1B1037BBBFDEC41FCB096D0EBCF98A48717AD8B07906CED6 |
SHA-512: | 47308DE25BD7E4CA27F59A2AE681BA64393FE4070E730C1F00C4053BAC956A9B4F7C0763C04145BC50A5F91C12A0BF80BDD4B03EECC2036CD56B2DB31494CBAF |
Malicious: | false |
Reputation: | unknown |
URL: | https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4gaVI.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1666 |
Entropy (8bit): | 7.843362903299294 |
Encrypted: | false |
SSDEEP: | |
MD5: | 29D583007FCD677AA31CA849478BC17A |
SHA1: | F354E323218A450060852C344927C3E79D8E7B66 |
SHA-256: | 120EE096F38C1E21083054C15F0F8CFBB02B6740A01D98068E3BE9581E83D453 |
SHA-512: | 4AFC2641D96D1C372D091FD795D39C1AF12149B5EB30DA7BEE6FBFEA0650841067B7D259473BF65706CDD42D1EDF1CC5673B5F5556D1E91F8AE32976490A7E4D |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 11116 |
Entropy (8bit): | 7.977966003020195 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7E05F5267BBA1AA9FB260096F923BDB7 |
SHA1: | 44E5FE17DC41EB94BB2FE85D77C0904AC766325D |
SHA-256: | 21E75944D3F77408D1F5F2FAB67C89C7FC43F4A80A3B8E4DCF38185F9D9F46E6 |
SHA-512: | E3442FC98D171DFE08614751267C2023BF6DE2A2E42BE7B7CB54E15DDBE028534D193D93B086A75549432B2818B0EC1824D2BDBB848B00A9329F22C5DDDE619F |
Malicious: | false |
Reputation: | unknown |
URL: | https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4kaVIGxA.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 380848 |
Entropy (8bit): | 5.202109831427653 |
Encrypted: | false |
SSDEEP: | |
MD5: | 67A0C4DBD69561F3226243034423F1ED |
SHA1: | 88C1B5C7EBBFA24D8196290206BF544F28EEB406 |
SHA-256: | 74B9F1CFE7CAD31AE1C1901200890B76676E6D92AC817641F5EF9BFD552F2110 |
SHA-512: | D5326C46E2FC443AA0C75DB573B39957514BD025235ADB5F16797133394E1AFD0A6458B38DA8220BF7558333E8F2334532FBCC4CD9DD4DD5811AAC403B498542 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1471 |
Entropy (8bit): | 4.754611179426391 |
Encrypted: | false |
SSDEEP: | |
MD5: | 15E89F9684B18EC43EE51F8D62A787C3 |
SHA1: | 9CBAAACEAE96845ECD3497F41EE3B02588ABEC11 |
SHA-256: | 16F13E16A7EF02FB6F94250AA1931DED83DBEE5D9FAD278E33DD5792D085194F |
SHA-512: | 79E0110A045F28437D192290AC9789270CB0D4E676A985564746DB439992D867BA89639D7738E2A7F7D83BBF37D9A02CAA2AE1DC4E0EE2519797E5840A47FABE |
Malicious: | false |
Reputation: | unknown |
URL: | https://secured-login.net/assets/landing-watermark-8487e36eef1bec74f06631f19fea0aa171c208e2976373cda5bd0a4b9e230903.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3014 |
Entropy (8bit): | 7.902919939139106 |
Encrypted: | false |
SSDEEP: | |
MD5: | E154B58FD2CD3F1F2E2C6C810BB1E65B |
SHA1: | CAEF301E8550A910909ECE9471669DA0C32EA6F0 |
SHA-256: | E8C5A2C9860C1A6CC7C949B9D7C793E5E435D75996DEBEB295A959F3D09831C0 |
SHA-512: | 464EC940E824EAB8B7F83EB40852DD3019E84BE7B1A0F75AF288656605426B2EE386FA7FF102E0144AA065F053E88E8356E7C185B4DC393CC4D8EB0ADC877312 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4524 |
Entropy (8bit): | 5.108931295370594 |
Encrypted: | false |
SSDEEP: | |
MD5: | DD05B711E15EF201B07E20CB5C87F5D8 |
SHA1: | 41B818B243140D90DA4CA917D454335B603A6BDA |
SHA-256: | 617F793D125F780AB7BB7C9E92AB427D9E757083E7368E241E8E8FA69F013E4F |
SHA-512: | 243C149BB8AAF5376EEBAC49833A59F75BA26BEC098AFD8A167D12BDACD3E80D98EE1DA1D82915CC7E4C7FAC747FBFF5D2D687D97F20BDF5C81D67CFA0620F39 |
Malicious: | false |
Reputation: | unknown |
URL: | https://s3.amazonaws.com/helpimg/landing_pages/css/dd.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 2368 |
Entropy (8bit): | 7.857782123483033 |
Encrypted: | false |
SSDEEP: | |
MD5: | 402214A564EAB22101571DF8C6E30B79 |
SHA1: | D5E452981A5C325383F92BFB964BA28ECEA6FFA6 |
SHA-256: | 8D63A7ED00572C8B418FF91F5B2E5CD667AA7226CE280E48FC8FE9D58A4D98AC |
SHA-512: | D7FD2C24B182ACEA57713FB9EFD19371802B1AE748F7B01FA82D822A86F70267D94C5105FB6BD1967BCDBC1FC43DE484F2B647DFD1EC729531BD4E89814CA42C |
Malicious: | false |
Reputation: | unknown |
URL: | https://cdn2.hubspot.net/hubfs/241394/html_file/files/img/KB4-logo.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 9344 |
Entropy (8bit): | 7.975595436620788 |
Encrypted: | false |
SSDEEP: | |
MD5: | CBCA61F27F93FD71171FE8D314C66AB9 |
SHA1: | C46A51672FFFF100945F84C3EB87826B7844A1E2 |
SHA-256: | F9A9A7A4B9D40BCC3047928DFA60695D53E6AE1D6EE699EA70146E171322ACAD |
SHA-512: | 7F9E8520DFB64197CE233AF7671A5A5643AE116478C6E2F5F67FBD8A092117126ADF1E2EDDA13FF1C19D68AEA3D04288310A2109D7C81183330F2B8DAD0785D4 |
Malicious: | false |
Reputation: | unknown |
URL: | https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4jaVIGxA.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 9 |
Entropy (8bit): | 2.725480556997868 |
Encrypted: | false |
SSDEEP: | |
MD5: | D8F4A1993546CC4B850CDE3599E27AEC |
SHA1: | 094B763B4CFCC0B05E5D040581CD513C3CA08067 |
SHA-256: | 907BA78B4545338D3539683E63ECB51CF51C10ADC9DABD86E92BD52339F298B9 |
SHA-512: | 7C696247F98AA6FE4E1DF001FD6029ABBBCCF45B122D65DFDEDE8F8A400CDA775387C657F96BD1E4E52DA7409187892B1F0786C54D835D2E44227B2E1335EAF6 |
Malicious: | false |
Reputation: | unknown |
URL: | https://secured-login.net/assets/landing-watermark-16f13e16a7ef02fb6f94250aa1931ded83dbee5d9fad278e33dd5792d085194f.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 6193 |
Entropy (8bit): | 5.401714743814202 |
Encrypted: | false |
SSDEEP: | |
MD5: | F2D1D2937C3546E15C471236646AC74E |
SHA1: | DD8D90F6D4AC8D72C718C10424788612689D89DB |
SHA-256: | 719D2FC548145FA8D8361205F6FCB49EEFC54C71FBB18E6320A60A263F40637A |
SHA-512: | 7B400281407249F805AB4695E0B7D3CDF4F7F5F776F9F7E60872D5208B7324DADDDAD79D76AC9991C74563520FB6BFF3A6343C8C10591C9EB5682733592668A4 |
Malicious: | false |
Reputation: | unknown |
URL: | https://fonts.googleapis.com/css2?family=Open+Sans&display=swap |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 17576 |
Entropy (8bit): | 7.986135354736866 |
Encrypted: | false |
SSDEEP: | |
MD5: | EFB3F28447C9EF35FD5882FB763B37C3 |
SHA1: | 158DDD8C0348DEFA3192F26DA60A746727F4A8A3 |
SHA-256: | 6D4370B59E36AC955C8B97F12FD5E86F7D3E80285D6AF2BFF0DAFA8E122D3C3B |
SHA-512: | C0521D7C7BE4F635F70F0F466BC7A179C647C43C5AB400C8E490466BDDDE7175809B594C3D7B1A2F2AE9841CDE2F9AABFB8A967618FFB2CC7456A9B3231E0CDD |
Malicious: | false |
Reputation: | unknown |
URL: | https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B5caVIGxA.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 7728 |
Entropy (8bit): | 7.973684421983582 |
Encrypted: | false |
SSDEEP: | |
MD5: | 80210D1FF4DE56C6704607F3831E8F6C |
SHA1: | 32FB4E1E177D5DE97AAD6E0D57100755D8DD2CFD |
SHA-256: | F515A6F8BAE422286936B110653FB8EE0F58FE32D61390EE5DE77029BE23EFD6 |
SHA-512: | E24520E29F2073F03A0FF1E72EB632CCFB6FC1451BCB0735671EAE03CAFFB1CA6731050318F43544CC99AC7127015664464A0DEF587058535F9F7F743F166713 |
Malicious: | false |
Reputation: | unknown |
URL: | https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4iaVIGxA.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 121200 |
Entropy (8bit): | 5.0982146191887106 |
Encrypted: | false |
SSDEEP: | |
MD5: | EC3BB52A00E176A7181D454DFFAEA219 |
SHA1: | 6527D8BF3E1E9368BAB8C7B60F56BC01FA3AFD68 |
SHA-256: | F75E846CC83BD11432F4B1E21A45F31BC85283D11D372F7B19ACCD1BF6A2635C |
SHA-512: | E8C5DAF01EAE68ED7C1E277A6E544C7AD108A0FA877FB531D6D9F2210769B7DA88E4E002C7B0BE3B72154EBF7CBF01A795C8342CE2DAD368BD6351E956195F8B |
Malicious: | false |
Reputation: | unknown |
URL: | https://cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/3.3.7/css/bootstrap.min.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 8572 |
Entropy (8bit): | 7.968224802101464 |
Encrypted: | false |
SSDEEP: | |
MD5: | 776FDC253D54124DD63F274BF5EA35F0 |
SHA1: | 7761DAC9A7FBB2814989092003506BA594C6EE45 |
SHA-256: | 0B81CC8358F236821ADA286C94726C7FEBC9CAD8BD4F59FB39C515956B644E99 |
SHA-512: | 4689A0D6723243E796D5DC1B031F5E1E8CE1D038921F1CC612169F179147DFC1B74CCA87CD7E2C8BEB38D9A8ED99F42FF369BDCB2FA9EA80B1BC00CC36CAEB10 |
Malicious: | false |
Reputation: | unknown |
URL: | https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4vaVIGxA.woff2 |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 15368 |
Entropy (8bit): | 7.986184968554377 |
Encrypted: | false |
SSDEEP: | |
MD5: | BE7B70AB1265B1047BD93422397C655E |
SHA1: | E10BBC7D8529AE3E64D8B08C9F7CD55C98F83D60 |
SHA-256: | B452C0F212E8BF33965905032F5BA1FAE29CD6F9539DCBC673704E66CE943B2B |
SHA-512: | A9A913559EFE29685B7C12456326C3F8C7053D639B849261108A69348EEA02C617BA923561C1CDBE36082B2CEC1C0ADCC22511389791DB328ABC99A57F011F5A |
Malicious: | false |
Reputation: | unknown |
URL: | https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4uaVIGxA.woff2 |
Preview: |
File type: | |
Entropy (8bit): | 3.9916124672033546 |
TrID: |
|
File name: | FW Important Security Policy Update.msg |
File size: | 112'128 bytes |
MD5: | 8c67225141833c42886cfddd3e8de4fd |
SHA1: | 2b26f82f7aeabcd3ea6dd807b0bceabb7d75bb64 |
SHA256: | 9bce3500938ba5e5cfd908127fac74ff84f33e80701e4e9284212ce50b55c398 |
SHA512: | 7542189f18e2756e8eab36146aedc32e30aa6656a534713b9f21c4ea28068adeb6a7a5e603f7c57d3ea17fc946cb255518fa9fbfe6aecea791d14f642894cc33 |
SSDEEP: | 1536:gTIxpsWETo4X3WqqFlYe36ZdMIXRW0MWjohzBz6Nuq7gGyTvWykcK5WT+5R1U:UWqqnYe3y3VohzBzguq7g4c9W1U |
TLSH: | 6EB3DF113AFA1119F2779F354BF29097893ABD92AD25DA5F2181330E0672A41DC72F3B |
File Content Preview: | ........................>..................................."...................r.............................................................................................................................................................................. |
Subject: | FW: Important Security Policy Update |
From: | Tammy Busch <tbusch@rdusd.org> |
To: | Gabriel Espinoza <gespinoza@mydatapath.com> |
Cc: | |
BCC: | |
Date: | Thu, 14 Nov 2024 01:21:17 +0100 |
Communications: |
|
Attachments: |
Key | Value |
---|---|
Received | from PH8PR10MB6525.namprd10.prod.outlook.com |
00 | 21:17 +0000 |
ARC-Seal | i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; |
ARC-Message-Signature | i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; |
h=From | Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; |
ARC-Authentication-Results | i=1; mx.microsoft.com 1; spf=pass |
by LV8PR13MB6894.namprd13.prod.outlook.com (2603 | 10b6:408:263::22) with |
2024 00 | 21:18 +0000 |
(2603 | 10b6:303:16d::32) with Microsoft SMTP Server (version=TLS1_2, |
Transport; Thu, 14 Nov 2024 00 | 21:27 +0000 |
Authentication-Results | spf=softfail (sender IP is 205.139.110.120) |
Received-SPF | SoftFail (protection.outlook.com: domain of transitioning |
via Frontend Transport; Thu, 14 Nov 2024 00 | 21:26 +0000 |
h=from | from:reply-to:subject:subject:date:date:message-id:message-id: |
to | to:cc:mime-version:mime-version:content-type:content-type: |
in-reply-to | in-reply-to:references:references:dkim-signature; |
arc=pass ("microsoft.com | s=arcselector10001:i=1"); |
spf=pass (relay.mimecast.com | domain of tbusch@rdusd.org designates 40.107.94.100 as permitted sender) smtp.mailfrom=tbusch@rdusd.org |
Authentication-Results-Original | relay.mimecast.com; dkim=pass |
("microsoft.com | s=arcselector10001:i=1"); dmarc=pass (policy=quarantine) |
header.from=rdusd.org; spf=pass (relay.mimecast.com | domain of |
13 Nov 2024 19 | 21:21 -0500 |
X-MC-Unique | BXT5P4RUNOKrO50zzJ71uQ-1 |
X-Mimecast-MFC-AGG-ID | BXT5P4RUNOKrO50zzJ71uQ |
DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=rdusd.org; |
by CO1PR10MB4609.namprd10.prod.outlook.com (2603 | 10b6:303:91::6) with |
([fe80 | :5588:f940:6786:e568%4]) with mapi id 15.20.8137.027; Thu, 14 Nov 2024 |
From | Tammy Busch <tbusch@rdusd.org> |
To | Gabriel Espinoza <gespinoza@mydatapath.com> |
Subject | FW: Important Security Policy Update |
Thread-Topic | Important Security Policy Update |
Thread-Index | AQHbNiJHqv+InXpFsEC9yGTp2wdBfbK16clQ |
Date | Thu, 14 Nov 2024 00:21:17 +0000 |
Message-ID | <PH8PR10MB6525B08ADEE5C5F4AB977499C15B2@PH8PR10MB6525.namprd10.prod.outlook.com> |
References | <673533a419e98_924a4425625@169.254.70.14.mail> |
In-Reply-To | <673533a419e98_924a4425625@169.254.70.14.mail> |
Accept-Language | en-US |
X-MS-Has-Attach | X-MS-TNEF-Correlator: |
x-ms-traffictypediagnostic | PH8PR10MB6525:EE_|CO1PR10MB4609:EE_|SJ1PEPF000023D6:EE_|LV8PR13MB6894:EE_|BYAPR13MB2712:EE_ |
X-MS-Office365-Filtering-Correlation-Id | d022c6b0-ea50-42f2-46e8-08dd04424762 |
x-ld-processed | 800138de-5eb1-4eab-8a2c-509477600567,ExtAddr |
x-ms-exchange-senderadcheck | 1 |
x-ms-exchange-antispam-relay | 0 |
X-Microsoft-Antispam-Untrusted | BCL:0;ARA:13230040|366016|69100299015|376014|1800799024|5042699012|8096899003|38070700018 |
X-Microsoft-Antispam-Message-Info-Original | =?us-ascii?Q?ngKzPFTvjclE/qceBIBioeX6QQ9PttAOeE+oGdi8VRgD6hLvijRhAAeyGvcV?= |
X-Forefront-Antispam-Report-Untrusted | CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH8PR10MB6525.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(69100299015)(376014)(1800799024)(5042699012)(8096899003)(38070700018);DIR:OUT;SFP:1102 |
MIME-Version | 1.0 |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | LV8PR13MB6894 |
X-Mimecast-Spam-Score | 0 |
X-Mimecast-MFC-PROC-ID | cjtC3AJzpM00G-n_B676gyt9WuZEDaClYWNAH_aaIzc_1731543679 |
X-Mimecast-Impersonation-Protect | Policy=Default Impersonation Protect Definition;Similar Internal Domain=false;Similar Monitored External Domain=false;Custom External Domain=false;Mimecast External Domain=false;Newly Observed Domain=false;Internal User Name=false;Custom Display Name List=false;Reply-to Address Mismatch=false;Targeted Threat Dictionary=true;Mimecast Threat Dictionary=true;Custom Threat Dictionary=false |
Content-Language | en-US |
Content-Type | multipart/alternative; |
Return-Path | tbusch@rdusd.org |
X-MS-Exchange-Organization-ExpirationStartTime | 14 Nov 2024 00:21:26.8454 |
X-MS-Exchange-Organization-ExpirationStartTimeReason | OriginalSubmit |
X-MS-Exchange-Organization-ExpirationInterval | 1:00:00:00.0000000 |
X-MS-Exchange-Organization-ExpirationIntervalReason | OriginalSubmit |
X-MS-Exchange-Organization-Network-Message-Id | d022c6b0-ea50-42f2-46e8-08dd04424762 |
X-EOPAttributedMessage | 0 |
X-EOPTenantAttributedMessage | 9ef5d077-23c6-453f-94f9-7809c35a837f:0 |
X-MS-Exchange-Organization-MessageDirectionality | Incoming |
X-MS-Exchange-Transport-CrossTenantHeadersStripped | SJ1PEPF000023D6.namprd21.prod.outlook.com |
X-MS-PublicTrafficType | |
X-MS-Exchange-Organization-AuthSource | SJ1PEPF000023D6.namprd21.prod.outlook.com |
X-MS-Exchange-Organization-AuthAs | Anonymous |
X-MS-Office365-Filtering-Correlation-Id-Prvs | d043ef12-9da3-46e6-0d91-08dd04424217 |
X-MS-Exchange-AtpMessageProperties | SA|SL |
X-MS-Exchange-Organization-SCL | -1 |
X-Microsoft-Antispam | BCL:0;ARA:13230040|240411011799012|69100299015|82310400026|35042699022|4076899003|8096899003; |
X-Forefront-Antispam-Report | CIP:205.139.110.120;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:CAL;SFV:SKN;H:us-smtp-inbound-delivery-1.mimecast.com;PTR:us-smtp-delivery-1.mimecast.com;CAT:NONE;SFS:(13230040)(240411011799012)(69100299015)(82310400026)(35042699022)(4076899003)(8096899003);DIR:INB; |
X-MS-Exchange-CrossTenant-OriginalArrivalTime | 14 Nov 2024 00:21:26.3610 |
X-MS-Exchange-CrossTenant-Network-Message-Id | d022c6b0-ea50-42f2-46e8-08dd04424762 |
X-MS-Exchange-CrossTenant-Id | 9ef5d077-23c6-453f-94f9-7809c35a837f |
X-MS-Exchange-CrossTenant-AuthSource | SJ1PEPF000023D6.namprd21.prod.outlook.com |
X-MS-Exchange-CrossTenant-AuthAs | Anonymous |
X-MS-Exchange-CrossTenant-FromEntityHeader | Internet |
X-MS-Exchange-Transport-EndToEndLatency | 00:00:09.7983707 |
X-MS-Exchange-Processed-By-BccFoldering | 15.20.8158.013 |
X-Microsoft-Antispam-Mailbox-Delivery | ucf:1;jmr:0;auth:0;dest:C;OFR:CustomRules;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003); |
X-Microsoft-Antispam-Message-Info | =?us-ascii?Q?0xwTkfgnAVCVOvndDK58oNM4dVm57CeUGJ4F2LwlchejwlPrg8UjGa73xLlS?= |
date | Thu, 14 Nov 2024 01:21:17 +0100 |
Icon Hash: | c4e1928eacb280a2 |