Windows
Analysis Report
[BULK] how aligning supply chain and digital transformation initiatives leads.eml
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- OUTLOOK.EXE (PID: 6184 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\De sktop\[BUL K] how ali gning supp ly chain a nd digital transform ation init iatives le ads.eml" MD5: 91A5292942864110ED734005B7E005C0) - ai.exe (PID: 6760 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "205 8FDAE-A46B -41B2-8EAC -C746176A8 CC1" "1835 1D5A-68E2- 4625-9C2F- 81EA9F739C 49" "6184" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD) - chrome.exe (PID: 3860 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// eu-west-1. protection .sophos.co m/?d=bench url.com&u= aHR0cHM6Ly 9jbHQxNjY2 MzA4LmJlbm NodXJsLmNv bS9jL2w_dT 0xMUQzQzAz RSZlPTE5ME ZCMDEmYz0x OTZEMDQmdD 0wJmw9MTE4 MUE2RjI3Jm VtYWlsPXY1 QzVNSXFzS0 RRcHFLRHdE OGpaRUdnOH pqa01YdFlY WUxZWkZ6dD dONmslM0Qm c2VxPTE=&p =m&i=NjFiM TQ3MGI2Zjk 0N2UwZTYxY jViM2Qy&t= T2JyRVF2d1 IyZVVKME9h R3k3SE8zS3 g0RHROWnRi RGxHY2twcU 1oUFRPST0= &h=896a361 5f4614642b b91c1745a4 0c843&s=AV NPUEhUT0NF TkNSWVBUSV anzsPvZrIh F9w0fiwC9I -6QettNLX0 GHvdzaxOTU rH1IIJlJHj 9JNyDqjTU5 N_4rvHAsD0 qKqPX0lk4e mz3t_13soR RHdhNeRHfj SlFzPjiw MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 1228 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2060 --fi eld-trial- handle=198 4,i,150134 5582380251 9208,12748 0633943915 18330,2621 44 --disab le-feature s=Optimiza tionGuideM odelDownlo ading,Opti mizationHi nts,Optimi zationHint sFetching, Optimizati onTargetPr ediction / prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: |
Source: | Classification: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | Memory has grown: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | Window found: |
Source: | Window detected: |
Source: | Key opened: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | Key value created or modified: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | File Volume queried: |
Source: | Process information queried: |
Source: | Queries volume information: |
Source: | Key value queried: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 21 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Modify Registry | LSASS Memory | 13 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Registry Run Keys / Startup Folder | 1 Registry Run Keys / Startup Folder | 1 Process Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 Extra Window Memory Injection | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Extra Window Memory Injection | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
d35tlz0p71apkp.cloudfront.net | 108.158.75.6 | true | false | unknown | |
digitalzonemediaus.com | 139.59.55.248 | true | false | unknown | |
www.google.com | 142.250.181.68 | true | false | high | |
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | 84.201.208.66 | true | false | high | |
prod-lb-track-204413666.us-west-2.elb.amazonaws.com | 34.212.80.167 | true | false | unknown | |
eu-west-1.protection.sophos.com | unknown | unknown | false | high | |
clt1666308.benchurl.com | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
52.113.194.132 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
108.158.75.6 | d35tlz0p71apkp.cloudfront.net | United States | 16509 | AMAZON-02US | false | |
172.217.19.238 | unknown | United States | 15169 | GOOGLEUS | false | |
172.217.19.227 | unknown | United States | 15169 | GOOGLEUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
172.217.17.67 | unknown | United States | 15169 | GOOGLEUS | false | |
84.201.208.66 | default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | Poland | 34390 | NPLAYTELEKOM-AS-PONPL | false | |
139.59.55.248 | digitalzonemediaus.com | Singapore | 14061 | DIGITALOCEAN-ASNUS | false | |
20.189.173.16 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
74.125.205.84 | unknown | United States | 15169 | GOOGLEUS | false | |
23.32.238.27 | unknown | United States | 2828 | XO-AS15US | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
52.109.28.46 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
34.212.80.167 | prod-lb-track-204413666.us-west-2.elb.amazonaws.com | United States | 16509 | AMAZON-02US | false | |
142.250.181.68 | www.google.com | United States | 15169 | GOOGLEUS | false | |
52.109.76.243 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false |
IP |
---|
192.168.2.16 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1563148 |
Start date and time: | 2024-11-26 15:05:04 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 19 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | [BULK] how aligning supply chain and digital transformation initiatives leads.eml |
Detection: | MAL |
Classification: | mal48.winEML@26/17@8/144 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Excluded IPs from analysis (whitelisted): 52.109.28.46
- Excluded domains from analysis (whitelisted): config.officeapps.live.com, prod.configsvc1.live.com.akadns.net, officeclient.microsoft.com, europe.configsvc1.live.com.akadns.net, uks-azsc-config.officeapps.live.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: [BULK] how aligning supply chain and digital transformation initiatives leads.eml
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 338 |
Entropy (8bit): | 3.4797898089465846 |
Encrypted: | false |
SSDEEP: | |
MD5: | 453F60DB83EBF513BDF45146635F4D8F |
SHA1: | B0C8ACE65BA5C48139A2E0990F91E4BCD22D743C |
SHA-256: | 8912D320F94520C8D2B8F522B368C6C0C09D65C567CBFE4F811ACC142138B7B4 |
SHA-512: | 220584BBE0C30A8C8D693A82CF16875906AE9033D7E2255497244F8099F4298C5A677A15EB1F1C4E3E9A72F2B90E1FA05B366A6253612F4D8100221635C7AAFF |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 231348 |
Entropy (8bit): | 4.386242675061717 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7A16DEFF93E1D9F82B82E4A1CE0585E2 |
SHA1: | B30F11134327EABEC473E554DD7F0B6CBC36CE7E |
SHA-256: | F463CEF7A786CC511BC7E2D1D787058FAE1308B42EAE5F4AD932FB92ADA053FA |
SHA-512: | F57B0F67B838937797416AFDAF55CC8EE1EC70F1C0BA46B7CF51ED5AC61FAA18EF66324611DC00160F93BFE58E0AEEDEB53D1AE96D970D272F023092DE19BC0E |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bin
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 322260 |
Entropy (8bit): | 4.000299760592446 |
Encrypted: | false |
SSDEEP: | |
MD5: | CC90D669144261B198DEAD45AA266572 |
SHA1: | EF164048A8BC8BD3A015CF63E78BDAC720071305 |
SHA-256: | 89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899 |
SHA-512: | 16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bin
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 10 |
Entropy (8bit): | 2.7219280948873625 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3489F36061131D9D3E87002A436BF0A7 |
SHA1: | 92D43E7D1DF88A9BC5A5B5E052C8A89EE928191D |
SHA-256: | D65F78A1B668874F2E2A6FE52FA1038B94B1287BC84E66318A746860638E9AD4 |
SHA-512: | EE66684DD49FCE33413BF61BE8205ED0E979DB8FE4048DCE18384E026F58921D257F3CF5679A7EA53E9C822DF84375857E03D9AD065BE5FE5C6EF763838B113B |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\25CFFA8C-E314-4C3A-A197-BF91A5E251E0
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 181859 |
Entropy (8bit): | 5.295308806494344 |
Encrypted: | false |
SSDEEP: | |
MD5: | C91D7F4C307725F3BEA29FDA34D34632 |
SHA1: | 8454F28B96BC7AF7215890F456522332C840D5F5 |
SHA-256: | 3DA862CC781A59B99FA53DA0A49A418AF02065CA8198736062C8A045C5FD96B3 |
SHA-512: | DBFE46F0ED70973232D582DA8F1965FC9165D803F199AE9D4E75F6A038655DC739A2A04B372140631A070980AA84182F4670EBA2A72C694150102C838C8388A9 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 4616 |
Entropy (8bit): | 0.13760166725504608 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8E036D278D91B13409EA0533A1D088C2 |
SHA1: | A3770EE1E54C834345427E817BA911A7F40671B9 |
SHA-256: | E606112FB946517E59051BE4286FF6902068AB4C6A532BA64CD0B27610E0A906 |
SHA-512: | F6528214524D491E0068617A11E2836FE22800A4183F8EB24F0C96A56AC3D746FB3721B48988055C6E68D7D88D4654CF423CC67B0581EF40C0B989FE61B65D5D |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2278 |
Entropy (8bit): | 3.8468009507303123 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3134745DB560B4914B486C605A792D31 |
SHA1: | 7D20ADC9FB7BBEE1EE17B9A6CF9F29A2D10F6158 |
SHA-256: | E917B0E40AE28CB1D899D061E7234BE77B2D46CD0407C4DFD9E435AC6BA41BC1 |
SHA-512: | B221BB62DC2AA0543F609CF7F5854C4E13D8B00E9AE451A6B4F65A7039CBAE7E923E0975308E6756033CBA8C9D8D184C0976E867847D4CA538DABCFF0CCE5F5D |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\5475cb191e478c39370a215b2da98a37e9dc813d.tbres
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2684 |
Entropy (8bit): | 3.896809371930136 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3179F77C7FB86C6164E0F0DB3D4488EB |
SHA1: | FF079AE98343F4C3E4BA7755F91DBA23235E2063 |
SHA-256: | 38FEC5FC4B103AAA4024338BFA7D247B4ECA09EF88E9F159168FA2E511E47D0D |
SHA-512: | 654E0B34261E0E89839E5CB674CD1D364EC15FF71A31D152AB514EF2D74DE03321CA8A1975DFB10543D9C78B54CB22200E85A4A595CF76524739EDC83E9FF5B7 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbres
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 4542 |
Entropy (8bit): | 4.001099200354955 |
Encrypted: | false |
SSDEEP: | |
MD5: | B9F4AEBF1D755676401E7683E609CDF4 |
SHA1: | 84EAC8E75123AD072345A1CDADF0F746180E00A1 |
SHA-256: | 79ABCC2CDAE5B4C80BB17827A5E59F17DE4BF68A04D0712964AE36CC189D4F75 |
SHA-512: | D6C37A0760E501D8BB890CBA01D749F06D39D5B7A4887B1BE6B56FAC173E0864B2D3B1190211E7616FE9066FEFAEDFA671DBE5AFE8C4A82DA60AC30808441D99 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 30 |
Entropy (8bit): | 1.2389205950315936 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8F3F8EC39142F9F283DD57DDBD3A4474 |
SHA1: | 936D6C574AAE31F71900F6B992E4F5A2A01DAB79 |
SHA-256: | 7B07EC5291570C4C608D723B3A4B9408E80C1C8971667BE2531594C7789D1A56 |
SHA-512: | E8001C6A38CAAACC27C1214E53BC84210335CC7756EF4FCAA4B93AAA0371E3F64A7C35E51537626997BBDECB81736A206EC8A7D2506AC15B835FC5132FDD605E |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.982572911297088 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9DA6BC76463DDF467CB9F27833C5B2B0 |
SHA1: | 674B6F6E493749CB42093751431369D46ECE0020 |
SHA-256: | 095B43AB033681632527C59CB8083EB13AAE53F4C950B6D1F07D82F4D1C276DF |
SHA-512: | 6F721F2174FFE9E29C73906465E94F1261B78D839A2BA8BCF04BE6DE51D601B3797E3AAA0B3F73F322131E46BDA83674FC6691D67FA17BA138A65E6469D6D318 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.002274139695758 |
Encrypted: | false |
SSDEEP: | |
MD5: | E19744FB60752637B063CB3FACF463E2 |
SHA1: | 5FF7F62F486B741DEE805D93C6E1D4B27819B58E |
SHA-256: | DEE63F6A269FCC9E66274D701B5D5CDC8331082FBAC9016E820D8CC2668EEA6E |
SHA-512: | 937EF58E0D48D3FECA28FDC5F738D4464DFB0E6A0EB8656862F20D136CB143FC5F32132D4A0C0926AF83ACA8A954CD6B6E74C9B8AED46D6E6C7805186965D1B0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.009118777813336 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5C1ABBCE6F75E98B623E5D55F260812C |
SHA1: | 193661A2CE03C7E945762FB3DCA1E693BB8951E6 |
SHA-256: | E4370B768D19E2E858FA3DBF344722090838C405F3B0CDD01A73FD48631464D3 |
SHA-512: | 572337D33AEFA24CE2757C360E450A639D714F36F7E9F375CFAC52E23E7F43AB34839CE72E8FA884517F1C48E9C88ED578405FED7BA7BD2243271EE0F561C23D |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9981685501666266 |
Encrypted: | false |
SSDEEP: | |
MD5: | AEDFCEAAE36E436E4CF70C94555BFC72 |
SHA1: | 2A0C0845677CB1D065830DC898247EB1D18D4B8F |
SHA-256: | EA681BD7D79A78E50173352BBA7CDF1E30A07FAB22C9C9782C57FF397223184B |
SHA-512: | 704510CE6DB4C779BBEADDC8EBDCFA4A06F3F01E8C6BBEBDF8AE3040C8F400DF3506FE3C913C2CA5DDE1E67598F97A1529778C9A0848650376420327934880CB |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9871036879974326 |
Encrypted: | false |
SSDEEP: | |
MD5: | B73BFD06958EA75F84B3C45E6714907D |
SHA1: | 7072ECB332699DFEC2D40809AB8365EA81CCF0EA |
SHA-256: | B17C78967D4473F8AC546D8F244241B75A8F1A7B80D4B2FE807FA0AD4245F78C |
SHA-512: | F9590A3E13E66AE1BEA66D76CB5B22C931A825281861228652E366C31A3EE110ED5D794955575C26D652BC13145BC86868EA40670CBABF623D317788CD86DF78 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 3.9957807743706524 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6310BC3A28D6B1C00F8A8896025E8652 |
SHA1: | 294DD8DC51CFF67DBF01B0BAA277186818DDC6A4 |
SHA-256: | 94F423E1E7878AD169717FA8C747E498DBE2754C66D01EFFA5A671E268D951CB |
SHA-512: | D418DD62B32B3EB3C736AA3E87733E8716D5BC8B5BE38F7A59C79321C527C5E53CC5A8BB4163BBE4BAB379B518C354F968D066D06870CBBDBAA9C13D6443923A |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1161081 |
Entropy (8bit): | 7.9855750332802415 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3318CDFCF6C754122751389FD63DD3E3 |
SHA1: | AB12374C60F4CACB4641766B546BAAE0FF0E56F6 |
SHA-256: | 85EC687E154212EF0794C7BABAA670AE593532D940C0CCFC9FAD5048F4458F94 |
SHA-512: | BA736E9C16C45955EE5692C5C3E82E01A9CC605D4415F7C5575DBF22196FF8B0E4814CAC073BF08B0FB13E130DBC4C013D8252E383A4C694CC92B16B24F175F1 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3318CDFCF6C754122751389FD63DD3E3 |
SHA1: | AB12374C60F4CACB4641766B546BAAE0FF0E56F6 |
SHA-256: | 85EC687E154212EF0794C7BABAA670AE593532D940C0CCFC9FAD5048F4458F94 |
SHA-512: | BA736E9C16C45955EE5692C5C3E82E01A9CC605D4415F7C5575DBF22196FF8B0E4814CAC073BF08B0FB13E130DBC4C013D8252E383A4C694CC92B16B24F175F1 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 0 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3318CDFCF6C754122751389FD63DD3E3 |
SHA1: | AB12374C60F4CACB4641766B546BAAE0FF0E56F6 |
SHA-256: | 85EC687E154212EF0794C7BABAA670AE593532D940C0CCFC9FAD5048F4458F94 |
SHA-512: | BA736E9C16C45955EE5692C5C3E82E01A9CC605D4415F7C5575DBF22196FF8B0E4814CAC073BF08B0FB13E130DBC4C013D8252E383A4C694CC92B16B24F175F1 |
Malicious: | false |
Reputation: | unknown |
Preview: |
File type: | |
Entropy (8bit): | 5.781557010244006 |
TrID: |
|
File name: | [BULK] how aligning supply chain and digital transformation initiatives leads.eml |
File size: | 53'270 bytes |
MD5: | d020b732b94f829d81969ac967de4894 |
SHA1: | 95441e23ea5a6ad46f7c4d7aac42571d130f420d |
SHA256: | 8c4e1b503be20c059fd38b3c981a35d277aea90a52ee27ad5e86f2a112d35158 |
SHA512: | 1200e8ea149a3f00b06f2198910853b4f8bf73f188c1640030a002cfa65fbc818dadfe5b76a2f1844ca125c310780f55364c4ac8f652e156cdd7e541142dadcb |
SSDEEP: | 768:2JOeZxc0CMJkjhV6QknmSmUmIH/Hf/qNciOKY4mg0m+pw:2Jv/8umUmtDOKNmg0m+pw |
TLSH: | C033E8828E82201AD47354592A163E6CABF07C1F67D64DA039DE727A2F8F0574627FCC |
File Content Preview: | Received: from PAWPR03MB9215.eurprd03.prod.outlook.com (2603:10a6:102:343::18).. by DB8PR03MB6139.eurprd03.prod.outlook.com with HTTPS; Tue, 26 Nov 2024.. 13:37:19 +0000..Received: from DB8PR09CA0019.eurprd09.prod.outlook.com (2603:10a6:10:a0::32).. by PA |
Subject: | [BULK] how aligning supply chain and digital transformation initiatives leads? |
From: | Christy Warner <christy.warner@fincorpb2b.com> |
To: | mark.micallef@cardfactory.co.uk |
Cc: | |
BCC: | |
Date: | Tue, 26 Nov 2024 08:37:00 -0500 |
Communications: |
|
Attachments: |
Key | Value |
---|---|
Received | from pmta362.dedicated.bmsend.com (216.4.238.193) by AMS0EPF0000019A.mail.protection.outlook.com (10.167.16.246) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8207.12 via Frontend Transport; Tue, 26 Nov 2024 13:37:03 +0000 |
Authentication-Results | spf=softfail (sender IP is 198.154.180.200) smtp.mailfrom=r1666308.fincorpb2b.com; dkim=fail (signature did not verify) header.d=fincorpb2b.com;dkim=fail (signature did not verify) header.d=bmsend.com;dmarc=fail action=none header.from=fincorpb2b.com;compauth=fail reason=001 |
Received-SPF | Pass (protection.outlook.com: domain of r1666308.fincorpb2b.com designates 216.4.238.193 as permitted sender) receiver=protection.outlook.com; client-ip=216.4.238.193; helo=pmta362.dedicated.bmsend.com; pr=C |
X-Sophos-Product-Type | Mailflow |
X-Sophos-Email-ID | 896a3615f4614642bb91c1745a40c843 |
Authentication-Results-Original | spf=pass (sender IP is 216.4.238.193) smtp.mailfrom=r1666308.fincorpb2b.com; dkim=pass (signature was verified) header.d=fincorpb2b.com;dkim=pass (signature was verified) header.d=bmsend.com;dmarc=pass action=none header.from=fincorpb2b.com;compauth=pass reason=100 |
DKIM-Signature | v=1; a=rsa-sha256; d=bmsend.com; s=bmdeda; c=relaxed/relaxed; t=1732628220; h=subject:from:reply-to:to:date:message-id:feedback-id:list-unsubscribe: content-type:mime-version; bh=Oq08qXQyc9yyBVHlervCW1+sJRuae8vq/rCHTuOtL9g=; b=ZUfWjPN8smWS2p2vQQ9iYcItKI/HlxnBaFGqrdBhNaSv1IGfTtWc3M9OJCZqgeh7ia9WHUQqL+M dMKbhDhiQHA2N+nZapfbB2zf8hsZJ/akiVsCWXSXLDj/z9ZsYTtN7I9Qv352o26fzznLFW9POF1eZ 9SA3fE5kCukO9SP6vpg= |
From | Christy Warner <christy.warner@fincorpb2b.com> |
Date | Tue, 26 Nov 2024 08:37:00 -0500 |
Subject | [BULK] how aligning supply chain and digital transformation initiatives leads? |
Message-Id | <0ed557ee25c54bc0b160c734e69fba93@fincorpb2b.com> |
Reply-To | Christy Warner <christy.warner@fincorpb2b.com> |
X-Identify | <17309704_4699352871@benchmarkemail.com> |
X-CMC | 1559C72.1181A6F27 |
X-Campaignid | 17309704 |
X-SentFromRelay | pmta362.dedicated.bmsend.com |
X-SentFromServer | 216.4.238.193 |
X-Report-Abuse | https://clt1666308.benchurl.com/Abuse?9tSN8Jgb1CaOSko%2BvS7dD%2Fz5moo3Gb%2Fv%2Bm8s7YuEzomynLSytSaQpbuMueMNRmfdHK%2FG7%2B7EuZQnsFETSYGku4FRcQUPYOFc |
X-BM-User | 196D04 |
Feedback-ID | 1666308:17309704:us:benchmarkemail |
X-Mailer | BME Mailer - **BME17309704-1666308-4699352871** |
List-ID | 4699352871BM list <4699352871.1666308@benchmarkemail.com> |
List-Unsubscribe | <https://clt1666308.benchurl.com/ud?9tSN8Jgb1CaOSko%2BvS7dD%2Fz5moo3Gb%2Fv%2Bm8s7YuEzomynLSytSaQpbuMueMNRmfdHK%2FG7%2B7EuZQnsFETSYGku4FRcQUPYOFc> |
List-Unsubscribe-Post | List-Unsubscribe=One-Click |
To | mark.micallef@cardfactory.co.uk |
Content-Type | multipart/alternative; boundary="=-IILreIz4i4zp2rEhL3DIjA==" |
X-EOPAttributedMessage | 1 |
X-EOPTenantAttributedMessage | 7956b84e-0c99-46b5-81c6-28689cfa7221:1 |
X-MS-TrafficTypeDiagnostic | AMS0EPF0000019A:EE_|VI1PR03MB10157:EE_|DU6PEPF00009524:EE_|PAWPR03MB9215:EE_|DB8PR03MB6139:EE_ |
X-MS-Office365-Filtering-Correlation-Id | 204b70f4-9b9b-4e25-d6fa-08dd0e1f7137 |
X-Forefront-Antispam-Report-Untrusted | CIP:216.4.238.193; CTRY:US; LANG:en; SCL:5; SRV:; IPV:NLI; SFV:SPM; H:pmta362.dedicated.bmsend.com; PTR:pmta362.dedicated.bmsend.com; CAT:SPM; SFS:(13230040)(2092899012)(5073199012)(69100299015)(5063199012)(4123199012)(4022899009)(12012899012)(1032899013)(4076899003)(2066899003)(8096899003); DIR:INB; |
X-Microsoft-Antispam-Untrusted | BCL:0; ARA:13230040|2092899012|5073199012|69100299015|5063199012|4123199012|4022899009|12012899012|1032899013|4076899003|2066899003|8096899003; |
X-Microsoft-Antispam-Message-Info-Original | 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 |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | PAWPR03MB9215 |
Content-Transfer-Encoding | 8bit |
X-LASED-MailType | BULK |
X-Sophos-Email-Scan-Details | 27140d1e1540510e5d57435f51475a5a571540586e3671 |
X-Sophos-Email | [eu-west-1] Antispam-Engine: 6.0.0, AntispamData: 2024.11.26.101546 |
X-Sophos-SenderHistory | ip=216.4.238.193, fs=1210623, fso=70855175, da=226086841, mc=58, sc=0, hc=58, sp=0, re=100, sd=0, hd=7 |
X-Sophos-DomainHistory | d=fincorpb2b.com, fs=3880, fso=16752864, da=86829665, mc=6, sc=0, hc=6, sp=0, re=16, sd=0, hd=2 |
X-LASED-From-ReplyTo-Diff | From:<printcraft.co.uk>:11, Reply-To:<printcraft.co.uk>:11 |
X-LASED-SpamProbability | 0.231475 |
X-LASED-Hits | AUTH_RES_PASS 0.000000, BODYTEXTH_SIZE_3000_MORE 0.000000, BODYTEXTP_SIZE_3000_LESS 0.000000, BODY_SIZE_10000_PLUS 0.000000, BULK_EMAIL_SENDER 0.000000, DATE_TZ_NA 0.000000, DATE_TZ_NEG_0500 0.000000, DKIM_ALIGNS 0.000000, DKIM_SIGNATURE 0.000000, DQ_S_H 0.000000, HTML_90_100 0.100000, HTML_95_100 0.100000, HTML_98_100 0.100000, HTML_99_100 0.100000, HTML_NO_HTTP 0.100000, HTML_TAG_NAME_RND_CAP 0.000000, IMP_FROM_NOTSELF 0.000000, INBOUND_SOPHOS 0.000000, INBOUND_SOPHOS_TOP_REGIONS 0.000000, KNOWN_FREEWEB_URI 0.050000, LEGITIMATE_SIGNS 0.000000, LIST_HEADER 0.000000, NO_FUR_HEADER 0.000000, OBFUSCATION 0.000000, OUTLOOK_VERDICT_SPAM 2.000000, REPLYTO_SAMEAS_FROM 0.000000, SUPERLONG_LINE 0.050000, SXL_IP_TFX_ESG 0.000000, __ANY_URI 0.000000, __ATTACH_CTE_QUOTED_PRINTABLE 0.000000, __AUTH_RES_DKIM_PASS 0.000000, __AUTH_RES_DMARC_PASS 0.000000, __AUTH_RES_PASS 0.000000, __BODY_NO_MAILTO 0.000000, __CP_NAME_BODY 0.000000, __CP_URI_IN_BODY 0.000000, __CT 0.000000, __CTYPE_HAS_BOUNDARY 0.000000, __CTYPE_MULTIPART 0.000000, __CTYPE_MULTIPART_ALT 0.000000, __DC_PHRASE 0.000000, __DKIM_ALIGNS_1 0.000000, __DKIM_ALIGNS_2 0.000000, __DQ_D_H 0.000000, __DQ_IP_FSO_LARGE 0.000000, __DQ_NEG_DOMAIN 0.000000, __DQ_NEG_HEUR 0.000000, __DQ_NEG_IP 0.000000, __DQ_S_DOMAIN_100K 0.000000, __DQ_S_DOMAIN_10K 0.000000, __DQ_S_DOMAIN_HD_1_P 0.000000, __DQ_S_DOMAIN_HIST_1 0.000000, __DQ_S_DOMAIN_MC_1_P 0.000000, __DQ_S_DOMAIN_MC_5_P 0.000000, __DQ_S_DOMAIN_RE_49_L 0.000000, __DQ_S_DOMAIN_RE_99_L 0.000000, __DQ_S_DOMAIN_SP_0_P 0.000000, __DQ_S_HIST_1 0.000000, __DQ_S_HIST_2 0.000000, __DQ_S_IP_1MO 0.000000, __DQ_S_IP_MC_10_P 0.000000, __DQ_S_IP_MC_1_P 0.000000, __DQ_S_IP_MC_5_P 0.000000, __DQ_S_IP_RE_100_P 0.000000, __DQ_S_IP_SP_0_P 0.000000, __FROM_DOMAIN_NOT_IN_BODY 0.000000, __FROM_NAME_NOT_IN_BODY 0.000000, __HAS_FROM 0.000000, __HAS_HTML 0.000000, __HAS_LIST_HEADER 0.000000, __HAS_LIST_ID 0.000000, __HAS_LIST_UNSUBSCRIBE 0.000000, __HAS_LIST_UNSUBSCRIBE_POST 0.000000, __HAS_MSGID 0.000000, __HAS_REPLYTO 0.000000, __HAS_X_FF_ASR 0.000000, __HAS_X_FF_ASR_CAT 0.000000, __HAS_X_FF_ASR_SFV 0.000000, __HAS_X_MAILER 0.000000, __HIGHBIT_ASCII_MIX 0.000000, __HTML_BAD_END 0.000000, __HTML_STYLE_DEF_HIDDEN 0.000000, __HTTPS_URI 0.000000, __IMP_FROM_NOTSELF 0.000000, __INBOUND_SOPHOS_EU_WEST_1 0.000000, __JSON_HAS_MODELS 0.000000, __JSON_HAS_SCHEMA_VERSION 0.000000, __JSON_HAS_SENDER_AUTH 0.000000, __JSON_HAS_TENANT_DOMAINS 0.000000, __JSON_HAS_TENANT_ID 0.000000, __JSON_HAS_TENANT_SCHEMA_VERSION 0.000000, __JSON_HAS_TENANT_VIPS 0.000000, __JSON_HAS_TRACKING_ID 0.000000, __KNOWN_FREEWEB_URI1 0.000000, __LEGIT_LIST_HEADER 0.000000, __LEO_OBFU_DATE_0500 0.000000, __MIME_BOUND_26 0.000000, __MIME_HTML 0.000000, __MIME_TEXT_H 0.000000, __MIME_TEXT_H1 0.000000, __MIME_TEXT_H2 0.000000, __MIME_TEXT_P 0.000000, __MIME_TEXT_P1 0.000000, __MIME_TEXT_P2 0.000000, __MIME_VERSION 0.000000, __MSGID_32HEX 0.000000, __MTHREAT_0 0.000000, __MTL_0 0.000000, __MULTIPLE_URI_TEXT 0.000000, __RCVD_PASS 0.000000, __REPLYTO_SAMEAS_FROM 0.000000, __REPLYTO_SAMEAS_FROM_ACC 0.000000, __REPLYTO_SAMEAS_FROM_ADDY 0.000000, __REPLYTO_SAMEAS_FROM_DOMAIN 0.000000, __REPLYTO_SAMEAS_FROM_NAME 0.000000, __SANE_MSGID 0.000000, __SCAN_DETAILS 0.000000, __SCAN_DETAILS_SANE 0.000000, __SCAN_DETAILS_TH_MARKETING 0.000000, __SCAN_DETAILS_TL_0 0.000000, __STOCK_PHRASE_7 0.000000, __STYLE_RATWARE_NEG 0.000000, __STYLE_TAG 0.000000, __SUBJ_ALPHA_NEGATE 0.000000, __SUBJ_ALPHA_START 0.000000, __TAG_EXISTS_HEAD 0.000000, __TAG_EXISTS_HTML 0.000000, __TAG_EXISTS_META 0.000000, __TO_MALFORMED_2 0.000000, __TO_NO_NAME 0.000000, __URI_IN_BODY 0.000000, __URI_NOT_IMG 0.000000, __URI_NO_MAILTO 0.000000, __URI_NO_WWW 0.000000, __URI_NS 0.000000, __URI_WITHOUT_PATH 0.000000, __URI_WITH_PATH 0.000000, __X_FF_ASR_CAT_SPM 0.000000, __X_FF_ASR_SCL_SPM 0.000000, __X_FF_ASR_SFV_SPM 0.000000 |
X-LASED-Impersonation | False |
X-LASED-Spam | NonSpam |
X-Sophos-MH-Mail-Info-Key | NFh5TnNtMFMzQ3puVFZnLTE3Mi4xOS4yLjIyNw== |
Return-Path | BOUNCE.1082008.1181A6F27.1559C72.196D04.bme@r1666308.fincorpb2b.com |
X-MS-Exchange-Organization-ExpirationStartTime | 26 Nov 2024 13:37:16.2738 (UTC) |
X-MS-Exchange-Organization-ExpirationStartTimeReason | OriginalSubmit |
X-MS-Exchange-Organization-ExpirationInterval | 1:00:00:00.0000000 |
X-MS-Exchange-Organization-ExpirationIntervalReason | OriginalSubmit |
X-MS-Exchange-Organization-Network-Message-Id | 204b70f4-9b9b-4e25-d6fa-08dd0e1f7137 |
X-MS-Exchange-Organization-MessageDirectionality | Incoming |
X-MS-Exchange-Transport-CrossTenantHeadersStripped | DU6PEPF00009524.eurprd02.prod.outlook.com |
X-MS-PublicTrafficType | |
X-MS-Exchange-Organization-AuthSource | DU6PEPF00009524.eurprd02.prod.outlook.com |
X-MS-Exchange-Organization-AuthAs | Anonymous |
X-MS-Office365-Filtering-Correlation-Id-Prvs | 05a3da1f-becf-4a8f-e08a-08dd0e1f69e9 |
X-MS-Exchange-Organization-SCL | -1 |
X-Microsoft-Antispam | BCL:0;ARA:13230040|4022899009|5063199012|5073199012|4123199012|2092899012|12012899012|35042699022|69100299015|1032899013|4076899003|2066899003|8096899003; |
X-Forefront-Antispam-Report | CIP:198.154.180.200;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:SKN;H:mfid-euw1.prod.hydra.sophos.com;PTR:mfid-euw1.prod.hydra.sophos.com;CAT:NONE;SFS:(13230040)(4022899009)(5063199012)(5073199012)(4123199012)(2092899012)(12012899012)(35042699022)(69100299015)(1032899013)(4076899003)(2066899003)(8096899003);DIR:INB; |
X-MS-Exchange-CrossTenant-OriginalArrivalTime | 26 Nov 2024 13:37:16.2269 (UTC) |
X-MS-Exchange-CrossTenant-Network-Message-Id | 204b70f4-9b9b-4e25-d6fa-08dd0e1f7137 |
X-MS-Exchange-CrossTenant-Id | 7956b84e-0c99-46b5-81c6-28689cfa7221 |
X-MS-Exchange-CrossTenant-AuthSource | DU6PEPF00009524.eurprd02.prod.outlook.com |
X-MS-Exchange-CrossTenant-AuthAs | Anonymous |
X-MS-Exchange-CrossTenant-FromEntityHeader | Internet |
X-MS-Exchange-Transport-EndToEndLatency | 00:00:03.3617839 |
X-MS-Exchange-Processed-By-BccFoldering | 15.20.8182.018 |
X-Microsoft-Antispam-Mailbox-Delivery | ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003); |
X-Microsoft-Antispam-Message-Info | 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 |
MIME-Version | 1.0 |
Icon Hash: | 46070c0a8e0c67d6 |