Windows Analysis Report
Account Activation.eml

Overview

General Information

Sample name: Account Activation.eml
Analysis ID: 1558883
MD5: 48eb42d6b690cbb9ee08714c463ebcff
SHA1: 14c06498a5061048374c003e71a5037b3a81ad67
SHA256: 6d6777575a1c13bd46f53fe34f07d376c0bad2b4b951e05f3525eb0410750931
Infos:

Detection

Score: 4
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

Detected hidden input values containing email addresses (often used in phishing pages)
Detected suspicious crossdomain redirect
HTML body contains low number of good links
HTML page contains hidden javascript code
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Stores files to the Windows start menu directory

Classification

Source: https://account.docusign.com/v2/usertoaccountinvite/tokenhandler HTTP Parser: {"settings":{"traceToken":"f66dce53-0040-466b-894a-a3950312700c","siteRoot":"https://account.docusign.com/","forgotPasswordUri":"https://account.docusign.com/forgotpassword","flowSubmissionUris":{"oAuth":"/oauth/auth","sso":"/saml2/login/sp","username":"/username","password":"/password","web":"/web/login","signUp":"/signup","securityKeyLogin":"/securitykeylogin","resourceCredentialSecurityKeyCreation":"/resources/v1/manage/security-key/create","resourceCredentialSecurityKeyLogin":"/resources/v1/manage/security-key/login"},"allowGetBrowserFingerprint":true,"allowNewI18Library":true,"renderInkLoginApp":true,"assetPreloaderUrl":null,"pseudoLouserzationEnabled":false,"rebrandingEnabled":true},"stateData":{"state":"invite","oAuthLoginHintQS":null,"oAuthLoginHintCookie":null,"usernamePostAction":null,"logoBytes":null,"data":{"state":"activate_user","login_uri":null,"submission_uri":"/v2/usertoaccountinvite/activateuser","data":{"email":"jminot@santaclaraca.gov","account_name":"City of Santa Clara","username":"Julie Minot","password":null,"access_code":null,"question_answer_pairs":null,"is_federated_user":false,"compliance_jurisdiction_country_code":null,"user_invite_id":"fdb77111-bcb1-4de7-9cf7-12ceb00583af","accept_invitation":null,"access_code_remaining_attempts":null,"error":null,"phone_country_code":null,"phone_number":null,"sms_verification_is_locked_out":null,"sms_code":null},"password_requirements":null,"forgot_password_questions":null,"activation_view_template":"DefaultActivationPage","locale":null,"usePrivacyAndTermsLinkFromIntlLibrary":true}},"error":null}
Source: https://account.docusign.com/v2/usertoaccountinvite/tokenhandler HTTP Parser: {"settings":{"traceToken":"a0a1bebe-48a2-4d20-8fc3-ce89c38a57ce","siteRoot":"https://account.docusign.com/","forgotPasswordUri":"https://account.docusign.com/forgotpassword","flowSubmissionUris":{"oAuth":"/oauth/auth","sso":"/saml2/login/sp","username":"/username","password":"/password","web":"/web/login","signUp":"/signup","securityKeyLogin":"/securitykeylogin","resourceCredentialSecurityKeyCreation":"/resources/v1/manage/security-key/create","resourceCredentialSecurityKeyLogin":"/resources/v1/manage/security-key/login"},"allowGetBrowserFingerprint":true,"allowNewI18Library":true,"renderInkLoginApp":true,"assetPreloaderUrl":null,"pseudoLouserzationEnabled":false,"rebrandingEnabled":true},"stateData":{"state":"invite","oAuthLoginHintQS":null,"oAuthLoginHintCookie":null,"usernamePostAction":null,"logoBytes":null,"data":{"state":"activate_user","login_uri":null,"submission_uri":"/v2/usertoaccountinvite/activateuser","data":{"email":"jminot@santaclaraca.gov","account_name":"City of Santa Clara","username":"Julie Minot","password":null,"access_code":null,"question_answer_pairs":null,"is_federated_user":false,"compliance_jurisdiction_country_code":null,"user_invite_id":"fdb77111-bcb1-4de7-9cf7-12ceb00583af","accept_invitation":null,"access_code_remaining_attempts":null,"error":null,"phone_country_code":null,"phone_number":null,"sms_verification_is_locked_out":null,"sms_code":null},"password_requirements":null,"forgot_password_questions":null,"activation_view_template":"DefaultActivationPage","locale":null,"usePrivacyAndTermsLinkFromIntlLibrary":true}},"error":null}
Source: https://account.docusign.com/v2/usertoaccountinvite/tokenhandler HTTP Parser: Number of links: 0
Source: https://account.docusign.com/v2/usertoaccountinvite/tokenhandler HTTP Parser: Base64 decoded: {"version":3,"sources":["C:\\D:\\W\\Account\\src\\Account.Web\\ReactApp\\src\\styles\\app.scss"],"names":[],"mappings":"AAAA,gBACI,WAAA,CAGJ,oCAGI,cAAA,CAGJ,8BACI,qBAAA,CAGJ,YACI,gBAAA,CAGJ,gCAEI,eAAA,CAGJ,UACI,WAAA,CACA,mBAAA,CAGJ,YACI,kBAAA,CAGJ,8BAEI,c...
Source: https://account.docusign.com/v2/usertoaccountinvite/tokenhandler HTTP Parser: No <meta name="author".. found
Source: https://account.docusign.com/v2/usertoaccountinvite/tokenhandler HTTP Parser: No <meta name="author".. found
Source: https://account.docusign.com/v2/usertoaccountinvite/tokenhandler HTTP Parser: No <meta name="copyright".. found
Source: https://account.docusign.com/v2/usertoaccountinvite/tokenhandler HTTP Parser: No <meta name="copyright".. found
Source: unknown HTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49709 version: TLS 1.2
Source: unknown HTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 40.126.31.69:443 -> 192.168.2.16:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 40.126.31.69:443 -> 192.168.2.16:49713 version: TLS 1.2
Source: unknown HTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49716 version: TLS 1.2
Source: unknown HTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49717 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exe HTTP traffic: Redirect from: gcc02.safelinks.protection.outlook.com to https://na.account.docusign.com/managed_token/v1/redeem?mtid=1afd3250-63ab-4ef4-bd0c-9b9f82e9d0a1&mtsec=g0zdjudsmcdg5himjqr_crgws2pwh7xfcz8mptgg7bu
Source: C:\Program Files\Google\Chrome\Application\chrome.exe HTTP traffic: Redirect from: gcc02.safelinks.protection.outlook.com to https://na.account.docusign.com/managed_token/v1/redeem?mtid=1afd3250-63ab-4ef4-bd0c-9b9f82e9d0a1&mtsec=g0zdjudsmcdg5himjqr_crgws2pwh7xfcz8mptgg7bu
Source: Joe Sandbox View IP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox View IP Address: 104.47.64.28 104.47.64.28
Source: Joe Sandbox View JA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknown TCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.31.69
Source: global traffic HTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global traffic HTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=+3tn694lw7ARtCC&MD=GM4kVTc9 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global traffic HTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=+3tn694lw7ARtCC&MD=GM4kVTc9 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global traffic HTTP traffic detected: GET /?url=https%3A%2F%2Fna.account.docusign.com%2Fmanaged_token%2Fv1%2Fredeem%3Fmtid%3D1afd3250-63ab-4ef4-bd0c-9b9f82e9d0a1%26mtsec%3Dg0ZdjUDSmcDg5hiMJqr_CrgwS2PWh7xFCz8MPTgg7bU&data=05%7C02%7Cjminot%40santaclaraca.gov%7C293c1debb86346386e5108dd083f4fec%7C28ea354810694e81aa0b6e4b3271a5cb%7C0%7C0%7C638675791173233740%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=zh70XBLyl1Yk%2FobcOIaGGrzaz5on5sHW8pIVGI2mtKI%3D&reserved=0 HTTP/1.1Host: gcc02.safelinks.protection.outlook.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /?url=https%3A%2F%2Fna.account.docusign.com%2Fmanaged_token%2Fv1%2Fredeem%3Fmtid%3D1afd3250-63ab-4ef4-bd0c-9b9f82e9d0a1%26mtsec%3Dg0ZdjUDSmcDg5hiMJqr_CrgwS2PWh7xFCz8MPTgg7bU&data=05%7C02%7Cjminot%40santaclaraca.gov%7C293c1debb86346386e5108dd083f4fec%7C28ea354810694e81aa0b6e4b3271a5cb%7C0%7C0%7C638675791173233740%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=zh70XBLyl1Yk%2FobcOIaGGrzaz5on5sHW8pIVGI2mtKI%3D&reserved=0 HTTP/1.1Host: gcc02.safelinks.protection.outlook.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic DNS traffic detected: DNS query: gcc02.safelinks.protection.outlook.com
Source: global traffic DNS traffic detected: DNS query: na.account.docusign.com
Source: global traffic DNS traffic detected: DNS query: account.docusign.com
Source: global traffic DNS traffic detected: DNS query: www.google.com
Source: global traffic DNS traffic detected: DNS query: docucdn-a.akamaihd.net
Source: global traffic DNS traffic detected: DNS query: telemetry.docusign.net
Source: unknown HTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 24.10.0.19045.0.0; IDCRL-cfg 16.000.29743.00; App svchost.exe, 10.0.19041.1806, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 3592Host: login.live.com
Source: chromecache_69.13.dr, chromecache_80.13.dr String found in binary or memory: http://eligrey.com
Source: Account Activation.eml String found in binary or memory: http://schema.org/Creat=
Source: Account Activation.eml String found in binary or memory: http://schema.org/EmailMessage
Source: Account Activation.eml String found in binary or memory: https://NA3.docusign.net/Member/Image.aspx?i=3Dlogo&amp;l=3Ddfc210ae-23=
Source: Account Activation.eml String found in binary or memory: https://NA3.docusign.net/Member/Image.aspx?i=3Dlogo&l=3Ddfc210ae-=
Source: ~WRS{C02B5362-29B7-4A97-92C7-9F0222456895}.tmp.1.dr String found in binary or memory: https://NA3.docusign.net/Member/Image.aspx?i=logo&l=dfc210ae-23d7-43b0-a87f-9d7897b9775f
Source: Account Activation.eml String found in binary or memory: https://NA3.docusign.net/member/Imag=
Source: ~WRS{C02B5362-29B7-4A97-92C7-9F0222456895}.tmp.1.dr String found in binary or memory: https://NA3.docusign.net/member/Images/email/accountActivation-white.png
Source: Account Activation.eml, ~WRS{C02B5362-29B7-4A97-92C7-9F0222456895}.tmp.1.dr String found in binary or memory: https://aka.ms/LearnAboutSenderIdentification
Source: Account Activation.eml String found in binary or memory: https://community.docusign.com/esignature-=
Source: Account Activation.eml String found in binary or memory: https://docucdn-a.a=
Source: Account Activation.eml String found in binary or memory: https://docucdn-a.akamaihd.net/olive/images/2.62.0/global-a=
Source: Account Activation.eml String found in binary or memory: https://docucdn-a.akamaihd.net/olive/images/2.62.0/global-assets/email-te=
Source: ~WRS{C02B5362-29B7-4A97-92C7-9F0222456895}.tmp.1.dr String found in binary or memory: https://docucdn-a.akamaihd.net/olive/images/2.62.0/global-assets/email-templates/email-logo.png
Source: Account Activation.eml String found in binary or memory: https://gcc02.sa=
Source: Account Activation.eml String found in binary or memory: https://gcc02.safelin=
Source: Account Activation.eml String found in binary or memory: https://gcc02.safelinks.pro=
Source: Account Activation.eml String found in binary or memory: https://gcc02.safelinks.protection.outlook.com/?=
Source: Account Activation.eml String found in binary or memory: https://gcc02.safelinks.protection.outlook.com/?url=3Dhttps%3A%2=
Source: Account Activation.eml String found in binary or memory: https://gcc02.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fcommuni=
Source: Account Activation.eml String found in binary or memory: https://gcc02.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
Source: ~WRS{C02B5362-29B7-4A97-92C7-9F0222456895}.tmp.1.dr String found in binary or memory: https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcommunity.docusign.com%2Fesignatur
Source: ~WRS{C02B5362-29B7-4A97-92C7-9F0222456895}.tmp.1.dr String found in binary or memory: https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fna.account.docusign.com%2Fmanaged_
Source: ~WRS{C02B5362-29B7-4A97-92C7-9F0222456895}.tmp.1.dr String found in binary or memory: https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.docusign.com%2F&data=05%7C
Source: ~WRS{C02B5362-29B7-4A97-92C7-9F0222456895}.tmp.1.dr String found in binary or memory: https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.docusign.com%2Fs%2Farticle
Source: ~WRS{C02B5362-29B7-4A97-92C7-9F0222456895}.tmp.1.dr String found in binary or memory: https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.docusign.com%2Ffeatures-and-be
Source: Account Activation.eml String found in binary or memory: https://gcc02.safelinks=
Source: chromecache_69.13.dr, chromecache_80.13.dr String found in binary or memory: https://gist.github.com/1129031
Source: chromecache_82.13.dr String found in binary or memory: https://github.com/zloirock/core-js
Source: chromecache_82.13.dr String found in binary or memory: https://github.com/zloirock/core-js/blob/v3.25.0/LICENSE
Source: chromecache_82.13.dr String found in binary or memory: https://github.com/zloirock/core-js/blob/v3.36.1/LICENSE
Source: Account Activation.eml String found in binary or memory: https://na.account.docusign.com/managed_t=
Source: Account Activation.eml String found in binary or memory: https://na.account.docusign.com/managed_token/v1/redeem?mtid=3D1afd3=
Source: Account Activation.eml String found in binary or memory: https://support.docusign.com/s/ar=
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.ca/company/privacy-policy
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.ca/company/terms-and-conditions/web
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.co.uk/company/privacy-policy
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.co.uk/company/terms-and-conditions/web
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.com.au/company/privacy-policy
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.com.au/company/terms-and-conditions/web
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.com.br/politica-de-privacidade
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.com.br/termos-uso
Source: chromecache_82.13.dr String found in binary or memory: https://www.docusign.com/company/privacy-policy
Source: chromecache_82.13.dr String found in binary or memory: https://www.docusign.com/company/terms-and-conditions/web
Source: Account Activation.eml String found in binary or memory: https://www.docusign.com/features-and-benefits/mob=
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.de/unternehmen/agb
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.de/unternehmen/datenschutz
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.es/empresa/condiciones-de-uso/web
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.es/empresa/politica-de-privacidad
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.fr/conditions-generales-d-utilisation
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.fr/societe/politique-de-confidentialite
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.jp/company/privacy-policy
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.jp/company/terms-and-conditions/web
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.mx/compania/condiciones-de-uso/web
Source: chromecache_79.13.dr, chromecache_82.13.dr String found in binary or memory: https://www.docusign.mx/compania/politica-de-privacidad
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49722
Source: unknown Network traffic detected: HTTP traffic on port 49710 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49678 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49722 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49716
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49710
Source: unknown Network traffic detected: HTTP traffic on port 49709 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49673 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49709
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 49716 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown HTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49709 version: TLS 1.2
Source: unknown HTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 40.126.31.69:443 -> 192.168.2.16:49711 version: TLS 1.2
Source: unknown HTTPS traffic detected: 40.126.31.69:443 -> 192.168.2.16:49713 version: TLS 1.2
Source: unknown HTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49716 version: TLS 1.2
Source: unknown HTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49717 version: TLS 1.2
Source: classification engine Classification label: clean4.winEML@26/43@18/4
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE File created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE File created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241119T1627210236-7056.etl Jump to behavior
Source: unknown Process created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Account Activation.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "232B3E22-7832-4ABB-BB8F-3CE1B02474C6" "1816B496-C878-4E9C-AC1E-3156942D4F74" "7056" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fna.account.docusign.com%2Fmanaged_token%2Fv1%2Fredeem%3Fmtid%3D1afd3250-63ab-4ef4-bd0c-9b9f82e9d0a1%26mtsec%3Dg0ZdjUDSmcDg5hiMJqr_CrgwS2PWh7xFCz8MPTgg7bU&data=05%7C02%7Cjminot%40santaclaraca.gov%7C293c1debb86346386e5108dd083f4fec%7C28ea354810694e81aa0b6e4b3271a5cb%7C0%7C0%7C638675791173233740%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=zh70XBLyl1Yk%2FobcOIaGGrzaz5on5sHW8pIVGI2mtKI%3D&reserved=0
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fna.account.docusign.com%2Fmanaged_token%2Fv1%2Fredeem%3Fmtid%3D1afd3250-63ab-4ef4-bd0c-9b9f82e9d0a1%26mtsec%3Dg0ZdjUDSmcDg5hiMJqr_CrgwS2PWh7xFCz8MPTgg7bU&data=05%7C02%7Cjminot%40santaclaraca.gov%7C293c1debb86346386e5108dd083f4fec%7C28ea354810694e81aa0b6e4b3271a5cb%7C0%7C0%7C638675791173233740%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=zh70XBLyl1Yk%2FobcOIaGGrzaz5on5sHW8pIVGI2mtKI%3D&reserved=0
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1704 --field-trial-handle=1884,i,11741520992509703267,8091029071197411952,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=2000,i,4706141409970112763,1385621711572975550,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "232B3E22-7832-4ABB-BB8F-3CE1B02474C6" "1816B496-C878-4E9C-AC1E-3156942D4F74" "7056" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fna.account.docusign.com%2Fmanaged_token%2Fv1%2Fredeem%3Fmtid%3D1afd3250-63ab-4ef4-bd0c-9b9f82e9d0a1%26mtsec%3Dg0ZdjUDSmcDg5hiMJqr_CrgwS2PWh7xFCz8MPTgg7bU&data=05%7C02%7Cjminot%40santaclaraca.gov%7C293c1debb86346386e5108dd083f4fec%7C28ea354810694e81aa0b6e4b3271a5cb%7C0%7C0%7C638675791173233740%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=zh70XBLyl1Yk%2FobcOIaGGrzaz5on5sHW8pIVGI2mtKI%3D&reserved=0 Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fna.account.docusign.com%2Fmanaged_token%2Fv1%2Fredeem%3Fmtid%3D1afd3250-63ab-4ef4-bd0c-9b9f82e9d0a1%26mtsec%3Dg0ZdjUDSmcDg5hiMJqr_CrgwS2PWh7xFCz8MPTgg7bU&data=05%7C02%7Cjminot%40santaclaraca.gov%7C293c1debb86346386e5108dd083f4fec%7C28ea354810694e81aa0b6e4b3271a5cb%7C0%7C0%7C638675791173233740%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=zh70XBLyl1Yk%2FobcOIaGGrzaz5on5sHW8pIVGI2mtKI%3D&reserved=0 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1704 --field-trial-handle=1884,i,11741520992509703267,8091029071197411952,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=2000,i,4706141409970112763,1385621711572975550,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: c2r64.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32 Jump to behavior
Source: Google Drive.lnk.11.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.11.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.11.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.11.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.11.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.11.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Window found: window name: SysTabControl32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information queried: ProcessInformation Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Queries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs