Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
phish_alert_iocp_v1.4.48 - 2024-12-26T092852.527.eml

Overview

General Information

Sample name:phish_alert_iocp_v1.4.48 - 2024-12-26T092852.527.eml
Analysis ID:1581029
MD5:883b7e911fcc52e10fb6d271f089c048
SHA1:880b48629a256f394057bd33a2281027699318c4
SHA256:d50f668293b2584907b7cbbb6bc7051c4869f77ff4abd87ce9f44f70ab80bbb9
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected landing page (webpage, office document or email)
AI detected potential phishing Email
AI detected suspicious URL
HTML page contains hidden URLs
HTML page contains hidden javascript code
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Stores files to the Windows start menu directory
Stores large binary data to the registry

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6152 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\phish_alert_iocp_v1.4.48 - 2024-12-26T092852.527.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 6716 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "D5A7A3CB-D510-4DFC-A18F-D9D104E9F5E1" "060C773B-3B00-47EC-917C-7FAAECCC39C6" "6152" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 3728 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://link.edgepilot.com/s/0c7b6dd9/YttwOn4s_EGCA5oG36v4XA%3Fu%3Dhttps://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51%3FurlChildId%3D34cf256f-5afd-5e5d-9291-b284249e6f91%2526templateId%3D912cc7bf-c27d-42d7-94ed-d1d9422c9bb5&E=dflores%40firstfedweb.com&X=XID184CLwPwr1573Xd1&T=FF1001&HV=U,E,X,T&H=8b2c1950e0d10c463b6b088e1c487be5d15107fd MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 5508 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1936,i,14023787194738381908,16516610097680817749,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6152, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: EmailJoe Sandbox AI: Email contains prominent button: 'click here for preliminary closing disclosure'
Source: EmailJoe Sandbox AI: Detected potential phishing email: The sender email domain 'mailsharedfiles.com' does not match the claimed sender 'United Wholesale Mortgage'. The link contains multiple redirects through suspicious domains (dtrkr.com, edgepilot.com, clicktime.cloud). The email creates urgency around financial documents while using generic secure message claims
Source: EmailJoe Sandbox AI: AI detected Brand spoofing attempt in URL: https://clicktime.cloud.postoffice.net
Source: https://link.edgepilot.com/s/0c7b6dd9/YttwOn4s_EGCA5oG36v4XA?u=https://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51?urlChildId=34cf256f-5afd-5e5d-9291-b284249e6f91%26templateId=912cc7bf-c27d-42d7-94ed-d1d9422c9bb5HTTP Parser: https://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51?urlChildId=34cf256f-5afd-5e5d-9291-b284249e6f91&templateId=912cc7bf-c27d-42d7-94ed-d1d9422c9bb5
Source: https://link.edgepilot.com/s/0c7b6dd9/YttwOn4s_EGCA5oG36v4XA?u=https://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51?urlChildId=34cf256f-5afd-5e5d-9291-b284249e6f91%26templateId=912cc7bf-c27d-42d7-94ed-d1d9422c9bb5HTTP Parser: Base64 decoded: https://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51?urlChildId=34cf256f-5afd-5e5d-9291-b284249e6f91&templateId=912cc7bf-c27d-42d7-94ed-d1d9422c9bb5
Source: EmailClassification: Invoice Scam
Source: https://clicktime.cloud.postoffice.net/clicktime.php?U=https://link.edgepilot.com/s/0c7b6dd9/YttwOn4s_EGCA5oG36v4XA%3Fu%3Dhttps://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51%3FurlChildId%3D34cf256f-5afd-5e5d-9291-b284249e6f91%2526templateId%3D912cc7bf-c27d-42d7-94ed-d1d9422c9bb5&E=dflores%40firstfedweb.com&X=XID184CLwPwr1573Xd1&T=FF1001&HV=U,E,X,T&H=8b2c1950e0d10c463b6b088e1c487be5d15107fdHTTP Parser: No favicon
Source: https://clicktime.cloud.postoffice.net/clicktime.php?U=https://link.edgepilot.com/s/0c7b6dd9/YttwOn4s_EGCA5oG36v4XA%3Fu%3Dhttps://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51%3FurlChildId%3D34cf256f-5afd-5e5d-9291-b284249e6f91%2526templateId%3D912cc7bf-c27d-42d7-94ed-d1d9422c9bb5&E=dflores%40firstfedweb.com&X=XID184CLwPwr1573Xd1&T=FF1001&HV=U,E,X,T&H=8b2c1950e0d10c463b6b088e1c487be5d15107fdHTTP Parser: No favicon
Source: https://link.edgepilot.com/s/0c7b6dd9/YttwOn4s_EGCA5oG36v4XA?u=https://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51?urlChildId=34cf256f-5afd-5e5d-9291-b284249e6f91%26templateId=912cc7bf-c27d-42d7-94ed-d1d9422c9bb5HTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49702 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.177.19:443 -> 192.168.2.16:49700 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49703 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49704 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.177.19:443 -> 192.168.2.16:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49747 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 23.218.208.109
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.177.19
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: global trafficDNS traffic detected: DNS query: clicktime.cloud.postoffice.net
Source: global trafficDNS traffic detected: DNS query: maxcdn.bootstrapcdn.com
Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: cloud.postoffice.net
Source: global trafficDNS traffic detected: DNS query: link.edgepilot.com
Source: global trafficDNS traffic detected: DNS query: code.jquery.com
Source: global trafficDNS traffic detected: DNS query: tn.dtrkr.com
Source: global trafficDNS traffic detected: DNS query: google.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49702 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.177.19:443 -> 192.168.2.16:49700 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.16:49703 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.218.208.109:443 -> 192.168.2.16:49704 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.177.19:443 -> 192.168.2.16:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.16:49747 version: TLS 1.2
Source: classification engineClassification label: mal56.phis.winEML@22/14@66/245
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241226T1231440591-6152.etl
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\phish_alert_iocp_v1.4.48 - 2024-12-26T092852.527.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "D5A7A3CB-D510-4DFC-A18F-D9D104E9F5E1" "060C773B-3B00-47EC-917C-7FAAECCC39C6" "6152" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://link.edgepilot.com/s/0c7b6dd9/YttwOn4s_EGCA5oG36v4XA%3Fu%3Dhttps://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51%3FurlChildId%3D34cf256f-5afd-5e5d-9291-b284249e6f91%2526templateId%3D912cc7bf-c27d-42d7-94ed-d1d9422c9bb5&E=dflores%40firstfedweb.com&X=XID184CLwPwr1573Xd1&T=FF1001&HV=U,E,X,T&H=8b2c1950e0d10c463b6b088e1c487be5d15107fd
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1936,i,14023787194738381908,16516610097680817749,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "D5A7A3CB-D510-4DFC-A18F-D9D104E9F5E1" "060C773B-3B00-47EC-917C-7FAAECCC39C6" "6152" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://link.edgepilot.com/s/0c7b6dd9/YttwOn4s_EGCA5oG36v4XA%3Fu%3Dhttps://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51%3FurlChildId%3D34cf256f-5afd-5e5d-9291-b284249e6f91%2526templateId%3D912cc7bf-c27d-42d7-94ed-d1d9422c9bb5&E=dflores%40firstfedweb.com&X=XID184CLwPwr1573Xd1&T=FF1001&HV=U,E,X,T&H=8b2c1950e0d10c463b6b088e1c487be5d15107fd
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1936,i,14023787194738381908,16516610097680817749,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\outlook\ConfigContextData 1
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation31
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Modify Registry
LSASS Memory13
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
link.edgepilot.com
199.30.234.133
truefalse
    high
    google.com
    142.250.181.110
    truefalse
      high
      cloud.postoffice.net
      165.212.65.209
      truefalse
        high
        code.jquery.com
        151.101.2.137
        truefalse
          high
          cdnjs.cloudflare.com
          104.17.25.14
          truefalse
            high
            clicktime.cloud.postoffice.net
            165.212.65.140
            truefalse
              high
              maxcdn.bootstrapcdn.com
              104.18.10.207
              truefalse
                high
                www.google.com
                142.250.181.68
                truefalse
                  high
                  tn.dtrkr.com
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://clicktime.cloud.postoffice.net/clicktime.php?U=https://link.edgepilot.com/s/0c7b6dd9/YttwOn4s_EGCA5oG36v4XA%3Fu%3Dhttps://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51%3FurlChildId%3D34cf256f-5afd-5e5d-9291-b284249e6f91%2526templateId%3D912cc7bf-c27d-42d7-94ed-d1d9422c9bb5&E=dflores%40firstfedweb.com&X=XID184CLwPwr1573Xd1&T=FF1001&HV=U,E,X,T&H=8b2c1950e0d10c463b6b088e1c487be5d15107fdfalse
                      unknown
                      https://link.edgepilot.com/s/0c7b6dd9/YttwOn4s_EGCA5oG36v4XA?u=https://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51?urlChildId=34cf256f-5afd-5e5d-9291-b284249e6f91%26templateId=912cc7bf-c27d-42d7-94ed-d1d9422c9bb5true
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        52.113.194.132
                        unknownUnited States
                        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        199.30.234.133
                        link.edgepilot.comUnited States
                        13380ASN-CUSTUSfalse
                        165.212.65.209
                        cloud.postoffice.netUnited States
                        14454PERIMETER-ESECURITYUSfalse
                        1.1.1.1
                        unknownAustralia
                        13335CLOUDFLARENETUSfalse
                        104.18.10.207
                        maxcdn.bootstrapcdn.comUnited States
                        13335CLOUDFLARENETUSfalse
                        172.217.17.35
                        unknownUnited States
                        15169GOOGLEUSfalse
                        172.217.17.46
                        unknownUnited States
                        15169GOOGLEUSfalse
                        142.250.181.142
                        unknownUnited States
                        15169GOOGLEUSfalse
                        172.217.19.234
                        unknownUnited States
                        15169GOOGLEUSfalse
                        165.212.65.140
                        clicktime.cloud.postoffice.netUnited States
                        14454PERIMETER-ESECURITYUSfalse
                        104.18.11.207
                        unknownUnited States
                        13335CLOUDFLARENETUSfalse
                        151.101.2.137
                        code.jquery.comUnited States
                        54113FASTLYUSfalse
                        8.8.8.8
                        unknownUnited States
                        15169GOOGLEUSfalse
                        239.255.255.250
                        unknownReserved
                        unknownunknownfalse
                        52.109.32.97
                        unknownUnited States
                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        52.109.89.19
                        unknownUnited States
                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        142.250.181.68
                        www.google.comUnited States
                        15169GOOGLEUSfalse
                        172.217.21.35
                        unknownUnited States
                        15169GOOGLEUSfalse
                        64.233.161.84
                        unknownUnited States
                        15169GOOGLEUSfalse
                        20.42.73.24
                        unknownUnited States
                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        151.101.194.137
                        unknownUnited States
                        54113FASTLYUSfalse
                        23.32.239.32
                        unknownUnited States
                        2828XO-AS15USfalse
                        104.17.25.14
                        cdnjs.cloudflare.comUnited States
                        13335CLOUDFLARENETUSfalse
                        IP
                        192.168.2.16
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1581029
                        Start date and time:2024-12-26 18:31:13 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:19
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        Analysis Mode:stream
                        Analysis stop reason:Timeout
                        Sample name:phish_alert_iocp_v1.4.48 - 2024-12-26T092852.527.eml
                        Detection:MAL
                        Classification:mal56.phis.winEML@22/14@66/245
                        Cookbook Comments:
                        • Found application associated with file extension: .eml
                        • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 52.109.32.97, 52.113.194.132, 52.109.89.19, 23.32.239.32, 23.32.239.83, 199.232.214.172, 172.217.21.35, 142.250.181.142, 64.233.161.84, 20.42.73.24, 172.217.17.46, 172.217.19.234
                        • Excluded domains from analysis (whitelisted): omex.cdn.office.net, slscr.update.microsoft.com, weu-azsc-000.roaming.officeapps.live.com, onedscolprdeus03.eastus.cloudapp.azure.com, clientservices.googleapis.com, eur.roaming1.live.com.akadns.net, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, osiprod-weu-buff-azsc-000.westeurope.cloudapp.azure.com, clients2.google.com, redirector.gvt1.com, login.live.com, officeclient.microsoft.com, ukw-azsc-config.officeapps.live.com, a1864.dscd.akamai.net, ecs.office.com, self-events-data.trafficmanager.net, fs.microsoft.com, accounts.google.com, ajax.googleapis.com, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, fe3cr.delivery.mp.microsoft.com, s-0005.s-msedge.net, config.officeapps.live.com, ecs.office.trafficmanager.net, clients.l.google.com, omex.cdn.office.net.akamaized.net, europe.configsvc1.live.com.akadns.net
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: phish_alert_iocp_v1.4.48 - 2024-12-26T092852.527.eml
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):231348
                        Entropy (8bit):4.379374987352812
                        Encrypted:false
                        SSDEEP:
                        MD5:89C81CD78AD3F8FD4B5D34D608112DF4
                        SHA1:56D8766B0328AD57BEED83B90FFCDF42A6F2232A
                        SHA-256:9628515EC92A763B57C6FFB86E30A684E8A77FB1F2617085E66AEAC7317F1972
                        SHA-512:C2E41FBD22627083BB667B5619C43BB27CF7AB1DDD297E771214549BC398AF46FD1D515E95AA321AA6C98DE7527A6F0D7046AFBEA21AA7193DA3DEA0449AAF98
                        Malicious:false
                        Reputation:unknown
                        Preview:TH02...... .....W......SM01X...,....4q..W..........IPM.Activity...........h...............h............H..h..o............h........pc..H..h\cal ...pDat...h &..0.....o....hDgH............h........_`Pk...h.yH.@...I.lw...h....H...8.Uk...0....T...............d.........2h...............k........P.r...!h.............. he..{......o...#h....8.........$hpc......8....."h.............'h..............1hDgH.<.........0h....4....Uk../h....h.....UkH..h.D..p.....o...-h .......<.o...+h.gH.......o......... ...... ..............F7..............FIPM.Activity....Form....Standard....Journal Entry...IPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000....Microsoft...This form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):322260
                        Entropy (8bit):4.000299760592446
                        Encrypted:false
                        SSDEEP:
                        MD5:CC90D669144261B198DEAD45AA266572
                        SHA1:EF164048A8BC8BD3A015CF63E78BDAC720071305
                        SHA-256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
                        SHA-512:16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC
                        Malicious:false
                        Reputation:unknown
                        Preview:51253fe60063c31af0d295afb42228b0:v2:2:1:1590:2:8479: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
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:ASCII text, with no line terminators
                        Category:modified
                        Size (bytes):10
                        Entropy (8bit):2.3709505944546687
                        Encrypted:false
                        SSDEEP:
                        MD5:5543AD0BB2ABCD3E3BD62CFB868CAA41
                        SHA1:36991CDEF094AB972D91B7C6969BE23D53E848BC
                        SHA-256:A7B36AFBC004786949CAAA92EBB48648B0501F5F549CEBBB46F8D54DB58323FA
                        SHA-512:168934B8F85D073FDBCAE020BC846343F138A90EA4688D607D74F5932ACB750EA46959DD8EBEC32FEA4D2F7F6E69E84960E07E87D1CDFA058091783C9560C1A4
                        Malicious:false
                        Reputation:unknown
                        Preview:1735234311
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:SQLite Rollback Journal
                        Category:dropped
                        Size (bytes):4616
                        Entropy (8bit):0.13700485453793962
                        Encrypted:false
                        SSDEEP:
                        MD5:202D17A8B7FD5EBCA934486106F30939
                        SHA1:4B1E14CA1C5BE23323F99B6D8FF5EC59BC7904A1
                        SHA-256:D96BC99F708C67A5D183B0E6CEE1DE6EBC207459B611E3D326D03C082CF16547
                        SHA-512:2744FA1FFCEF879F6C7386E79ABAAB9D594D23BB9091BDE46006E0539D805C154C2D1732DF80CE439297D27581462138BABB9705E30DBDA7A1AD579BABAF3DF2
                        Malicious:false
                        Reputation:unknown
                        Preview:.... .c.....a!......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ .......................................................................... .................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):2278
                        Entropy (8bit):3.835191362710633
                        Encrypted:false
                        SSDEEP:
                        MD5:9278635CD24104FA9FCBC3E5C5ABB81A
                        SHA1:231FC0BEC5F15B1272800170C5F381E3A327D44B
                        SHA-256:8684A16D9D7DFB488041C0C53F88C525B6CBD8338C4896DD97C9DD853F1BFBDF
                        SHA-512:C63A1336A6AC581BEFD022FCB9B23DA5B20914D70476B0D5E998F7E016192F26827F578BA4EAE2D35E8C4E1584CFCBF63EFD157E9416A692E7283C6F3AB5E8D8
                        Malicious:false
                        Reputation:unknown
                        Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".C.J.1.m.u.g.S.o.z.s.S.9.x.S.Z./.Q.v.O.c.+.E.J.4.u.2.c.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.M.J.Q.b.M.R.X.2.w.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.e.N.z.5.P.g.
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):2684
                        Entropy (8bit):3.9039378530777906
                        Encrypted:false
                        SSDEEP:
                        MD5:85882176915B9BE6F66DBF83E9094D6F
                        SHA1:3BE1ACF7E3863BCE7B02192DA3777C67AEA16F6B
                        SHA-256:6DEBB7C4A43C22B72C5B68CA3433E0C88E481541BC068E1E5ED1547F68CC1FC8
                        SHA-512:328852F1FE03594395FD98A91EE8E177D1473B31E90B2B794AD1D3E74BA26D883034AEC3843405B486BFF199B5F9AE0CEB1B2FB57079B9444254B7BF89AD3EEA
                        Malicious:false
                        Reputation:unknown
                        Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.H.X.L.G.R.5.H.j.D.k.3.C.i.F.b.L.a.m.K.N.+.n.c.g.T.0.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".2.h.T.H.g.4.1.2.3.A.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.e.N.z.5.P.g.
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):4542
                        Entropy (8bit):3.996623819886924
                        Encrypted:false
                        SSDEEP:
                        MD5:D3FCFBD399F33F36BC51524FE43713EC
                        SHA1:0D1990652B4029442FA644A3FEF3E44A977A369D
                        SHA-256:73C05256A5DEC2CC9C571BC75B653A54D7252766B5E7D9552063B8E46A7343E3
                        SHA-512:783ED6EE3F233751D73841419888241254114156491FC748DE675C22CDDCEF5B8CB9B48EC3365AF6699368940852E13A956F2061E7563331263D27A54A26E615
                        Malicious:false
                        Reputation:unknown
                        Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".V.q.Y.a.6.3.X.Y.9.b.4.Y.b.C.Z.g.f.0.u.y.E.6.v.n.x.e.w.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".F.e.B.X.U.r.x.X.2.w.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.w.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.e.N.z.5.P.g.
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):30
                        Entropy (8bit):1.2389205950315936
                        Encrypted:false
                        SSDEEP:
                        MD5:EC7E5735DB0FF1FB8080C0C6C93D4B81
                        SHA1:45AEC0A465D20A7AC0194621D5DFC0426540C0C3
                        SHA-256:D5269F4365A3374E980638D1FFA02982471DD5D428E8250DD2B5DCE0706CC46D
                        SHA-512:BE1E327FE8C3CB001CE0ED272788040AAA920E4C4A920E73A9A626237525F8345C0EF3951997628E8720F6D9BB115502B406F0E5033BB291885D4FD56E8691A9
                        Malicious:false
                        Reputation:unknown
                        Preview:....C.........................
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 16:31:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2673
                        Entropy (8bit):3.990986328337707
                        Encrypted:false
                        SSDEEP:
                        MD5:DFB1D0D8F4DD7613816B09052587FF4E
                        SHA1:964D00E4E68EE65721D0442D620F4BA53723D4DA
                        SHA-256:6CDE077E4800D61883F72B46BFEFC80A618F270E9C1C6EEF2132049B280AA6C2
                        SHA-512:C09A8CDEF9BC71582E4EF1FE538330D11D97174FCE15EAD9EEB335CF1D10F1384EFE9244A9A9DD47689C248A155E2143103F75074AC3999C7A35F2074262476E
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....%..W..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............7.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 16:31:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2675
                        Entropy (8bit):4.0079966334306105
                        Encrypted:false
                        SSDEEP:
                        MD5:2724EAA14EC57ABFAB93411C21938551
                        SHA1:83EB86691AB22F98FFF514F0755E1AD60BCA114C
                        SHA-256:BDE07BF01A72DE0E7C657068FB0777A1343667D10C2AA09B3169014F67084C04
                        SHA-512:897660033FDF1C104BE8E93CE61455E1AD4AB89AC4959DA1C438E171D196C5CC513CE8CE7A66845C57EB859047E1DF2A259FBEAA9AEF2C0961BED9A4E3349C2B
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.........W..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............7.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2689
                        Entropy (8bit):4.0138659957361735
                        Encrypted:false
                        SSDEEP:
                        MD5:40E7CE1D21D395C1AD7C6E046D12669D
                        SHA1:40A3A49D6B1E2CF8212496C83B12D7DDE69F621F
                        SHA-256:C728D88AFBD592D48420529009FCB5C7411909789540D3B63E5B0DCE85FF2625
                        SHA-512:39E425EBE4CFD2523E7AAD402E8AF3CCB3678342EA33B8D5AF10011F27DC9714BFD663B13179BAA64AA95174D4312D51BEDB38052955E891EFBC0540B2E6F116
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............7.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 16:31:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):4.004378096292921
                        Encrypted:false
                        SSDEEP:
                        MD5:CC92FDF9D5461EBF31BDFC67FA2D39F3
                        SHA1:8D3F06516FC34FBFA210B522AAE501061530EF73
                        SHA-256:885CF2E2F7A29717CE823846D602BE4DA8C04FE06AB862FCD5170306FEF0C561
                        SHA-512:FB287838199C3CF4A40D870AD7B73FBE019E4648FF9188020140C91A72047099F59223127401921260EEC119115C6A6DD60D2BB26A75FCD9625240E570E55F05
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.........W..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............7.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 16:31:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):3.9929029926805044
                        Encrypted:false
                        SSDEEP:
                        MD5:E57CD870E615D6BDFD80A42F5C691BC4
                        SHA1:925C5FABFFD7EAC03BE4F9724F50B3E1E2F556C3
                        SHA-256:5711866987C97740A716C7AE1EC603075723E76E746EEFFC23E0010FE244DF00
                        SHA-512:B420612A08D0336A87363DD3383F2D63435DD4F478885FA1D38713A0451D20C7FD13225E19B31559EFC9FDCF2E99E5614A9D7926D5055D56321B4DFEEFCFCE09
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.........W..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............7.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Dec 26 16:31:55 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2679
                        Entropy (8bit):4.001612428113756
                        Encrypted:false
                        SSDEEP:
                        MD5:63DE1C7421CCC3821177A7A1D16D0AA3
                        SHA1:15894992DFA42604117861F98F66497B9AB41351
                        SHA-256:77087965B7747154E3827619DD34D4BA523EAE8AD37838BE7268C486E90822BF
                        SHA-512:E56B594C0D7B388E7D17F328C0066C5AB9B4882710B965B73AA2DFE2817FFB5C49DA1C86C9987CF7DFFD0C327C810C25D57DA01E7F8B1D9855BAE2A0BA502C1E
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....`...W..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Y.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.Y......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.Y......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.Y............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.Y.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............7.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        File type:RFC 822 mail, ASCII text, with very long lines (347), with CRLF line terminators
                        Entropy (8bit):5.997152883491494
                        TrID:
                        • E-Mail message (Var. 5) (54515/1) 100.00%
                        File name:phish_alert_iocp_v1.4.48 - 2024-12-26T092852.527.eml
                        File size:22'158 bytes
                        MD5:883b7e911fcc52e10fb6d271f089c048
                        SHA1:880b48629a256f394057bd33a2281027699318c4
                        SHA256:d50f668293b2584907b7cbbb6bc7051c4869f77ff4abd87ce9f44f70ab80bbb9
                        SHA512:0f0eea6f67f258eaa1d651dcc35944c24509f11dd8c77b8010bc75b8a884bb088af8fcf57ebe904a85bf40c71f8b6ebc9d8b5fa3b526de781bc401d8b636f2b2
                        SSDEEP:384:w6EUYMCkPWhWn2+E1UMI1DFdr1ubJ39ziyjOPvq30leYHG5amHq29dyZ8kN21:w6EUYhkPKWn2+E1UMItFo59eneiy9sST
                        TLSH:C8A23BE255115C3AF86222C83F057ACE7562368F9DF2F8E4BAE871450E8F8653716BC1
                        File Content Preview:Received: from PH7PR22MB3063.namprd22.prod.outlook.com.. (2603:10b6:510:136::6) by BY1PR22MB5438.namprd22.prod.outlook.com with.. HTTPS; Mon, 23 Dec 2024 15:22:54 +0000..ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;.. b=CURht4
                        Subject:Initial CD - Preliminary Closing Fees & Closing Package
                        From:United Wholesale Mortgage <mail@mailsharedfiles.com>
                        To:David Flores Juarez <dflores@FirstFedWeb.com>
                        Cc:
                        BCC:
                        Date:Mon, 23 Dec 2024 07:22:41 -0800
                        Communications:
                        • [EXTERNAL EMAIL: Take caution with links and attachments. ] You have received a secure message from United Wholesale Mortgage. You can view, download, or reply to the secure message by accessing the secure message portal. Please access the link below to view the Preliminary Closing Disclosure Click Here for Preliminary Closing Disclosure <https://clicktime.cloud.postoffice.net/clicktime.php?U=https://link.edgepilot.com/s/0c7b6dd9/YttwOn4s_EGCA5oG36v4XA%3Fu%3Dhttps://tn.dtrkr.com/clicks/html/6c4b459b-bcdb-5e81-ab30-6f9b8fb1b5c5/f200027a-b985-5f4e-9eac-8685552af170/d98b067a-a668-555d-b90f-9938b40c0c51%3FurlChildId%3D34cf256f-5afd-5e5d-9291-b284249e6f91%2526templateId%3D912cc7bf-c27d-42d7-94ed-d1d9422c9bb5&E=dflores%40firstfedweb.com&X=XID184CLwPwr1573Xd1&T=FF1001&HV=U,E,X,T&H=8b2c1950e0d10c463b6b088e1c487be5d15107fd> DO NOT FORWARD THIS EMAIL. THIS LINK IS SPECIFIC TO YOUR EMAIL. ****************************************************************************************** CONFIDENTIALITY NOTICE Confidentiality Notice: This e-mail and any document(s) attached hereto this transmission contain confidential information belonging to the sender which is legally privileged. The information is intended only for the use of the individuals or entities named above. If you are not the intended recipient, you are hereby notified that any disclosure, copying, or distribution, or the taking of any action in reliance on the contents of this e-mailed information is strictly prohibited. If you have received payoff this e-mail in error, please immediately notify the sender by e-mail at the address above. The transmission is to be deleted and any items that have been printed are to be promptly destroyed. Thank you for your compliance. ******************************************************************************************
                        Attachments:
                          Key Value
                          ReceivedMon, 23 Dec 2024 07:22:54 -0800
                          ARC-Seali=1; a=rsa-sha256; d=silversky.com; s=silversky-20150623192408; t=1734967367; cv=none; b=AmjQG2/OUrsyYOrK+0ehdaMqu9vklVGnODYGOas3HOfXczzM7UBVNQhSGfuqzHgVRUhn8kUiETa9fMIfGiu8oQ2USeZuobhJhTMKC4zuKBTzMLB/u9DHQEYJycT5AwXvRddhLPtDT97p2ttVfIDqiBzBMB8gL9dDCmYQCXeoGtg=
                          ARC-Message-Signaturei=1; a=rsa-sha256; d=silversky.com; s=silversky-20150623192408; t=1734967367; c=relaxed/simple; bh=9yqLayb78RhoXwV+PNAVrjT93M1gXWzx9B61qACG0eo=; h=From:To:Subject:Date:Reply-To; b=BtDDyLlSxIVYySdIOD8islH9pNgXYxjEghI8bzmhKk3qeqQ1IApeTHte4SB9E6Em0VRMkmVfAptsE0Q6QSrTAOMB55ZTsnpcnl6htwYAthwJhnAp6pgaRedU0JvwMhXnSoWqtgdFcYSj5mmzkM7q6N+iQPNj/8Bv5XyyXLFpiEo=
                          ARC-Authentication-Resultsi=1; gwsin.silversky.com; dmarc=pass policy.dmarc=none header.from=mailsharedfiles.com; dkim=pass header.d=mailsharedfiles.com; spf=softfail smtp.mailfrom=mailsharedfiles.com; arc=none smtp.remote-ip=54.37.206.16
                          Authentication-Resultsspf=softfail (sender IP is 165.212.64.87) smtp.mailfrom=mailsharedfiles.com; dkim=fail (body hash did not verify) header.d=mailsharedfiles.com;dmarc=fail action=none header.from=mailsharedfiles.com;compauth=none reason=405
                          received-spfSoftFail (protection.outlook.com: domain of transitioning mailsharedfiles.com discourages use of 165.212.64.87 as permitted sender)
                          X-USANET-Receivedfrom emd1.mbox.net [165.212.64.8] by gws4.mbox.net via mtad (GIT.BUILD.5.0.3133) with ESMTP id 810CLwPwr5040Ms4; Mon, 23 Dec 2024 15:22:43 -0000
                          Authentication-Results-Originalgwsin.silversky.com; dmarc=pass policy.dmarc=none header.from=mailsharedfiles.com; dkim=pass header.d=mailsharedfiles.com; spf=softfail smtp.mailfrom=mailsharedfiles.com; arc=none smtp.remote-ip=54.37.206.16
                          X-USANET-Routed100 IN-RELAY R:gwsin-int:625
                          X-USANET-GWS2-Servicegwsdin-tap preclick-never
                          X-USANET-GWS2-Tenantfirstfedweb.com
                          X-USANET-GWS2-TagidFF1001
                          X-USANET-GWS2-MailFromDnsResultDnsFound
                          X-USANET-GWS2-SecurityTLSv1.2;ECDHE-RSA-AES256-GCM-SHA384
                          X-USANET-Source54.37.206.16 IN mail@mailsharedfiles.com mail1.mailsharedfiles.com TLS
                          X-USANET-MsgIdXID184CLwPwr1573Xd1
                          X-BAEAI-Trust-Score38
                          X-BAEAI-Trust-ReasonsSNDRAUTH; RISKCTRY,FR; PRIORITY; SNDRFRG,mail@mailsharedfiles.com,,dancairds@hotmail.com; SNDRNEW; DOMRARE,mailsharedfiles.com; ADRNMFRG,United Wholesale Mortgage,mail@mailsharedfiles.com;
                          DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; s=dkim; d=mailsharedfiles.com; h=From:To:Subject:Date:MIME-Version:Message-ID:Reply-To:Content-Type: Content-Transfer-Encoding; i=mail@mailsharedfiles.com; bh=+CQ3FQ3FNJejbu5Ud5KZKqjOfXxjWqsOo3jCDQ3vXRE=; b=FxWEbpPXp2SIjnCCtJiLA8kpbdmz2grL1hnqZxA9JNlw0WENejZ9v7j1K1UPioZstX+IvpbMJjtb ON2NAmn27jVCr+RpLjIzFwI+1KAG7BPEOZpgg8ceRzuV1SNZ4N/QEPe6OP7UyRiC4CDdc9l9bX2G OQTRiH9p4ls0nmFUgYY=
                          Priorityurgent
                          X-MSMAIL-PriorityHigh
                          X-Cloudmark-Trackerv=2.4 cv=ca4ZrWDM c=1 sm=1 tr=0 ts=67698044 cx=a_idp_d a=+/SBwolCgdKo/LtNl54R2g==:117 a=+/SBwolCgdKo/LtNl54R2g==:17 a=sOJR9YGeF0cA:10 a=IkcTkHD0fZMA:10 a=RZcAm9yDv7YA:10 a=x7bEGLp0ZPQA:10 a=_DxrebNOIgkA:10 a=A2RLBPx3AAAA:8 a=wn_MUmMPAAAA:8 a=38Kf1y_YHt2LPHuxtb4A:9 a=KKNPBEW0u9bGaWe2:21 a=_W_S_7VecoQA:10 a=QEXdDO2ut3YA:10 a=Tvw6_0SZ_1tDLoUewa5I:22 a=TUQPv6SnwjMQU6QbbJBM:22 a=EgDy6sOQo090nexKAJiY:22
                          X-LASED-VersionAntispam-Engine: 5.1.4, AntispamData: 2024.12.23.145146
                          X-LASED-SpamProbability0.206607
                          X-LASED-SpamNonSpam
                          X-LASED-HitsBODYTEXTH_SIZE_10000_LESS 0.000000, BODY_SIZE_2000_2999 0.000000, BODY_SIZE_5000_LESS 0.000000, BODY_SIZE_7000_LESS 0.000000, CTE_QUOTED_PRINTABLE 0.000000, CTYPE_JUST_HTML 0.500000, DATE_TZ_NA 0.000000, DKIM_ALIGNS 0.000000, DKIM_SIGNATURE 0.000000, FRAUD_WEBMAIL_R_NOT_F 0.100000, FROM_NAME_PHRASE 0.000000, HREF_LABEL_TEXT_NO_URI 0.000000, HREF_LABEL_TEXT_ONLY 0.000000, PRIORITY_HIGH 0.000000, PRIORITY_NO_NAME 0.716000, PRIORITY_URGENT 0.000000, REPLYTO_FROM_DIFF_ADDY 0.100000, SENDER_NO_AUTH 0.000000, SINGLE_HREF_URI_IN_BODY 0.000000, SINGLE_URI_IN_BODY 0.000000, SUPERLONG_LINE 0.050000, URI_WITH_PATH_ONLY 0.000000, WEBMAIL_REPLYTO_NOT_FROM 0.500000, X_MSMAIL_PRIORITY_HIGH 0.343000, X_PRIORITY_HIGH 0.000000, __ANY_URI 0.000000, __BANNER_TRUSTED_SENDER 0.000000, __BODY_NO_MAILTO 0.000000, __BODY_TEXT_X4 0.000000, __CLICK_HERE 0.000000, __COURIER_PHRASE 0.000000, __CT 0.000000, __CTE 0.000000, __CTYPE_CHARSET_QUOTED 0.000000, __CTYPE_HTML 0.000000, __CTYPE_IS_HTML 0.000000, __DKIM_ALIGNS_1 0.000000, __DKIM_ALIGNS_2 0.000000, __FOOTER_DISCLAIMER 0.000000, __FRAUD_URGENCY 0.000000, __FRAUD_WEBMAIL 0.000000, __FRAUD_WEBMAIL_REPLYTO 0.000000, __FROM_DOMAIN_NOT_IN_BODY 0.000000, __FROM_NAME_NOT_IN_ADDR 0.000000, __FROM_NAME_NOT_IN_BODY 0.000000, __FUR_HEADER 0.000000, __HAS_FROM 0.000000, __HAS_HTML 0.000000, __HAS_MSGID 0.000000, __HAS_MSMAIL_PRI 0.000000, __HAS_REPLYTO 0.000000, __HAS_X_PRIORITY 0.000000, __HREF_LABEL_TEXT 0.000000, __HTML_AHREF_TAG 0.000000, __HTML_BOLD 0.000000, __HTML_TAG_DIV 0.000000, __HTML_TAG_TABLE 0.000000, __HTTPS_URI 0.000000, __LINES_OF_YELLING 0.000000, __MIME_BOUND_CHARSET 0.000000, __MIME_HTML 0.000000, __MIME_HTML_ONLY 0.000000, __MIME_TEXT_H 0.000000, __MIME_TEXT_H1 0.000000, __MIME_VERSION 0.000000, __PART_TYPE_HTML 0.000000, __PHISH_PHRASE4 0.000000, __PHISH_SPEAR_SUBJ_PREDICATE 0.000000, __RCVD_FROM_DOMAIN 0.000000, __SANE_MSGID 0.000000, __SINGLE_URI_HTML 0.000000, __STOCK_CRUFT 0.000000, __SUBJ_ALPHA_END 0.000000, __TAG_EXISTS_BODY 0.000000, __TAG_EXISTS_HEAD 0.000000, __TAG_EXISTS_HTML 0.000000, __TAG_EXISTS_META 0.000000, __TO_MALFORMED_2 0.000000, __TO_NO_NAME 0.000000, __URI_HAS_HYPHEN_USC 0.000000, __URI_IN_BODY 0.000000, __URI_NOT_IMG 0.000000, __URI_NO_MAILTO 0.000000, __URI_NO_WWW 0.000000, __URI_NS 0.000000, __URI_REDIR 0.000000, __URI_WITH_PATH 0.000000, __X_MSPRI_HI 0.000000, __X_PRI_HI 0.000000
                          X-LASED-ImpersonationFalse
                          X-Sophos-Tracker0.206607 fd087a2109dab29c9ed2bf38ec78d2cdefb00f6a
                          X-BAEAI-Source-GeoIP"FR" "N/A" "N/A"
                          X-BAEAI-SPFSOFTFAIL
                          X-BAEAI-DKIMPASS
                          X-BAEAI-DMARCpass
                          X-SilverSky-ARCnone
                          X-BAEAI-Authentication-Ratingstrong
                          X-BAEAI-Trust-Levelamber
                          x-usanet-tap-score0
                          Return-Pathmail@mailsharedfiles.com
                          X-MS-Exchange-Organization-ExpirationStartTime23 Dec 2024 15:22:48.7288 (UTC)
                          X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                          X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                          X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                          X-MS-Exchange-Organization-Network-Message-Id e625ccb8-88f8-4ea6-0c91-08dd2365a8cf
                          X-EOPAttributedMessage0
                          X-EOPTenantAttributedMessage3778f0b2-789a-4d43-b25e-d4fe25a4c3c0:0
                          X-MS-Exchange-Organization-MessageDirectionalityIncoming
                          x-ms-publictraffictypeEmail
                          X-MS-TrafficTypeDiagnostic BL6PEPF0001AB76:EE_|PH7PR22MB3063:EE_|BY1PR22MB5438:EE_
                          x-ms-exchange-organization-authsource BL6PEPF0001AB76.namprd02.prod.outlook.com
                          x-ms-exchange-organization-authasAnonymous
                          X-MS-Office365-Filtering-Correlation-Id e625ccb8-88f8-4ea6-0c91-08dd2365a8cf
                          X-MS-Exchange-AtpMessagePropertiesSA|SL
                          X-MS-Exchange-Organization-SCL-1
                          X-MS-Exchange-Organization-BypassClutter$true
                          X-Microsoft-Antispam BCL:0;ARA:13230040|5062899012|12012899012|3072899012|2092899012|82310400026|8096899003;
                          X-Forefront-Antispam-Report CIP:165.212.64.87;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:NSPM;H:postin03.mbox.net;PTR:postin03.mbox.net;CAT:NONE;SFS:(13230040)(5062899012)(12012899012)(3072899012)(2092899012)(82310400026)(8096899003);DIR:INB;
                          X-MS-Exchange-CrossTenant-OriginalArrivalTime23 Dec 2024 15:22:48.5882 (UTC)
                          X-MS-Exchange-CrossTenant-Network-Message-Id e625ccb8-88f8-4ea6-0c91-08dd2365a8cf
                          X-MS-Exchange-CrossTenant-Id3778f0b2-789a-4d43-b25e-d4fe25a4c3c0
                          X-MS-Exchange-CrossTenant-AuthSource BL6PEPF0001AB76.namprd02.prod.outlook.com
                          X-MS-Exchange-CrossTenant-AuthAsAnonymous
                          X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                          X-MS-Exchange-Transport-CrossTenantHeadersStampedPH7PR22MB3063
                          X-MS-Exchange-Transport-EndToEndLatency00:00:05.6883039
                          X-MS-Exchange-Processed-By-BccFoldering15.20.8272.000
                          X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
                          X-Microsoft-Antispam-Message-Info PR39XpSaNJh1Y7SRDxziv/2ybZ6TPpnYHYX3a9zUfPMpqIJmnzDYeSI3mnOlIUlWX/Qis8a2MY6jcwfle/euhBZ4947FbItPgxPUPUh0YjgKxhGX2HRM2Xtnzchobr2IC+H6O0VIc83CvnqaEJdxGnXFtzSw+Zpz04we6PeqhHQVLYBryffQSRkKm2KjfPE1ZOqOoRDVSmLKkUvT+psgSKbJ/rTd7Mi3FI2fH79Sxe4XKkz9vLWcqHNx20v+jmXE3LDB3uDdllU4ESZH0WxAJDtiBJHaASJtZAjKW3Nuk0JHT9Hi4br27ciDchaOIkXVT7Sj24y9hsqjiyiWpG4V6egA8gtJk3wJWT2AHz+wbNGSoeVdbiSMA8P15ASMGiwIV+0u4k8V2SPYjOgXEqMlAZkRJHrZB017HXJakMOn6DjGBT9vFGo33XkQJ7RchSFIk/i4spB2KSScL7Zdp3EfqqhSw5JQ6M6jeDfc59d9eKsI2PO2/oC4pHNJXarrmluuZfU4cByxCzN0LDaSc8SZjvX/COKPUexiNo6XWDMAfnw8gN6gquiyVOsf9erJT0Ja5wPJKD7n4B3Og62jaKlDZb5Gcw1DhMvLjUVErvIb4tMqVuSq6UuR2MUW8BGoA6jzFJPF2ZfWTMv6c9fbaqZXKV9wuAgSJfaYMQfOBxCJVYHiX+a3BSptuA6O4sIOIrA76emBurKfCY4xr9nMhL5wAd9zCP5nsbZ2PQiGlThCytGGDx9Q0m3+DMtN1xvx1jUGD9j69dvdGdnJNRPNZMjS1aO665kHisI2l8K2JTd7ZT1UMje2HdAVrm3UJTtqI68mosf8vB/jHZwMntoFG2DAF3mGvZFbWceZv5mn7UjxhT+CsA8DKGH3yrTOsydweaze+In42UIwqMCpDczOLLqv565zY06As6+ayLFkhQcVc952Jvvt8mTaKj+f4G+TsLET0Xgo3YXTk1Zct3NU8MNT5ABh58YQAKhqt3xEnEq6PKSADcchVCerA/7xF37fTRQ0fNxc/LbLPfjaIzzHxMSxTwh75PdUSe+Abaizz4vJHJgyI46P2fWkaejmJEJNoEBsOhwQd0FwEkNdZPksFCQEW22pO9BfupaWmHngrKzIksxdam/D2ar/zSixfiWTgNCUd5hMEVSvENXgJUXe/uWw0qEtzignnnmt0OM+9rugXJYUP7Ek6ao8oM1FIb2bScWtuYwUhTI3ENpdpRFIvxLwYY0scjgYZ1XluQrEwuszNIH/1Le1la0ihxnIBBvdSIUyHwpL960RcYA+zqyFVAVEWzOoQ5Q/YgGha+TZYx7rXOoqMd7vM3OAYT8KijEfDBMjk/dSTjPJnrRMo16sVPvlH6kJrtpjQ/DOkwKsJ/P9Vs4ljGUT57qAgG1gy9R3fVA1tFnJuiBiYeWZJpDp8OD3z6Z0gzrEuuSEMxk5j3bq82fNM/QopD944Z6V8nopqkPQGqKFldKnTFPSGXf3RaYP0ek9BEkmp1pR+fZS0fsi7WLw9U5s0wGffBdlWgJyloZI8pPGRTv7D5eVuwp4KCCEMkiYtt1n+Lchp/nMffbWkZwb1U3szYrqGRy/BAdirZ03mtn9BTd+MNsk1gPjAjcy2Yq9OreoEl0RlPmsb1mps0F8pttVuE9GX7ENiUHDqA7EpbCkVTzqq2IDHgtigHiD3jHzvAEVtF/mk61vRPSTRIV7ggrVDdFddxBAv4EE+Pds0AznJVqPiXe7td7Y9fAAnPL1S9VS+ShIyrrH4MwPwKOphryaMBgGmEcUCOz9Jr9vgZdQG8BmHagw6rsiBSMVFijT6v7z6raCgikeCU/AztJmf4DzbEj1xsW/h5/9Txrj8CmO4rGQw6a1YFcln8DimeMSLin3GqNsqYVOeApITcvdH4WO7UfjIVa6xoyU4ZB/jhIQXvihWIcdQWPKtmULs2RApVo/zcsEGI4xlvrd2zIrsqkRo21NIZWTQQnKCehAZlOLitgvydfbV4G04S6+XgvzVR82R7eHk3o7IO70/LNM7mkTWdjCViwW4rCi1OhKlGGdG/zsP0AIMQEHYyBXif2qQ4s8+3bzZgrQx//aziK9K860mhvWoNVDgSo+H4sINQvohee9pvdtqJgNaRWI+mzA1C9iJMymcTQBBNZFjpeKcIV6o2zftU4UNqWrqMj5VROLheplnPLFYlq34t+PximD/Vf+KE3ku2cPtMt8Rb24lSV9gRy2htY4SJppiP24pIexsBUT91cH+vqnkpRqNea9PsII0rKQP3hiZbYjL1fDCpja9ELKQ8/lEabxsBN4PB5Z6RDuZeQoirKW7nl58sLedN3MZ/4V7cyLKHJXbKT33ieWAgpfpxqb2/PGp9a9stIYOgWnG6C1uFkWhl8icBv3gpG0aTjlhoIRvxBOTKmXr5oPe9OnskrhooqixMwi2+f9pOncr7QAjkwn0nAH340kDC7uOnIC2xdQaiNLVI93M2p6xJXmajxc612EiQiQ+J2MHypqynqu6cVVb8QVrTXHeBOFUQFCDZTBavcUy3Dcbo+58VADCKRroeJrMcPv++NBjUOjRgdUy4zKO8ZOQKtG2GrlJ4LGWjLKiKp/2UvUTDmemKykDRGyXbRfiN8BxMP+J7pbL15E9gb9XqQ5NOe4J1niNzXjhw/uqJV8lEFiTHv5j4C2HTOPilP3NB/SFkZ6aPqnhsF/6m/bimtp9zBxNWo9THD7FHl/CpYDCueCM8ISvt8+O/rUr+I0uK5kanhjljeHPINJBzyZQCcj0NTGEsUsLrBXYO7MD+B94FeL3I9S+60g3lqOUFdPGPULBf7yrDwBpkc1ZITxLEyA5ByzP251UYrcbCd7N/Da6hII1+sL/0TsshXvXmqOqZjxbJ2iLmbLXnOCaCR2hpY2IWqi+K1Hq/D23J3HgSo3IL7a+RqoaWAKt02cOJscOnht7CWm226N1zxkXMBnt+3chHivksyr1dUPXnLjrTl89Wqjf80Ha+Tw6QXXThB4WoomTJa3UOmm9WetISX6h39tgA==
                          x-ms-exchange-organization-originalclientipaddress165.212.64.87
                          x-ms-exchange-organization-originalserveripaddress10.167.242.169
                          X-Priority1
                          X-MSMail-PriorityHigh
                          Thread-IndexAQHbVU6JUd2LP2xIfkaUpNz4yVdgwQ==
                          Message-ID <1734965777f7baa4c42ba09c93fe15a279ebf2dbc1_179992@mailsharedfiles.com>
                          FromUnited Wholesale Mortgage <mail@mailsharedfiles.com>
                          ToDavid Flores Juarez <dflores@FirstFedWeb.com>
                          SubjectInitial CD - Preliminary Closing Fees & Closing Package
                          DateMon, 23 Dec 2024 07:22:41 -0800
                          Reply-To"dancairds@hotmail.com" <dancairds@hotmail.com>
                          MIME-Version1.0
                          Content-typeMultipart/alternative; charset="utf-8"; boundary="00B0FEED_message_boundary"
                          Content-DescriptionMultipart message

                          Icon Hash:46070c0a8e0c67d6