Windows
Analysis Report
nested-Vendor Questionnaires.eml
Overview
General Information
Detection
Score: | 21 |
Range: | 0 - 100 |
Confidence: | 80% |
Signatures
Classification
- System is w10x64
OUTLOOK.EXE (PID: 8504 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\De sktop\nest ed-Vendor Questionna ires.eml" MD5: 91A5292942864110ED734005B7E005C0) ai.exe (PID: 8828 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "10F FF0B8-B1FD -44B5-858D -8C5CEBF65 931" "EBA7 C961-5A55- 43A8-AB4B- 291C3C2F44 8A" "8504" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
- cleanup
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
- • Phishing
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
Phishing |
---|
Source: | Joe Sandbox AI: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Key value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Modify Registry | LSASS Memory | 12 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Process Injection | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-0005.dual-s-dc-msedge.net | 52.123.130.14 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1671107 |
Start date and time: | 2025-04-22 16:42:46 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 4s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | nested-Vendor Questionnaires.eml |
Detection: | SUS |
Classification: | sus21.winEML@3/3@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, W MIADAP.exe, SIHClient.exe, con host.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 52.109.8.89, 52.10 9.20.39, 23.209.84.26, 23.209. 84.39, 20.189.173.27, 184.29.1 83.29, 52.123.130.14, 20.190.1 90.196, 4.245.163.56, 150.171. 31.254 - Excluded domains from analysis
(whitelisted): omex.cdn.offic e.net, slscr.update.microsoft. com, cus-config.officeapps.liv e.com, roaming.officeapps.live .com, dual-s-0005-office.confi g.skype.com, login.live.com, o nedscolprdwus21.westus.cloudap p.azure.com, officeclient.micr osoft.com, osiprod-scus-buff-a zsc-000.southcentralus.cloudap p.azure.com, a1864.dscd.akamai .net, ecs.office.com, self-eve nts-data.trafficmanager.net, e v2-ring.msedge.net, fs.microso ft.com, prod.configsvc1.live.c om.akadns.net, us2.roaming1.li ve.com.akadns.net, self.events .data.microsoft.com, ctldl.win dowsupdate.com, scus-azsc-000. roaming.officeapps.live.com, p rod.roaming1.live.com.akadns.n et, fe3cr.delivery.mp.microsof t.com, config.officeapps.live. com, us.configsvc1.live.com.ak adns.net, ecs.office.trafficma nager.net, omex.cdn.office.net .akamaized.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtQueryAttributesFile calls found. - Report size getting too big, t
oo many NtQueryValueKey calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-0005.dual-s-dc-msedge.net | Get hash | malicious | HTMLPhisher, Invisible JS | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 4.675228508051054 |
Encrypted: | false |
SSDEEP: | 768:swB2IEQ8DNns4aosxAD3qM9jsiodtv0XhFWT3aOHbbA7+xW36Fq11Yh0tU8T:wi4aFod9js30XhejW36FqXI8T |
MD5: | 5F7919072C9C1F46CDFD76799B91945E |
SHA1: | 401C8F2ED39FD1CAF395F2012E3F673CF47192A4 |
SHA-256: | 33AA29FC87B0282E814DA4A4E9BA7166634D96A75D098AA49E1BA563ADBA697B |
SHA-512: | 344BF496CC07EBA21DD636B6397E82E638DF068925C3C6F7F03F6EB502EC22DA95CBA6F1882CC9C592C949E46A105F0BA2F62F0913B3B623D6B7F3651195BA1B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 271360 |
Entropy (8bit): | 2.2571854176964083 |
Encrypted: | false |
SSDEEP: | 1536:AIjf+r7wLYzJqsYioDW53jEpEHPVQ10BAwr5ZFqW53jEpEHPVQ10BAwr1:vfCYPpj6apj |
MD5: | 2AAC8C0E693E4E31887978E358FCC713 |
SHA1: | D6BBCE2F3D4E8959F96163C2928CC2E858C2FA62 |
SHA-256: | 2BF1C6398CE25AE8529B9D67D63F3CDB5D12C5754AB2AEB5B512B7C590AA5A60 |
SHA-512: | D837E447F4BA27E556F25147409F22A38FBCA7DAAFE1B6DF72D91177877BBF1AC90270F0AA1A9CE85F4C7E4671CF9998BEA7D78AFBD816A3265476CE99D9540A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 1.3489889855727555 |
Encrypted: | false |
SSDEEP: | 768:xW53amEpAHRHPVQ10BAwr1LCYbburfsdl:xW53jEpEHPVQ10BAwr19qsd |
MD5: | CA7D20892AFA78BF759D14BC36295982 |
SHA1: | 93BC9668F3CD7BC319DD1609BA6A74DA003DC43B |
SHA-256: | 45B209828FF6ACF30567A800DCE041AFA96DC3C5C7914E841E04BFD952E65DFE |
SHA-512: | FA858C3CD8B54E72DB13CA0D8D6207AC27CA27CF70236481CC968A61CF1DF030F1901B25B0B220A4B9C972BE8D8A0CB690A7CE768A3C35154026F07488B93CA9 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.999260373069116 |
TrID: |
|
File name: | nested-Vendor Questionnaires.eml |
File size: | 5'396 bytes |
MD5: | 94df7e799a3bbf92e3c0ea5529c884cc |
SHA1: | 78aa673e447228ddcb02ae4c9180a37f1f0b5bd6 |
SHA256: | e0f1b54c0f48fe03eb9fdb59aa796ecd3dca62b670b8957b8deb7a48fe0587ca |
SHA512: | 38075126d2f84315530bc9b4fe8b94be7531595a85650b913b0b85cbe7e3582d7fd3e2fb7331aa4ca7275fa85e8f53ce4e1c359db715e370d6312ecce17cdd8b |
SSDEEP: | 96:2AFecYkow0BFF9igsqi5A4hB8YCJ4IICGUQV9jcXI+qItFEUX:2Ptw0pAgsa4hWY2yVUQV9IWCEe |
TLSH: | C4B12C61A96E482D18D1800C2BA4FB9ED262495682F551DC3F9C53677F3430F61EC4B7 |
File Content Preview: | Received: from mail-qv1-f53.google.com (mail-qv1-f53.google.com [209.85.219.53])...by mx0a-00109701.pphosted.com (PPS) with ESMTPS id 464y2xs68j-1...(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT)...for <teuler@healthesystems.com> |
Subject: | Vendor Questionnaires |
From: | Andres Garza <andres@cybersecuritycompliance.info> |
To: | teuler@healthesystems.com |
Cc: | |
BCC: | |
Date: | Tue, 22 Apr 2025 13:26:11 +0000 |
Communications: |
|
Attachments: |
Key | Value |
---|---|
Received | from 42c9ce41-ae9f-4b45-adfc-f501ffd78c47.local (ec2-174-129-171-56.compute-1.amazonaws.com. [174.129.171.56]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-6f2c2b0e84dsm57864986d6.35.2025.04.22.06.26.12 for <teuler@healthesystems.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 22 Apr 2025 06:26:12 -0700 (PDT) |
DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=cybersecuritycompliance.info; s=google; t=1745328373; x=1745933173; darn=healthesystems.com; h=mime-version:date:content-transfer-encoding:subject:to:from :message-id:from:to:cc:subject:date:message-id:reply-to; bh=1oJYKc3l7/Pwz0ZOWVVKXaQPqnUKo44OszC0G17BGCA=; b=A7CugxZLKowAGqrvSEb6uAS2rGuIoVjPqqe6hay0hmxBKTXA1LGMxoSSsNrhpVZ35y R+SpOgTuHK9Npk+x9JIzbG2I7v+H5aQBKD2I3Z2O8R5ydUfJbhqgkrCNcADuktH4xo8j ob3mBoJZw7qyI94fRFq8Iv6FBYZK/WwfDaRM9Anh4Xi0qiiQC3CkOm+/c/M72h2CKb+6 syjn6PAsE+/Q+5IUG5oTJWJ47BzlTuf4Xupa26J+gCGios/u/SbXmCeBLllRm/KAw6Q7 QxruhGH91VEUq4+ZXRzd0tsO2jgegxf70hJVXnq6OXYurV6MPL3AUjQr0JmN2qXyukgH Pp8g== |
X-Google-DKIM-Signature | v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1745328373; x=1745933173; h=mime-version:date:content-transfer-encoding:subject:to:from :message-id:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=1oJYKc3l7/Pwz0ZOWVVKXaQPqnUKo44OszC0G17BGCA=; b=qOjIXaj/a/4gNT8Xw6OwHZG/u7O9+5LELl5GM9xujZpIVYwaiwi6BZxHPwteeSruSQ y9J5Su9q8x3NDYeYBTPBPUJr0KfDN4QR9/M1NecaY99iCWsPqEsT8DWz9Il6yweDFbVq Q/8fCMwxDvAcuY81P4AFV3EOyFw0wN8LCIIUP4IEI16eLp79Dde+BOcL/OoXTRMuKpVG +g1wqfMQawnsiJdkLJwfIPBxbQfPZan0OrLW3tq0UOPy4Jhp5HXt/NrIicpjEm0T9o76 z2HoUuQSBYBddNkfaUyLOKPFSlTsZO5jOoAvGmgXytC5hN0auT0e30CJEvxtiGtZURuf k8SA== |
X-Gm-Message-State | AOJu0YyugU2r01aLt578MeYafEjuamnHYIw0BicCWF2cH/IPQzl5oebK rKl4exWOxEdHZGyRiEq0UyFi94jj0Mm4NNM8f2Yi8bwr/OnY6pQGRMRor0Vcj3m/nytpUigiHf1 z |
X-Gm-Gg | ASbGncvMfhkQQ4NMpd2GmwBBF2lfndoP1MV/gPlJYDQq3W+ZuT4Ra4hE9KtEBW6fI+X eWy40Qn9QsUIJdllA79VHUTgaiIOXBPkcT6I3CGU67uXJOLFUXupp+NRsS6BzFVzyDT8NfqPnFn Z1u3cGu6aEBoamR0wcLlmtzsX/TO7FBTypmtgVliJ9t+cOjEOlkEWgoosMHfxwnnMmNZjZLGZ6y JJDvcyspraaDesEOQ9O+6Ws13fSkWzFZ3Q4Q56mhocZWpjdoOhnOJ/xOtoP3UYG4L7os1QKmJU1 dv2xIzodPzUIRC3cgaqBMix27/6boVqux3il0sV+clitmveGitalrBGiihTpGj5S4Qf++5CsMbN p2kKJu94ZG55RZAMYhdGKEmzX1jGGwcL38aLy3yLAt0RA76NKk8n1Bu6Tc7MnuhePLfHUaqskjY FBO8j8HG0= |
X-Google-Smtp-Source | AGHT+IEf1xWtRcd3/5xIvfDCQ0QsGzLnczSgkhh63rhcn/CJnXFiiefRZYhnkfFL7Lez7xy0TadzEA== |
X-Received | by 2002:a05:6214:c64:b0:6ea:d393:9634 with SMTP id 6a1803df08f44-6f2c44e6184mr275051526d6.3.1745328372693; Tue, 22 Apr 2025 06:26:12 -0700 (PDT) |
Return-Path | <andres@cybersecuritycompliance.info> |
Message-ID | <42c9ce41-ae9f-4b45-adfc-f501ffd78c47@cybersecuritycompliance.info> |
From | Andres Garza <andres@cybersecuritycompliance.info> |
To | teuler@healthesystems.com |
Subject | Vendor Questionnaires |
Date | Tue, 22 Apr 2025 13:26:11 +0000 |
X-CLX-Shades | MLX |
X-Authority-Analysis | v=2.4 cv=D/RHKuRj c=1 sm=1 tr=0 ts=680798f6 cx=c_pps a=k+UpYAzc8REPnh4cOiqX8g==:117 a=0Gaazqg/mF3Pv2mhX1MVsA==:17 a=IkcTkHD0fZMA:10 a=MKtGQD3n3ToA:10 a=1oJP67jkp3AA:10 a=XR8D0OoHHMoA:10 a=aVObAeVHoTsA:10 a=__MO0CcqhVWig94ltwIA:9 a=QEXdDO2ut3YA:10 a=ZXulRonScM0A:10 a=nJ_aLg6Ybf7iGA-QXnsL:22 a=m_yw9IL0q2Vk4dkBHFnD:22 |
X-CLX-Response | 1TFkXEhMRCkx6FxoRCllEF21QX0Fte2ZhBU5JEQpYWBdlHXJCaBlecFNDchE KeE4XbWFuZ2YBQFMaUEQRCnlMF25wQFMaZmRgHE1gEQpDSBcHHhsRCkNZFwcbHxIRCkNJFxoEGh oaEQpZTRdnZnIRCllJFxpxGhAadwYTGnEeHBAedwYHGwYaEQpZXhdsbHkRCklGF0JPS0ZeQk9ZU 1leT0dZdUJFWV5PThEKSUcXeE9NEQpDThd/XHB7WR1waWZ1ZEZHZnxybnBieEMYa3h7fR9JXENT HxEKWFwXHwQaBBkTEgUbGgQbGxoEGxkeBBkZEBseGh8aEQpeWRdMen4YeBEKTVwXBxwbEQpMWhd saU1BaxEKTEYXb2tra2trEQpCTxdtUnMSQVtpRBMeTBEKQ1oXGBoTBBIfBBgbEwQfGREKQl4XGx EKQlwXGxEKXk4XGxEKQksXbWFuZ2YBQFMaUEQRCkJJF21hbmdmAUBTGlBEEQpCRRdlcxx/Hn0BS VNPWREKQk4XbWFuZ2YBQFMaUEQRCkJMF2UdckJoGV5wU0NyEQpCbBdpbXtLfB0YaF0YaREKQkAX bUdwGEJOWlNOTx4RCkJYF2B+GAFyYkBIZmlhEQpNXhcbEQpaWBcbEQp5Qxd6HX5Ye08ZYEZLQRE KWUsXGxoSGhEKcGgXZVlufx5eXkhNTh4QGRoRCnBoF21eHGFoZ116b2FEEBkaEQpwaBdhY0JsbU ZmbmJ6bxAZGhEKcGwXY11yeWBPbG5BZUAQGhEKcEMXbkNYTUsfU3hIaWwQBxscEQptfhcbEQpYT RdLESA= |
X-Proofpoint-GUID | UvZQs7ZCL_NlmLVXDZHRi2ARQW5cviy5 |
X-Proofpoint-ORIG-GUID | UvZQs7ZCL_NlmLVXDZHRi2ARQW5cviy5 |
X-Proofpoint-Banner-Trigger | inbound |
Content-Type | text/plain; charset="utf-8" |
Content-Transfer-Encoding | quoted-printable |
MIME-Version | 1.0 |
Icon Hash: | 46070c0a8e0c67d6 |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Apr 22, 2025 16:43:47.359462023 CEST | 1.1.1.1 | 192.168.2.5 | 0xec4d | No error (0) | shed.s-0005.dual-s-dc-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 22, 2025 16:43:47.359462023 CEST | 1.1.1.1 | 192.168.2.5 | 0xec4d | No error (0) | s-0005.dual-s-dc-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Apr 22, 2025 16:43:47.359462023 CEST | 1.1.1.1 | 192.168.2.5 | 0xec4d | No error (0) | 52.123.130.14 | A (IP address) | IN (0x0001) | false | ||
Apr 22, 2025 16:43:47.359462023 CEST | 1.1.1.1 | 192.168.2.5 | 0xec4d | No error (0) | 52.123.131.14 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:43:39 |
Start date: | 22/04/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7c0000 |
File size: | 34'446'744 bytes |
MD5 hash: | 91A5292942864110ED734005B7E005C0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 1 |
Start time: | 10:43:45 |
Start date: | 22/04/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7e9f60000 |
File size: | 710'048 bytes |
MD5 hash: | EC652BEDD90E089D9406AFED89A8A8BD |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |