Windows
Analysis Report
Message.eml
Overview
General Information
Detection
Score: | 48 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
OUTLOOK.EXE (PID: 5060 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\De sktop\Mess age.eml" MD5: 91A5292942864110ED734005B7E005C0) ai.exe (PID: 7856 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "592 371A3-070E -4F29-A9F9 -6773D99E3 5AC" "2C98 0A41-FEAC- 442C-BE35- F520B69501 7A" "5060" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
- • Phishing
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: |
Source: | Classification: |
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Key value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 11 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Modify Registry | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | 12 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-0005.dual-s-msedge.net | 52.123.128.14 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1625915 |
Start date and time: | 2025-02-27 19:59:44 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 33s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Message.eml |
Detection: | MAL |
Classification: | mal48.winEML@3/4@0/0 |
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, d llhost.exe, WMIADAP.exe, SIHCl ient.exe, conhost.exe - Excluded IPs from analysis (wh
itelisted): 52.109.76.240, 13. 69.116.108, 52.149.20.212, 52. 123.128.14, 13.107.246.60 - Excluded domains from analysis
(whitelisted): ecs.office.com , slscr.update.microsoft.com, otelrules.azureedge.net, prod. configsvc1.live.com.akadns.net , mobile.events.data.microsoft .com, onedscolprdweu15.westeur ope.cloudapp.azure.com, fe3cr. delivery.mp.microsoft.com, neu -azsc-config.officeapps.live.c om, dual-s-0005-office.config. skype.com, config.officeapps.l ive.com, officeclient.microsof t.com, ecs.office.trafficmanag er.net, europe.configsvc1.live .com.akadns.net, mobile.events .data.trafficmanager.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtQueryAttributesFile calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-0005.dual-s-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 110592 |
Entropy (8bit): | 4.535944479518242 |
Encrypted: | false |
SSDEEP: | 768:8dtR14R/xBS5ujHaBLpD4B/9mFMEdRVSWTWpWuWyQ7x0WHk9VXb782PV8GPux+TK:8v4B/9mFZmQ7x0WHk9VXvqgCl |
MD5: | 023D0943EC328D2935C515120527A71C |
SHA1: | 4B896DF9C0FDAC0284ACE8F50B3DEA976F7B1610 |
SHA-256: | 941CD46939AB4AFC03532B3C711EEF4723CC600EBD65E63947A13FD244858374 |
SHA-512: | 2F844B825EB8CE391A35CF7302B67D35843393239602D1165CCF4C1ED14F76E095C5A6B163208A4384FB80DBCC16D974D5E7FCA5E974E5038CD45137D62B04A4 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 119019 |
Entropy (8bit): | 7.886637436432704 |
Encrypted: | false |
SSDEEP: | 1536:mrecZjd62JpF9M+L9jhgOsgJz7cd2TxdciTU00K3POhZO2lEQtVtR+/rCW8HkRu8:mxzn7mHAzYdtIVaO2lwDEBcUvID |
MD5: | 005CFFE11AB5428D4F107C9E8513F123 |
SHA1: | C8C8FEF49B6625503C01A627AF531B8F91329A5D |
SHA-256: | 46648B87651C707E8D4360EAA90CCF280BCDCBEAFEC57685BB9A310227E65B51 |
SHA-512: | CFB8D818DA7020643DBC344D4B2214D13A8ED35756F24D8D78B6773BE28D153959A0A6269C170B1D94AB17DDFC6D6A3C22EC6C638D17407797A094AFBE80B3A5 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2302976 |
Entropy (8bit): | 2.210346313304643 |
Encrypted: | false |
SSDEEP: | 6144:hqe8sXcEFRhK6hzjRDWFMeqPveBUsnoFncCNu1LpBkx9NKjL:cssEFnXRDduvoFcB1Lfkx94 |
MD5: | 6689DBDEA785DB61F6955F2645EC4425 |
SHA1: | 81654ACDC9669796236095C82243997D3D8962D7 |
SHA-256: | A657385CAF60592BE528EC913FC5989797EAD5981C961F8783E6F1D80CA928A7 |
SHA-512: | 1739549D38A61D05D4D801FB0B03FCA461C6B5D16138E630A8CF6F31D9C01B83457107A7019FE52C7A76BD06D407D970A68BF31098BB1AA36BAB736EE4B162FB |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 524288 |
Entropy (8bit): | 6.75184273770098 |
Encrypted: | false |
SSDEEP: | 6144:K8qWLs3lPFEZeXhJuJDoFXezqW35sJYFHcNpucLNBkxK:KEsVPFKzJDj1y6F8KcLTkx |
MD5: | 6F0279BF99E53DC0DA017D5B0A6E8ABF |
SHA1: | DDA9F316F70135A707135C5991C08B45DF648489 |
SHA-256: | E87DC298EBDCEFEDECC45F8C061C7445A153DBAF8BAFB4D8DE24D6C9ECF47380 |
SHA-512: | AFD5C4EF3D812E5EB99A587021111BDE876C894E8B0261F5A68B44ECD6818ACA1AA927F986FD6E2E7D5FD755CD27B08FDA20B2B9456D27C287687D61E2D71FEB |
Malicious: | true |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.05615243172973 |
TrID: |
|
File name: | Message.eml |
File size: | 515'713 bytes |
MD5: | c15590a6b60ac428d86530513abd37f5 |
SHA1: | 642621b07bbe361eb19e63fc892bf8188755bd12 |
SHA256: | 7e0df8b8070421dfad58080b3e928589bebcf192451a2c6df5f460b1f887a838 |
SHA512: | da3f45c890a0631d653f4c2d6b9956211b2a1c3b6431d7bab56bc5bc169b5f30242f92101d992035e158294c3c93b5f9de43c484b006645e1fcb2f8adcf0d935 |
SSDEEP: | 12288:uX6Rc38JAaUJNhtYPqrTTYSjp6F6SDv2HQo12ukmkml:XWWoJ7fTTYSjsF6Go1Neml |
TLSH: | 05B4D06BDC1200E27360A39F9F1BDC4710973D2F195BDAEAB36D470891B477AA23485E |
File Content Preview: | ..."Received: from YQBPR0101MB6650.CANPRD01.PROD.OUTLOOK.COM (::1) by.. YT2PR01MB8839.CANPRD01.PROD.OUTLOOK.COM with HTTPS; Thu, 27 Feb 2025 17:34:45.. +0000..Received: from YQBPR0101CA0296.CANPRD01.PROD.OUTLOOK.COM.. (2603:10b6:c01:6d::22) by YQBPR0101MB |
Subject: | Executive Brilliance Hub INV #20583244 Illuminate Ideas, Elevate Leadership |
From: | Michael Sadler <vito.ranieri@uniba.it> |
To: | wendell.satney@translink.ca |
Cc: | |
BCC: | |
Date: | Thu, 27 Feb 2025 17:31:53 +0000 |
Communications: |
|
Attachments: |
|
Key | Value |
---|---|
"Received | from YQBPR0101MB6650.CANPRD01.PROD.OUTLOOK.COM (::1) by YT2PR01MB8839.CANPRD01.PROD.OUTLOOK.COM with HTTPS; Thu, 27 Feb 2025 17:34:45 +0000 |
Received | from [127.0.0.1] (unknown [84.17.46.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: sarah.ismail) by smtp.uniba.it (Postfix) with ESMTPSA id 0C890400ED31 for <wendell.satney@translink.ca>; Thu, 27 Feb 2025 18:31:54 +0100 (CET) |
Authentication-Results | spf=pass (sender IP is 193.204.176.23) smtp.mailfrom=uniba.it; dkim=pass (signature was verified) header.d=uniba.it;dmarc=pass action=none header.from=uniba.it;compauth=pass reason=100 |
Received-SPF | Pass (protection.outlook.com: domain of uniba.it designates 193.204.176.23 as permitted sender) receiver=protection.outlook.com; client-ip=193.204.176.23; helo=wolf.uniba.it; pr=C |
X-Virus-Scanned | amavisd-new at uniba.it |
DKIM-Filter | OpenDKIM Filter v2.11.0 smtp.uniba.it 0C890400ED31 |
DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=uniba.it; s=20241030; t=1740677517; bh=2QxI1ipi8A7IztzQY2S+qxUZyWV67QY/HWSqVQfmEsA=; h=From:To:Reply-To:Subject:Date:From; b=Q+HDNXe7izCgHUjfshMAjud7Hm9N9aBvRbNEAmrPSOePeE+XL9lVaPgjz16xZqO/V 0UI3MeoFpsoX5Ruzsqq6enIgIdVpYYjuXKz9H8eyBsRFqMuVbLc9zwSsu2qjlYUDSF mUHE+h3VD3xgKGdIgwK9pF7Nq/rNRs7upnNCtwtAjmCagiMi6lcaVVjtQDcYCK2Mbs Xct1m9ZKVmvCXXpUhAvNTIad0slqL+8JzgE9V+uFQta553Yg9TVTZhlortTxxG/kz4 3chVfdyUpEkwxXFTYeR7FaIwZIQ00R5LKnVWHskb9Z0mCN7udFpew1YmKAgF48/8eL Onk9NIFSjlEww== |
From | Michael Sadler <vito.ranieri@uniba.it> |
To | wendell.satney@translink.ca |
Reply-To | Michael Sadler <Pariveda.Receipts@consultant.com> |
Subject | Executive Brilliance Hub INV #20583244 Illuminate Ideas, Elevate Leadership |
Message-ID | <96187892-5448-1267-603f-ee2befec6d80@uniba.it> |
Date | Thu, 27 Feb 2025 17:31:53 +0000 |
Content-Type | multipart/mixed; boundary="--_NmP-f77e3dace00be1c3-Part_1" |
Return-Path | vito.ranieri@uniba.it |
X-MS-Exchange-Organization-ExpirationStartTime | 27 Feb 2025 17:33:56.4440 (UTC) |
X-MS-Exchange-Organization-ExpirationStartTimeReason | OriginalSubmit |
X-MS-Exchange-Organization-ExpirationInterval | 1:00:00:00.0000000 |
X-MS-Exchange-Organization-ExpirationIntervalReason | OriginalSubmit |
X-MS-Exchange-Organization-Network-Message-Id | a89080ba-76a1-46a5-9d20-08dd5754e998 |
X-EOPAttributedMessage | 0 |
X-EOPTenantAttributedMessage | 4157b39d-533a-41f7-8314-898c4d2ff33b:0 |
X-MS-Exchange-Organization-MessageDirectionality | Incoming |
X-MS-PublicTrafficType | |
X-MS-TrafficTypeDiagnostic | QB1PEPF00004E0E:EE_|YQBPR0101MB6650:EE_|YT2PR01MB8839:EE_ |
X-MS-Exchange-Organization-AuthSource | QB1PEPF00004E0E.CANPRD01.PROD.OUTLOOK.COM |
X-MS-Exchange-Organization-AuthAs | Anonymous |
X-MS-Office365-Filtering-Correlation-Id | a89080ba-76a1-46a5-9d20-08dd5754e998 |
X-MS-Exchange-AtpMessageProperties | SA|SL |
X-MS-Exchange-Organization-SCL | 1 |
X-Microsoft-Antispam | BCL:0;ARA:13230040|7053199007|4053099003|4013099003|43540500003; |
X-Forefront-Antispam-Report | CIP:193.204.176.23;CTRY:IT;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:wolf.uniba.it;PTR:wolf.uniba.it;CAT:NONE;SFTY:9.25;SFS:(13230040)(7053199007)(4053099003)(4013099003)(43540500003);DIR:INB;SFTY:9.25; |
X-MS-Exchange-CrossTenant-OriginalArrivalTime | 27 Feb 2025 17:33:56.1628 (UTC) |
X-MS-Exchange-CrossTenant-Network-Message-Id | a89080ba-76a1-46a5-9d20-08dd5754e998 |
X-MS-Exchange-CrossTenant-Id | 4157b39d-533a-41f7-8314-898c4d2ff33b |
X-MS-Exchange-CrossTenant-AuthSource | QB1PEPF00004E0E.CANPRD01.PROD.OUTLOOK.COM |
X-MS-Exchange-CrossTenant-AuthAs | Anonymous |
X-MS-Exchange-CrossTenant-FromEntityHeader | Internet |
X-MS-Exchange-Transport-CrossTenantHeadersStamped | YQBPR0101MB6650 |
X-MS-Exchange-Transport-EndToEndLatency | 00:00:49.3444573 |
X-MS-Exchange-Processed-By-BccFoldering | 15.20.8489.017 |
Importance | high |
X-Priority | 1 |
X-Microsoft-Antispam-Mailbox-Delivery | ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(4710117)(4712020)(920097)(930097)(140003)(1420198); |
X-Microsoft-Antispam-Message-Info | NqoGDcM8atT1wvlN0YshjwR5Vg8DF7clImggHyiMTsCRZZbJ7IQ1k59oCalic6F9k8/a92xgTKWEs3YlNfDR8uFzoDKuPZzQe+xeq7eyEqb4VdRrABkqv8XmeWICIw/PftkzdT39/XACHqr7oYhgn+K00520/lkP7iU0b9m6DtilYL3W99dn7Z4I0AEH9QKUyxu8jJwIkt6BCnOd65FlrCgaqpiehmIZddusvXSTNkNS5xHBhvdeEWjwP5nAh4CC6rQMyYuMZLwgGYBO3sn2UvZfxW6oorWuX2RPhriHJhX+Utu7dI5xkqlM2xfpNprudfHkp8UPRn7YtcD7HXW0tBAwDWjzYcNWjI0THu4uuYyarsC4tUGMTDlT6YuZe8bTJdGFzUK9jq2+WafbMyi9Dgmi58z8dI+xXvEMjRybTqNza1Luu8aC3jpI98uaolUE5BHNa/d4jMAPg65G3qCSfk7pQvkJ+5X92GTfqKcY7P8nSolS1OHAL6Xkhq6X4m+O7oCEPu4hqF35mYLKDBxzWCAecsHxxCqBflZ89cIsPQJKfRnjg+b/LyRGBdWqw4Szo+5PJ8XmA3/cjNyHZhFzkHjYpsCwN5eL5+wmynCze3T73Ykie3C5ptFLCtCS9CyDu1nCJc85YqfPJ4c++Y4SicnGLQH4yoYFh/4+OHe3f+Z/cwbJzeQix5RtaC08M0DWd+SUG3fv1ZA9v1uD+9o7G/l4w3AqL9daKVDru1nLRCfYBUS2ZzETJcbTWEDfX60nbh/Rd5ve2nbk+k+WQs5xSSc2QcWnaqFf2O1dtuLWyovGV+yTPrTsVYBwL6t2pAE/n6FJHdjA6UoysJr1yKZGntNIXp0Q/KVE0LRYdJFn4emyIayr+2Ir8G3WDYe8mxQqVYKPQQ4YQRfRi+8hRM9kkbHftkveDrzC0+9JSlqW1EMIXZsrkCJxpIVvznwgVkbC2zM0k++2po7LL3BH0lm8b7tme4g/mHcgeGIXoZGjq0SVqJTe0v135qstpQjb4nJY06P9wZfQBMdio992anqQ10THF+k68vmnSy2iU8RhtEWvpJQMEDPWgduOPlFmfgiow8lNjVKgRDSYjTAgozbrg3mGN9Q2cZiFO5qEWgWcX+KlQyATaNOEQgDTV2CjNa3lyl9fTeGJgUzAn3ZfgBaJgTWMZc69/9qaJ/y5EmcooNug6+whLoN+4ANsuMiA0Ly7/TURAY5E4QVHVeFAF/tNezJO0mb3az5lrkoBsX6S97Ei3DgdRMTsJV3s/+gfzFOPSbIrcegd0EM0wS454Tjq4j8Wa0H3F1CcRaPNpRJggI6y9wmgxUb5lzMlQy2KCzvYBokabZOUrUtsPfHpL4A8nCWZsiUfT2boxnpkqrNcTLF6BBauFoLarrFw7s+NUlPDSeP8XCcK6qkGRlDmWejEC5EUlH2Dj5HRO7DdlBE7W9L6t+OzftwScA23puCBMoHXRvrDNPkpcGYH+f+ftfHX3o3eS2b9JJTfAmcN6tk7JnaR/jXKdHanZIPD0JX3RC47ya2F1ZQi6q0YwpZg3V4P303UZomkk81NASklT3UjTO8fnG0RXgrKSkgjxRQAA/u2tgiaXAvMUOXX7Mv0Nytgh4mjySd6w2uxhz+NMo7pL4xrY8r3Om3ZTZUORVtlD/xFgN3iqpH6r6FPUASzal6xzvXgoNgYLF52qboXgiHDE7RieC+D2ask5xGIoBNwehfgsOoxX8n7G01h1Cudhv1Xhf/PwICBXyXuLZO2br8OlmarVP4OOtIDp7c4l777pnkJwrMK+QBSSo8kctSEdfNEiiTeNIFZvUYziFZSTJiNufYjs5ukl3jlcRULV3YG0TtPJOyu50ZjyX79xi7NpXtgPsbZ4iM6d8cZYfSYn9WB7rRFKNOPSgBwVtxkc/bCmiC/ThbmYvSBshA6idcbhbiRXrfRc3gB2X58HzWcvqRDUBw2kplxmGUlY0vaz196Wlf1bMKPa4+lWdoLMstMJqJ3/sH2oW5iHHWYpBhqcEZNB/dqD+LxNOJWIyS1imxl38Qink/kjLstChnXFyl9VC5XT+Kpe3VgVYvTBBNIqgbbIbAn/HODAXE170pCVvU1ZUkSOzOglR9IwfCBJ+Ze6c+t4VT290Nk1VGYu6qicDVBoak/1C1b+7hF3EAP3jLxy0A2Jf4f+xVrLzq5g3DVItW/sDqLJISB9fXcFuHwO+VPUNJOQK7rI/tZaHdfS3neCThd1anJ2Be0nvgfklvpOJnQngxZRwZ0kWuDJhyIidWa+oNwJK30dDTjIrX8OUIikEkeT4F2WruykHmxvMcN7BgO4laMfwErk7RoQPfill9+taI= |
MIME-Version | 1.0 |
Icon Hash: | 46070c0a8e0c67d6 |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Feb 27, 2025 20:01:10.737524033 CET | 1.1.1.1 | 192.168.2.8 | 0x4d32 | No error (0) | s-0005.dual-s-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 27, 2025 20:01:10.737524033 CET | 1.1.1.1 | 192.168.2.8 | 0x4d32 | No error (0) | 52.123.128.14 | A (IP address) | IN (0x0001) | false | ||
Feb 27, 2025 20:01:10.737524033 CET | 1.1.1.1 | 192.168.2.8 | 0x4d32 | No error (0) | 52.123.129.14 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 14:01:02 |
Start date: | 27/02/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x4e0000 |
File size: | 34'446'744 bytes |
MD5 hash: | 91A5292942864110ED734005B7E005C0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 3 |
Start time: | 14:01:12 |
Start date: | 27/02/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7e1840000 |
File size: | 710'048 bytes |
MD5 hash: | EC652BEDD90E089D9406AFED89A8A8BD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |