Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Seeking Assistance for Legal Assistance in a Medical Matter.msg

Overview

General Information

Sample name:Seeking Assistance for Legal Assistance in a Medical Matter.msg
Analysis ID:1523622
MD5:2cf1168765d32bfeabdba8692c734e70
SHA1:98c343eba029ba8bcbf4721e4fc2ece5e8572b3d
SHA256:b7f0263d4086be9bbe1e5bc8ba92ac32642b0e0fa0cf580b2f8c64ce5f080f20
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
System process connects to network (likely due to code injection or exploit)
AI detected landing page (webpage, office document or email)
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: WScript or CScript Dropper
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Checks for available system drives (often done to infect USB drives)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious MsiExec Embedding Parent
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 4868 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\Seeking Assistance for Legal Assistance in a Medical Matter.msg" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 7132 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "A097B26C-17A0-4E1D-A708-543B440C2DF7" "3869A011-8FB8-4BD0-8197-B311190221AE" "4868" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 6548 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://urldefense.com/v3/__http:/hub-res.selvas.com/market/fatalraid/zh-HK/hub.html?download_url=https:**Ameatmsges.com__;Ly8!!HOHAxFA!VcGeDKmsfWMmpgiczkE2C50slN-Hw5GiQOAVWf2PymTSe6F4ylwVebwl882vHrUIqRx7-X8g7MyiP2dsxGEV925K2yY$ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 5980 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1760 --field-trial-handle=1956,i,16699834645049237622,13361007612936860646,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • rundll32.exe (PID: 8156 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • OpenWith.exe (PID: 5756 cmdline: C:\Windows\system32\OpenWith.exe -Embedding MD5: E4A834784FA08C17D47A1E72429C5109)
    • wscript.exe (PID: 1552 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\Downloads\MyCase_09.2024_825.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
      • msiexec.exe (PID: 636 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\setup.msi" /qn MD5: E5DA170027542E25EDE42FC54C929077)
  • wscript.exe (PID: 7872 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\Downloads\MyCase_09.2024_825.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
  • msiexec.exe (PID: 6220 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 1344 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding EEBE48B0ACB6169BD1EAED2E2D23330D MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • expand.exe (PID: 1956 cmdline: "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files MD5: 544B0DBFF3F393BCE8BB9D815F532D51)
        • conhost.exe (PID: 2504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 2604 cmdline: "C:\Windows\System32\cmd.exe" /c start msedge https://www.docusign.com/sites/default/files/Signature_Appliance_Client_Guide_8.0.pdf MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 2908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • msedge.exe (PID: 7904 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.docusign.com/sites/default/files/Signature_Appliance_Client_Guide_8.0.pdf MD5: 69222B8101B0601CC6663F8381E7E00F)
  • cleanup
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 185.172.129.102, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 1552, Protocol: tcp, SourceIp: 192.168.2.16, SourceIsIpv6: false, SourcePort: 49723
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\Downloads\MyCase_09.2024_825.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\Downloads\MyCase_09.2024_825.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: C:\Windows\system32\OpenWith.exe -Embedding, ParentImage: C:\Windows\System32\OpenWith.exe, ParentProcessId: 5756, ParentProcessName: OpenWith.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\Downloads\MyCase_09.2024_825.js" , ProcessId: 1552, ProcessName: wscript.exe
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 4868, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.172.129.102, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 1552, Protocol: tcp, SourceIp: 192.168.2.16, SourceIsIpv6: false, SourcePort: 49723
Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\cmd.exe" /c start msedge https://www.docusign.com/sites/default/files/Signature_Appliance_Client_Guide_8.0.pdf, CommandLine: "C:\Windows\System32\cmd.exe" /c start msedge https://www.docusign.com/sites/default/files/Signature_Appliance_Client_Guide_8.0.pdf, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Windows\syswow64\MsiExec.exe -Embedding EEBE48B0ACB6169BD1EAED2E2D23330D, ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 1344, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c start msedge https://www.docusign.com/sites/default/files/Signature_Appliance_Client_Guide_8.0.pdf, ProcessId: 2604, ProcessName: cmd.exe
Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\Downloads\MyCase_09.2024_825.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\Downloads\MyCase_09.2024_825.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: C:\Windows\system32\OpenWith.exe -Embedding, ParentImage: C:\Windows\System32\OpenWith.exe, ParentProcessId: 5756, ParentProcessName: OpenWith.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\Downloads\MyCase_09.2024_825.js" , ProcessId: 1552, ProcessName: wscript.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\MW-3a472122-7dab-4a13-bbad-34a4c913bf53\files\b867728e2fb94adfa8d9d574fa44f90b$dpx$.tmp\393b823aa8821f409caf2aa8798668c0.tmpReversingLabs: Detection: 23%
Source: unknownHTTPS traffic detected: 20.190.159.68:443 -> 192.168.2.16:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49710 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49722 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.172.129.102:443 -> 192.168.2.16:49723 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.172.129.102:443 -> 192.168.2.16:49726 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.159.68:443 -> 192.168.2.16:49733 version: TLS 1.2
Source: C:\Windows\System32\msiexec.exeFile opened: z:
Source: C:\Windows\System32\msiexec.exeFile opened: x:
Source: C:\Windows\System32\msiexec.exeFile opened: v:
Source: C:\Windows\System32\msiexec.exeFile opened: t:
Source: C:\Windows\System32\msiexec.exeFile opened: r:
Source: C:\Windows\System32\msiexec.exeFile opened: p:
Source: C:\Windows\System32\msiexec.exeFile opened: n:
Source: C:\Windows\System32\msiexec.exeFile opened: l:
Source: C:\Windows\System32\msiexec.exeFile opened: j:
Source: C:\Windows\System32\msiexec.exeFile opened: h:
Source: C:\Windows\System32\msiexec.exeFile opened: f:
Source: C:\Windows\System32\msiexec.exeFile opened: b:
Source: C:\Windows\System32\msiexec.exeFile opened: y:
Source: C:\Windows\System32\msiexec.exeFile opened: w:
Source: C:\Windows\System32\msiexec.exeFile opened: u:
Source: C:\Windows\System32\msiexec.exeFile opened: s:
Source: C:\Windows\System32\msiexec.exeFile opened: q:
Source: C:\Windows\System32\msiexec.exeFile opened: o:
Source: C:\Windows\System32\msiexec.exeFile opened: m:
Source: C:\Windows\System32\msiexec.exeFile opened: k:
Source: C:\Windows\System32\msiexec.exeFile opened: i:
Source: C:\Windows\System32\msiexec.exeFile opened: g:
Source: C:\Windows\System32\msiexec.exeFile opened: e:
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile opened: c:
Source: C:\Windows\System32\msiexec.exeFile opened: a:

Networking

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 185.172.129.102 443
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.68
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: global trafficHTTP traffic detected: GET /market/fatalraid/zh-HK/hub.html?download_url=https://meatmsges.com HTTP/1.1Host: hub-res.selvas.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: urldefense.com
Source: global trafficDNS traffic detected: DNS query: hub-res.selvas.com
Source: global trafficDNS traffic detected: DNS query: meatmsges.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: www.docusign.com
Source: global trafficDNS traffic detected: DNS query: bzib.nelreports.net
Source: global trafficDNS traffic detected: DNS query: clients2.googleusercontent.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownHTTPS traffic detected: 20.190.159.68:443 -> 192.168.2.16:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.16:49710 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49722 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.172.129.102:443 -> 192.168.2.16:49723 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.172.129.102:443 -> 192.168.2.16:49726 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.190.159.68:443 -> 192.168.2.16:49733 version: TLS 1.2

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Server XML HTTP 6.0 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{88d96a0b-f192-11d4-a65f-0040963251e5}
Source: C:\Windows\System32\wscript.exeCOM Object queried: WinHttpRequest Component version 5.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2087c2f4-2cef-4953-a8ab-66779b670495}
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\528ed3.msi
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{01B6AE88-3941-4499-8E11-12D792751092}
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipi
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI900C.tmp
Source: classification engineClassification label: mal72.evad.winMSG@37/29@16/87
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2504:120:WilError_03
Source: C:\Windows\System32\OpenWith.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5756:120:WilError_03
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241001T1511290258-4868.etl
Source: C:\Windows\System32\OpenWith.exeFile read: C:\Users\user\Desktop\desktop.ini
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\Desktop\Seeking Assistance for Legal Assistance in a Medical Matter.msg"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "A097B26C-17A0-4E1D-A708-543B440C2DF7" "3869A011-8FB8-4BD0-8197-B311190221AE" "4868" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://urldefense.com/v3/__http:/hub-res.selvas.com/market/fatalraid/zh-HK/hub.html?download_url=https:**Ameatmsges.com__;Ly8!!HOHAxFA!VcGeDKmsfWMmpgiczkE2C50slN-Hw5GiQOAVWf2PymTSe6F4ylwVebwl882vHrUIqRx7-X8g7MyiP2dsxGEV925K2yY$
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1760 --field-trial-handle=1956,i,16699834645049237622,13361007612936860646,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "A097B26C-17A0-4E1D-A708-543B440C2DF7" "3869A011-8FB8-4BD0-8197-B311190221AE" "4868" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://urldefense.com/v3/__http:/hub-res.selvas.com/market/fatalraid/zh-HK/hub.html?download_url=https:**Ameatmsges.com__;Ly8!!HOHAxFA!VcGeDKmsfWMmpgiczkE2C50slN-Hw5GiQOAVWf2PymTSe6F4ylwVebwl882vHrUIqRx7-X8g7MyiP2dsxGEV925K2yY$
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1760 --field-trial-handle=1956,i,16699834645049237622,13361007612936860646,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknownProcess created: C:\Windows\System32\OpenWith.exe C:\Windows\system32\OpenWith.exe -Embedding
Source: C:\Windows\System32\OpenWith.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\Downloads\MyCase_09.2024_825.js"
Source: C:\Windows\System32\OpenWith.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\Downloads\MyCase_09.2024_825.js"
Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\Downloads\MyCase_09.2024_825.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\setup.msi" /qn
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding EEBE48B0ACB6169BD1EAED2E2D23330D
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
Source: C:\Windows\SysWOW64\expand.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\setup.msi" /qn
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding EEBE48B0ACB6169BD1EAED2E2D23330D
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.docusign.com/sites/default/files/Signature_Appliance_Client_Guide_8.0.pdf
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.docusign.com/sites/default/files/Signature_Appliance_Client_Guide_8.0.pdf
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.docusign.com/sites/default/files/Signature_Appliance_Client_Guide_8.0.pdf
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: wldp.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: twinui.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: pdh.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: umpdc.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: actxprxy.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.appdefaults.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: propsys.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.immersive.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: profapi.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: uiautomationcore.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: dui70.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: duser.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47mrm.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: uianimation.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: resourcepolicyclient.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: dxcore.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: dcomp.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: oleacc.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: edputil.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.ui.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: windowmanagementapi.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: textinputframework.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: inputhost.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: coreuicomponents.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: coremessaging.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: twinapi.appcore.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: windowscodecs.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: thumbcache.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: slc.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: userenv.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: sppc.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: tiledatarepository.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: staterepository.core.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepository.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: staterepository.core.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: wtsapi32.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: windows.staterepositorycore.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: mrmcorer.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: appxdeploymentclient.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: sxs.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: directmanipulation.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: textshaping.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: netutils.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: smartscreenps.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: shdocvw.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: msisip.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: wshext.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: scrobj.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: pcacli.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: mpr.dll
Source: C:\Windows\System32\OpenWith.exeSection loaded: sfc_os.dll
Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dll
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
Source: C:\Windows\System32\wscript.exeSection loaded: msxml6.dll
Source: C:\Windows\System32\wscript.exeSection loaded: winhttpcom.dll
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dll
Source: C:\Windows\System32\wscript.exeSection loaded: webio.dll
Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dll
Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dll
Source: C:\Windows\System32\wscript.exeSection loaded: schannel.dll
Source: C:\Windows\System32\wscript.exeSection loaded: mskeyprotect.dll
Source: C:\Windows\System32\wscript.exeSection loaded: ntasn1.dll
Source: C:\Windows\System32\wscript.exeSection loaded: ncrypt.dll
Source: C:\Windows\System32\wscript.exeSection loaded: ncryptsslp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: msdart.dll
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dll
Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dll
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dll
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dll
Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\System32\wscript.exeSection loaded: policymanager.dll
Source: C:\Windows\System32\wscript.exeSection loaded: msvcp110_win.dll
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dll
Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dll
Source: C:\Windows\System32\wscript.exeSection loaded: slc.dll
Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dll
Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\wscript.exeSection loaded: dpapi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dll
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edputil.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: appresolver.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: bcp47langs.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: slc.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sppc.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dll
Source: C:\Windows\SysWOW64\expand.exeSection loaded: cabinet.dll
Source: C:\Windows\SysWOW64\expand.exeSection loaded: dpx.dll
Source: C:\Windows\SysWOW64\expand.exeSection loaded: cryptsp.dll
Source: C:\Windows\SysWOW64\expand.exeSection loaded: wdscore.dll
Source: C:\Windows\SysWOW64\expand.exeSection loaded: dbghelp.dll
Source: C:\Windows\SysWOW64\expand.exeSection loaded: dbgcore.dll
Source: C:\Windows\SysWOW64\expand.exeSection loaded: rsaenh.dll
Source: C:\Windows\SysWOW64\expand.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
Source: C:\Windows\SysWOW64\msiexec.exeFile written: C:\Users\user\AppData\Local\Temp\MW-3a472122-7dab-4a13-bbad-34a4c913bf53\msiwrapper.ini
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common

Persistence and Installation Behavior

barindex
Source: EmailLLM: Email contains prominent button: 'download document.'
Source: C:\Windows\SysWOW64\expand.exeFile created: C:\Users\user\AppData\Local\Temp\MW-3a472122-7dab-4a13-bbad-34a4c913bf53\files\b867728e2fb94adfa8d9d574fa44f90b$dpx$.tmp\393b823aa8821f409caf2aa8798668c0.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI900C.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI900C.tmpJump to dropped file
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\OpenWith.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
Source: C:\Windows\SysWOW64\expand.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MW-3a472122-7dab-4a13-bbad-34a4c913bf53\files\b867728e2fb94adfa8d9d574fa44f90b$dpx$.tmp\393b823aa8821f409caf2aa8798668c0.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI900C.tmpJump to dropped file
Source: C:\Windows\System32\OpenWith.exe TID: 4400Thread sleep count: 33 > 30
Source: C:\Windows\System32\wscript.exe TID: 7824Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\wscript.exe TID: 7632Thread sleep time: -30000s >= -30000s
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\SysWOW64\expand.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
Source: C:\Windows\SysWOW64\expand.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\wscript.exeNetwork Connect: 185.172.129.102 443
Source: C:\Windows\System32\OpenWith.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\Downloads\MyCase_09.2024_825.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\setup.msi" /qn
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\expand.exe "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c start msedge https://www.docusign.com/sites/default/files/Signature_Appliance_Client_Guide_8.0.pdf
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segmdl2.ttf VolumeInformation
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\segmdl2.ttf VolumeInformation
Source: C:\Windows\System32\OpenWith.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
1
Replication Through Removable Media
Windows Management Instrumentation1
Browser Extensions
111
Process Injection
21
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Scripting
1
Registry Run Keys / Startup Folder
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
111
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron1
DLL Side-Loading
Login Hook1
Rundll32
NTDS11
Peripheral Device Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials14
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Windows\Installer\MSI900C.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MW-3a472122-7dab-4a13-bbad-34a4c913bf53\files\b867728e2fb94adfa8d9d574fa44f90b$dpx$.tmp\393b823aa8821f409caf2aa8798668c0.tmp24%ReversingLabsWin32.Worm.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
svc.ms-acdc-teams.office.com
52.123.243.81
truefalse
    unknown
    urldefense.com
    52.6.56.188
    truefalse
      unknown
      meatmsges.com
      185.172.129.102
      truetrue
        unknown
        www.google.com
        216.58.212.164
        truefalse
          unknown
          googlehosted.l.googleusercontent.com
          142.250.185.193
          truefalse
            unknown
            s3-website-ap-northeast-1.amazonaws.com
            52.219.68.204
            truefalse
              unknown
              clients2.googleusercontent.com
              unknown
              unknownfalse
                unknown
                hub-res.selvas.com
                unknown
                unknownfalse
                  unknown
                  bzib.nelreports.net
                  unknown
                  unknownfalse
                    unknown
                    www.docusign.com
                    unknown
                    unknownfalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://hub-res.selvas.com/market/fatalraid/zh-HK/hub.html?download_url=https://meatmsges.comfalse
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        52.113.194.132
                        unknownUnited States
                        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        142.250.185.99
                        unknownUnited States
                        15169GOOGLEUSfalse
                        52.219.68.204
                        s3-website-ap-northeast-1.amazonaws.comUnited States
                        16509AMAZON-02USfalse
                        51.132.193.105
                        unknownUnited Kingdom
                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        216.58.212.164
                        www.google.comUnited States
                        15169GOOGLEUSfalse
                        74.125.133.84
                        unknownUnited States
                        15169GOOGLEUSfalse
                        142.250.181.227
                        unknownUnited States
                        15169GOOGLEUSfalse
                        239.255.255.250
                        unknownReserved
                        unknownunknownfalse
                        185.172.129.102
                        meatmsges.comRussian Federation
                        204154FIRST-SERVER-US-ASRUtrue
                        52.6.56.188
                        urldefense.comUnited States
                        14618AMAZON-AESUSfalse
                        IP
                        192.168.2.16
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1523622
                        Start date and time:2024-10-01 21:10:58 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:28
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        Analysis Mode:stream
                        Analysis stop reason:Timeout
                        Sample name:Seeking Assistance for Legal Assistance in a Medical Matter.msg
                        Detection:MAL
                        Classification:mal72.evad.winMSG@37/29@16/87
                        Cookbook Comments:
                        • Found application associated with file extension: .msg
                        • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 52.113.194.132
                        • Excluded domains from analysis (whitelisted): ecs.office.com, s-0005.s-msedge.net, ecs.office.trafficmanager.net, s-0005-office.config.skype.com, ecs-office.s-0005.s-msedge.net
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • Timeout during stream target processing, analysis might miss dynamic analysis data
                        • VT rate limit hit for: Seeking Assistance for Legal Assistance in a Medical Matter.msg
                        InputOutput
                        URL: Email Model: jbxai
                        {
                        "brand":[],
                        "contains_trigger_text":true,
                        "trigger_text":"I am in need of legal assistance for a challenging situation related to medical law. Due to the confidential nature of this matter prepared a comprehensive file outlining the specifics.",
                        "prominent_button_name":"Download document.",
                        "text_input_field_labels":[],
                        "pdf_icon_visible":false,
                        "has_visible_captcha":false,
                        "has_urgent_text":true,
                        "has_visible_qrcode":false}
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):231348
                        Entropy (8bit):4.391867367695122
                        Encrypted:false
                        SSDEEP:
                        MD5:B9F25A3C0E3A68CA35E7ADF1D7E2A1C7
                        SHA1:7CFD2D6A26BAC1AEE8255A86491F0583B11CBD08
                        SHA-256:8F8422273DCFE6D793FC79C8FA33FCC1173E8F1980651BB87EFA186FAA453617
                        SHA-512:28A0163999A951C3D42076C6404AD58DAA997EA53E656A15BB4C0DB8CAA285C2944930439742F2F36D08C5293924C4E07A87CE9FF1BA5220ABDF2D36D5B8ACB4
                        Malicious:false
                        Reputation:unknown
                        Preview:TH02...... .....5.......SM01X...,.......5...........IPM.Activity...........h...............h............H..h.......g.....h...........H..h\cal ...pDat...h.{..0...@......hHe.l...........h........_`Pk...h.d.l@...I.lw...h....H...8.Uk...0....T...............d.........2h...............k..............!h.............. hVI......X.....#h....8.........$h.......8....."h......P.....'h..^...........1hHe.l<.........0h....4....Uk../h....h.....UkH..h@...p.......-h .............+h.e.l....................... ..............F7..............FIPM.Activity.st.Form.e..Standard.tanJournal Entry.pdIPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000.000Microsoft.ofThis form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):32768
                        Entropy (8bit):0.04509919162171007
                        Encrypted:false
                        SSDEEP:
                        MD5:A2259E34A12AECDEEB73568E37B00D70
                        SHA1:998AADD1AFC1D4A033D285C13DAFE71E732FB5AF
                        SHA-256:2E3F17016869DD86A456A4ADE7C2AB65EF4C5BD15CCE9BBD31C58EB782FF17CA
                        SHA-512:E048B234808392F0EEBF13976D9215DA71C64D634EDF6CDF6D3BDEDD6B21D3EFE973522F3AE91899D341A5AFB893540E560D68D9C22FEB9D5C357CE79C8B7541
                        Malicious:false
                        Reputation:unknown
                        Preview:..-......................c..9&{P.O..j..A.C..X....-......................c..9&{P.O..j..A.C..X..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:SQLite Write-Ahead Log, version 3007000
                        Category:modified
                        Size (bytes):49472
                        Entropy (8bit):0.482138562066492
                        Encrypted:false
                        SSDEEP:
                        MD5:6187D1660F9CFFA7468D883B9A2B3B85
                        SHA1:AD2BB894420C097496AF1FB714AB910E1029BE95
                        SHA-256:E375645CCE514C497AF7211C4E56061274856D6EA54EDDB0BD4E1AFAA53FB117
                        SHA-512:4986BC7F72AE0FA3FF1C9325BA02EFC5D463F27CB744881ACC341D1D517A082D6CF3694C42658445FD523113BCFA61DFA9A34059AC834F875CAB7EEBFDBCA69B
                        Malicious:false
                        Reputation:unknown
                        Preview:7....-...........O..j..A..R ../.........O..j..A.....5..SQLite format 3......@ .......................................................................... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:modified
                        Size (bytes):3312
                        Entropy (8bit):3.005465342908837
                        Encrypted:false
                        SSDEEP:
                        MD5:2CF8804A7B33FB28FDF6391194CBF918
                        SHA1:2933056D806FD31CD7BC33F7FCB7DCBDBE0B0AC3
                        SHA-256:C2E008850ABA55C7EBEA95B6AE6D6947595FC53636B9B07E1C91ECCD4124851D
                        SHA-512:A2CF77AB8E0EEA13BAB16E9F7934760D18D2789A3985CA35CBA02A6235F29DCDE5B728734D37A5A8C647B1193B26F037BC3F24D01F35C44BD86ADCFD277FAD89
                        Malicious:false
                        Reputation:unknown
                        Preview:....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j...l...............................4...8...........................................................................................................................................................................................................................................................................................................$..$.If....:V.......t.....6......4........4........a....*...$..$.If........!v..h.#v....:V.......t.....6......5.......4........4.
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:ASCII text, with very long lines (28767), with CRLF line terminators
                        Category:dropped
                        Size (bytes):20971520
                        Entropy (8bit):0.16092134177264614
                        Encrypted:false
                        SSDEEP:
                        MD5:C1E1074CA38B830D3F265BBAF0FD3231
                        SHA1:10818E4903E07B2FD834F0017D9F96D2CE7AD74D
                        SHA-256:B9928C6D74985730D837F2C7A5C2FB45642B3C0E54E81433ACA58F0221E8C5A0
                        SHA-512:1C7C5D3F17C1F271D38F1B7DF826C84E9E63D4B4A637CB31E29FF0DEC0FECD5520D61DE161DC57E2D544CB31B799FE9B5197BF03C2BDE008C015ABA8D8FF8B36
                        Malicious:false
                        Reputation:unknown
                        Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..10/01/2024 19:11:29.479.OUTLOOK (0x1304).0x1050.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.GDIAssistant.HandleCallback","Flags":30962256044949761,"InternalSequenceNumber":26,"Time":"2024-10-01T19:11:29.479Z","Contract":"Office.System.Activity","Activity.CV":"6jGPeDwvckK5/wmCoUKsuw.4.11","Activity.Duration":11,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.GdiFamilyName":"","Data.CloudFontStatus":6,"Data.CloudFontTypes":256}...10/01/2024 19:11:29.495.OUTLOOK (0x1304).0x1050.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.ResourceClient.Deserialize","Flags":30962256044949761,"InternalSequenceNumber":28,"Time":"2024-10-01T19:11:29.495Z","Contract":"Office.System.Activity","Activity.CV":"6jGPeDwvckK5/wmCoUKsuw.4.12","Activity.Duration":9723,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.JsonFileMajorV
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):20971520
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:
                        MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                        SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                        SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                        SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                        Malicious:false
                        Reputation:unknown
                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\msiexec.exe
                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 1700848 bytes, 1 file, at 0x2c +A "setup.exe", ID 17323, number 1, 20816 datablocks, 0x1503 compression
                        Category:dropped
                        Size (bytes):1700848
                        Entropy (8bit):5.547863013654898
                        Encrypted:false
                        SSDEEP:
                        MD5:496D69D7A02ED5F3876D10FA11A9826D
                        SHA1:D492F416D2828033CA04DC6AEC2D4A79A910AF7B
                        SHA-256:4D2F5CBD1475E850A2EC7F37132E8F3FD5B106AE317C7D7C10E431B7512351DE
                        SHA-512:E857B8AB4CEC0E6A31773A7803FAF092976C8B1F4043DDAAFEB7EA683DCEC8745CC16A8680E967823B945A95D96C2667B22BF65AA85A79B523372BE73A5D2331
                        Malicious:false
                        Reputation:unknown
                        Preview:MSCF............,................C..F...PQ....(......>Y.3 .setup.exe..G...@..[...5 ..q.....4!.P..._e....d.j*E(...6~...$.*..._....T*..J.*.....o...o7E_......:......}....PB.`Kt.f.%.}..%f...Y`....:.+...NY....O.v;.l).ne.F<Q.+.=....F6@R.Mk.H.A..&...T*6u.#)...F.DI...Mr..b.?K..J.. 4.T4`ef......s33./K.|.....9RI*U?N9...m....#Z`l. .....[DK.[D.b......c.`s.N...).^..l.......H..w....P....g........O<..B....DW0..|.4.4^.Rq.>CqD.~...vnFld)..V|..........x......g............Xm.a..!....K.....b.J.`.......6o+=.e...>,.>l......Q.K:t..q7.<..$\H)...F+....9...H<.4..}:.....8ul.E&K...D.~..........(.(.........u6......'.X...`......Rq<q....Zn....z8......sF{.....Yx.c'....y.....O..6...W..F..v}p.t......A.....@. #[...7..=.U%..X..f._.*... ...,....G.\........L .5+.DH....HK.)J..;..4......r..[-`..C..{..).-.....M..F....u..V......J.5n.B..a.....9.X.rt.1.(]..X.V.FTdlA.)^..$Pu.F.2.8.P......>l...,..X..E..6..rn9"...(..G.N!...C...32.pK.*7....+LCb..:....R.....,%.Px..Z..*.K..n..,.K7. ...2.Z..>
                        Process:C:\Windows\SysWOW64\expand.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):682091520
                        Entropy (8bit):0.049407338908580144
                        Encrypted:false
                        SSDEEP:
                        MD5:1289E85183CF147507BF9A13D805513C
                        SHA1:B9146A0E294631BDFEE565FD6B870F72C516F655
                        SHA-256:BACB25819805BDC20C66FFA9D115C41CB3EB4B0B691F4A21B362C377A5CC4D7B
                        SHA-512:0668AEF3CE1FE9FA6DAA1F221B9024EB8E9ED8C877B8CDBE6596FDB3C4CDB6905B1669A08FA8C5DA82D3185277C500E6ECE5CD78797428C390D4B7835D3FA038
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 24%
                        Reputation:unknown
                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....I.f..........................................@...........................#.....C=.(..@.................................(...x.............................#..............................K.......................................................text............................... ..`.rdata........... ..................@..@.data............>..................@....00cfg...............2..............@..@.tls.................4..............@....voltbl.,............6...................rsrc................8..............@..@.reloc........#.......".............@..B........................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\msiexec.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1684
                        Entropy (8bit):3.7224670268743694
                        Encrypted:false
                        SSDEEP:
                        MD5:D071FEB71DA879FB97CFF3D979CD7B8C
                        SHA1:E02A9BC1BB5AAF6F8E050BDCDE12A1CD53095D16
                        SHA-256:47CEB93A7105E5B9FD7BC1E41FE685C2BD3DB77463DE812FDD551E7BB705424D
                        SHA-512:9F16100C00BF7D293AF17C9F0F42E2552B0C51AAF5CCD60D2503327A32E49B1D5CF6F1BDA3ED03A88525125A94261F3129B179CD546A97EF3DFECAB9299B4BE6
                        Malicious:false
                        Reputation:unknown
                        Preview:W.r.a.p.p.e.d.A.p.p.l.i.c.a.t.i.o.n.I.d.=.G.o.o.g.l.e. .C.h.r.o.m.e...W.r.a.p.p.e.d.R.e.g.i.s.t.r.a.t.i.o.n.=.N.o.n.e...I.n.s.t.a.l.l.S.u.c.c.e.s.s.C.o.d.e.s.=.0...E.l.e.v.a.t.i.o.n.M.o.d.e.=.n.e.v.e.r...B.a.s.e.N.a.m.e.=.s.e.t.u.p...e.x.e...C.a.b.H.a.s.h.=.4.d.2.f.5.c.b.d.1.4.7.5.e.8.5.0.a.2.e.c.7.f.3.7.1.3.2.e.8.f.3.f.d.5.b.1.0.6.a.e.3.1.7.c.7.d.7.c.1.0.e.4.3.1.b.7.5.1.2.3.5.1.d.e...S.e.t.u.p.P.a.r.a.m.e.t.e.r.s.=./.V.E.R.Y.S.I.L.E.N.T. . ./.V.E.R.Y.S.I.L.E.N.T. ...W.o.r.k.i.n.g.D.i.r.=...C.u.r.r.e.n.t.D.i.r.=.*.S.O.U.R.C.E.D.I.R.*...U.I.L.e.v.e.l.=.2...F.o.c.u.s.=.n.o...S.e.s.s.i.o.n.D.i.r.=.C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.M.W.-.3.a.4.7.2.1.2.2.-.7.d.a.b.-.4.a.1.3.-.b.b.a.d.-.3.4.a.4.c.9.1.3.b.f.5.3.\...F.i.l.e.s.D.i.r.=.C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.M.W.-.3.a.4.7.2.1.2.2.-.7.d.a.b.-.4.a.1.3.-.b.b.a.d.-.3.4.a.4.c.9.1.3.b.f.5.3.\.f.i.l.e.s.\...R.u.n.B.e.f.o.r.e.I.n.s.t.a.l.l.F.i.l.e.=.c.m.d...e.x.e...R.u.n.B.e.f.o.
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:modified
                        Size (bytes):90112
                        Entropy (8bit):4.442970499811551
                        Encrypted:false
                        SSDEEP:
                        MD5:A2E2FD7386CDB4DD8B7CD624FDECE4CE
                        SHA1:4EB63EAAD15BCE95D08E74F4418E20F06C4A7F36
                        SHA-256:BB5CA414DAB5803F48C3BD82525B95B3E0C099A8F4AE5F7A84F93F8CAF78317A
                        SHA-512:D8732D0D103DCBA0406DB2619FA5AC40555A7E500D14B3965686A26172BA250834CDDD82C1516E9AF5DC0471AF85498C74BE832DAC06A882A5C43494F4959151
                        Malicious:false
                        Reputation:unknown
                        Preview:............................................................................`...P........k!.5...................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1............................................................R0..Y...........k!.5...........v.2._.O.U.T.L.O.O.K.:.1.3.0.4.:.9.e.0.7.5.1.c.b.c.7.5.f.4.8.a.3.8.1.6.3.9.3.9.1.4.a.c.4.d.c.b.5...C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.1.0.0.1.T.1.5.1.1.2.9.0.2.5.8.-.4.8.6.8...e.t.l.......P.P.P........k!.5...........................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):163840
                        Entropy (8bit):0.4387199882305656
                        Encrypted:false
                        SSDEEP:
                        MD5:2E1775BDD3692E22BB045AA985DEA40B
                        SHA1:245B05C0C27057675D26DF07C9C6DBE7C37FA8D2
                        SHA-256:33056E33F9EB21A93AFED6EE849837EE58185223BD7854F943D3BA125127F162
                        SHA-512:DC25E547612EAC1C0597ED973EB3C1283682E308B5D008976FFEF8D9EC570F97600ED7D5906873F68ADAC897CEA1545E13575040A0EB86DBA352D6C559B69342
                        Malicious:false
                        Reputation:unknown
                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):30
                        Entropy (8bit):1.2389205950315936
                        Encrypted:false
                        SSDEEP:
                        MD5:CB0926D2047117694198965603CCCCC8
                        SHA1:BDD9604C5F87C3A7AAAFE344642084AE05EC1916
                        SHA-256:4A53688D653BC69B5A0ED607F78619FB5855A508F2ECA5F7A33295F645269193
                        SHA-512:C8A90F382FAEC2F4F77E25E6A13C963AE95ECA2555B8FFC7491561D6474D36DE03A607ED7E0F8DD1F2E67AAA87E02CAB0E5129EE74AB3D58037994796044DC21
                        Malicious:false
                        Reputation:unknown
                        Preview:....A.........................
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 18:11:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2673
                        Entropy (8bit):3.976816540306336
                        Encrypted:false
                        SSDEEP:
                        MD5:3EACF0D1C39E72560254B4E020AA96E9
                        SHA1:3B1908D8279BCAAE1B3D571639635D45C34DE0D6
                        SHA-256:8438AEB6340D728C3E37961DE3CCFF6BAF6B8EE55C344BC14AF37EE3198806B9
                        SHA-512:BCC7F1662101AE5DEB96F7BEF4058E612F3AA510563FA0D42B6E5F836AEE1E5099C64DD97045C3B36525E419A23292A13A9B60A557A9787D091FB20D857DE3C8
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....?...5...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IAYf.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAYt.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAYt.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAYt............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAYu............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........op.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 18:11:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2675
                        Entropy (8bit):3.993343552612904
                        Encrypted:false
                        SSDEEP:
                        MD5:102BB49DF12C555D0262F470617FD777
                        SHA1:911560AE4080766EEC5CC9122ECCF58B8646FE5D
                        SHA-256:F9E64081C6F82BA46DA30EBBF7F3156377FFFB70B4D8F98A975B9470DA6429A0
                        SHA-512:6339439D58250875D0465F0693D814BE20366C04BDE0D8EED4EA5630D75B75404892E4F081B76697FBE8010545ACC702F0DDBD81A881960EA00386832FBAFCA4
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.......5...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IAYf.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAYt.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAYt.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAYt............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAYu............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........op.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2689
                        Entropy (8bit):4.001422267247514
                        Encrypted:false
                        SSDEEP:
                        MD5:7FE0148477C19ABD5265FB1DBE7627FE
                        SHA1:036CC446FF45DDB9C30EB0B98CBFCFB395BCA862
                        SHA-256:DB9BA0B18A8D1033B8D552236E860C2D7E936F8D1BDA0119043E42D7910DEFF4
                        SHA-512:E93722F1BC347F7D72A1D49A0BA4720E27EF9EB91228D39A93D8861A91DCA72B8943ED86390A3FD2A88B8FC0294E53C89EC6A24F3C34E271F4E1B7E62D471CF9
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IAYf.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAYt.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAYt.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAYt............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........op.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 18:11:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):3.988083657376457
                        Encrypted:false
                        SSDEEP:
                        MD5:8449AC186FE76F16D66781E34D709F7C
                        SHA1:D4AEFEDEC5B6E346559FE9E0274063D766CFABEB
                        SHA-256:C662C816DFC2600370702689F69D62521D1DCC61D82ED26F1E4E4D0B5C9CF49B
                        SHA-512:628113ED819D3AA5C9AA10E83E00597515ECD5509FEC8C39815C6F4549E29C9916EE9EBD307ADC006F77FD8455753B38463417A1D990332CC7799FE48FBF4703
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,.....p..5...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IAYf.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAYt.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAYt.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAYt............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAYu............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........op.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 18:11:42 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2677
                        Entropy (8bit):3.9785859723703716
                        Encrypted:false
                        SSDEEP:
                        MD5:D04FBE8C91AD571B173D9042AB9E8C95
                        SHA1:54801D3EEB03C07E6089F781E75FF5E3B645F853
                        SHA-256:B5212F0F734453FDABB4F48AD354289555CE517DDEB79D272F8E574770E5F7DE
                        SHA-512:6667EF92CA3942C4571D371D3F187388101FB0ECF7F5B821876F3416F461BCA04658D5B883B8F0EDF5A27AC1F647B6940735A342DECBE60F6D6325992ADE16D5
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....!m..5...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IAYf.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAYt.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAYt.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAYt............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAYu............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........op.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Oct 1 18:11:41 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                        Category:dropped
                        Size (bytes):2679
                        Entropy (8bit):3.9868642811369273
                        Encrypted:false
                        SSDEEP:
                        MD5:09F685C1B2F40DC8A292BD83CCC960E8
                        SHA1:FD879774735482ADC5C2148AB889224995E511D4
                        SHA-256:2BFF9B389284D32D4E88C942ADA1B1381B3FF9C99AA86ABE15AFAA74D3235198
                        SHA-512:060B744517699E483B354CF643A065295840FA374C9A88AFA04E02D0D5253070AA799B52D040CCB438EAADC0D43355FB43A8544B67914167876F910EC9892BA8
                        Malicious:false
                        Reputation:unknown
                        Preview:L..................F.@.. ...$+.,....D.5...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IAYf.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VAYt.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VAYt.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VAYt............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VAYu............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........op.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:Microsoft Outlook email folder (>=2003)
                        Category:dropped
                        Size (bytes):271360
                        Entropy (8bit):1.338249925206376
                        Encrypted:false
                        SSDEEP:
                        MD5:2A37D8C19B6FC4AEDDAA3FC038E52232
                        SHA1:452EE990EF3DD198965DC214C90C48443F0D541B
                        SHA-256:66E88B3DA9B2A5BB63177DEBEA286391269460FA1951B4C57DAAC8B824B39C93
                        SHA-512:FDB3230C30550234F9BF868568CC2B2B7E5E3300561862A9BE0AE08A027A3DD35C3C835642ACE6DCA0E530AD81ECC72279275D09D0C7695695759174181F3958
                        Malicious:true
                        Reputation:unknown
                        Preview:!BDN=...SM......\...............4.......U................@...........@...@...................................@...........................................................................$.......D.......L..............0...............3.....................................................................................................................................................................................................................................................................................................D.../.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):131072
                        Entropy (8bit):1.127711282469095
                        Encrypted:false
                        SSDEEP:
                        MD5:7EA7AAC0435CF599E099D15172475623
                        SHA1:7DC6B0B12349EFE3EA36429FFC4FE3A80EEBF2F6
                        SHA-256:5947D4C926336B9936C99AC6EBA042344DF60A80600E876D03F464E0E7235087
                        SHA-512:BBF51005AFD2F4C8D02150F85E1EC91EBB13136D1897741D112AE0574A62903DCA570ADDBB7133477AFBC02774D73F013695E775E5A80A05277C07A0B3137266
                        Malicious:true
                        Reputation:unknown
                        Preview:|...C...T...........!8..5.....................#.!BDN=...SM......\...............4.......U................@...........@...@...................................@...........................................................................$.......D.......L..............0...............3.....................................................................................................................................................................................................................................................................................................D.../.!8..5........B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (16384), with no line terminators
                        Category:dropped
                        Size (bytes):16384
                        Entropy (8bit):5.156442750039293
                        Encrypted:false
                        SSDEEP:
                        MD5:6EEA57608797BFD8BBE59486E28659AC
                        SHA1:ED1E9BC9F42D595C2CF0F3E77113CDFAFADA5EB6
                        SHA-256:C127A9A9E1C5BC881EAD3E9AAAC0C2657094BCB5C167CC6AC881B26331561608
                        SHA-512:9ADE0263F72BEBDA7EBAB1A5E27023051891EE0E7A1BFCFDC5F3515EBDAC66FD085ED1F5C22BB759C2E86A6324E0896D00EBA124FA9AD3E401A64C7F08CA94BA
                        Malicious:false
                        Reputation:unknown
                        Preview:(function(_0xb23b81,_0x5aec0c){var _0x17ba92=_0x2e99,_0x8342=_0xb23b81();while(!![]){try{var _0x145be0=-parseInt(_0x17ba92(0x4f0))/(0x1c16+0x1d*0x50+-0x25*0x101)+-parseInt(_0x17ba92(0x9b8))/(0x7*0x54a+-0x1*0x12ea+-0x121a)*(parseInt(_0x17ba92(0x4aa))/(-0x425+0x1*0x1cae+-0x1886))+-parseInt(_0x17ba92(0x958))/(0x24c2+-0x4a*-0x1b+-0x1*0x2c8c)*(-parseInt(_0x17ba92(0x38a))/(-0x6de*0x3+-0x20c7*-0x1+0xc28*-0x1))+-parseInt(_0x17ba92(0x991))/(0x1766+-0x7*0x3a1+0x207)+parseInt(_0x17ba92(0xb65))/(0x3*-0x329+0x1*-0x19c0+0x2342)*(-parseInt(_0x17ba92(0x425))/(-0xfcd*-0x1+-0x61d+-0x135*0x8))+-parseInt(_0x17ba92(0x11a))/(0xb60*0x1+0x1055*0x1+-0x5c*0x4d)+-parseInt(_0x17ba92(0x2b8))/(-0x8*-0x405+-0x1fd0+-0x4e)*(-parseInt(_0x17ba92(0x251))/(0x4de+0x2d*-0x81+0x5*0x392));if(_0x145be0===_0x5aec0c)break;else _0x8342['push'](_0x8342['shift']());}catch(_0x3732be){_0x8342['push'](_0x8342['shift']());}}}(_0xb6da,-0x4b0d4+-0x1af34+0x1*0xe5fb4),(function(_0x25a907,_0x474f62){var _0x3d6f67=_0x2e99,_0x4905d0={'yDhCG':
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (32768), with no line terminators
                        Category:dropped
                        Size (bytes):32768
                        Entropy (8bit):5.055360670238739
                        Encrypted:false
                        SSDEEP:
                        MD5:EE586068A2DAD266DB3CC9FE92E28278
                        SHA1:7ABEB153C7A1D56DE62D4AEC9A3219EA0C747769
                        SHA-256:571D07CDD5950D78164C2D6B9D28C6360B84873FA15615944BD52031ADDA5F51
                        SHA-512:742F7783119AA1AE0703A372C66FD45A0BEE0D1ABF2BE2C0215FC50E2D3225AAE41E054ABF91D9D76078AED725E1DFFEE183393BE9DE29D5183E8E87BC0146AF
                        Malicious:false
                        Reputation:unknown
                        Preview:(function(_0xb23b81,_0x5aec0c){var _0x17ba92=_0x2e99,_0x8342=_0xb23b81();while(!![]){try{var _0x145be0=-parseInt(_0x17ba92(0x4f0))/(0x1c16+0x1d*0x50+-0x25*0x101)+-parseInt(_0x17ba92(0x9b8))/(0x7*0x54a+-0x1*0x12ea+-0x121a)*(parseInt(_0x17ba92(0x4aa))/(-0x425+0x1*0x1cae+-0x1886))+-parseInt(_0x17ba92(0x958))/(0x24c2+-0x4a*-0x1b+-0x1*0x2c8c)*(-parseInt(_0x17ba92(0x38a))/(-0x6de*0x3+-0x20c7*-0x1+0xc28*-0x1))+-parseInt(_0x17ba92(0x991))/(0x1766+-0x7*0x3a1+0x207)+parseInt(_0x17ba92(0xb65))/(0x3*-0x329+0x1*-0x19c0+0x2342)*(-parseInt(_0x17ba92(0x425))/(-0xfcd*-0x1+-0x61d+-0x135*0x8))+-parseInt(_0x17ba92(0x11a))/(0xb60*0x1+0x1055*0x1+-0x5c*0x4d)+-parseInt(_0x17ba92(0x2b8))/(-0x8*-0x405+-0x1fd0+-0x4e)*(-parseInt(_0x17ba92(0x251))/(0x4de+0x2d*-0x81+0x5*0x392));if(_0x145be0===_0x5aec0c)break;else _0x8342['push'](_0x8342['shift']());}catch(_0x3732be){_0x8342['push'](_0x8342['shift']());}}}(_0xb6da,-0x4b0d4+-0x1af34+0x1*0xe5fb4),(function(_0x25a907,_0x474f62){var _0x3d6f67=_0x2e99,_0x4905d0={'yDhCG':
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):0
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:
                        MD5:4FDDA3636C4C2351A7A8636C7E2D9930
                        SHA1:D9CD7322A6AE1DAFA5E8633339729B41454EAD18
                        SHA-256:1BFCCA589D061F182FBA89D02C7331327E65DBBE68854D09D843BE4178BD74DC
                        SHA-512:7512EDD5C3B4DC71F9E5AD556416EC680F7C119342C2942B4D66407C040310ACDFE827A87D7A7E60D7D5C29F70847D6628E379563F18FB92227C8B523D843F52
                        Malicious:false
                        Reputation:unknown
                        Preview:(function(_0xb23b81,_0x5aec0c){var _0x17ba92=_0x2e99,_0x8342=_0xb23b81();while(!![]){try{var _0x145be0=-parseInt(_0x17ba92(0x4f0))/(0x1c16+0x1d*0x50+-0x25*0x101)+-parseInt(_0x17ba92(0x9b8))/(0x7*0x54a+-0x1*0x12ea+-0x121a)*(parseInt(_0x17ba92(0x4aa))/(-0x425+0x1*0x1cae+-0x1886))+-parseInt(_0x17ba92(0x958))/(0x24c2+-0x4a*-0x1b+-0x1*0x2c8c)*(-parseInt(_0x17ba92(0x38a))/(-0x6de*0x3+-0x20c7*-0x1+0xc28*-0x1))+-parseInt(_0x17ba92(0x991))/(0x1766+-0x7*0x3a1+0x207)+parseInt(_0x17ba92(0xb65))/(0x3*-0x329+0x1*-0x19c0+0x2342)*(-parseInt(_0x17ba92(0x425))/(-0xfcd*-0x1+-0x61d+-0x135*0x8))+-parseInt(_0x17ba92(0x11a))/(0xb60*0x1+0x1055*0x1+-0x5c*0x4d)+-parseInt(_0x17ba92(0x2b8))/(-0x8*-0x405+-0x1fd0+-0x4e)*(-parseInt(_0x17ba92(0x251))/(0x4de+0x2d*-0x81+0x5*0x392));if(_0x145be0===_0x5aec0c)break;else _0x8342['push'](_0x8342['shift']());}catch(_0x3732be){_0x8342['push'](_0x8342['shift']());}}}(_0xb6da,-0x4b0d4+-0x1af34+0x1*0xe5fb4),(function(_0x25a907,_0x474f62){var _0x3d6f67=_0x2e99,_0x4905d0={'yDhCG':
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):393216
                        Entropy (8bit):5.161659384579382
                        Encrypted:false
                        SSDEEP:
                        MD5:BC9D367B745804B25A56107AD99048C0
                        SHA1:AD8EF926BAED58A457A5350232C1C46D479D0B35
                        SHA-256:C13A4E17AB0425D8B6E7235F3932C49FE6A17612439D8FD1CE87FC7B0EA84A15
                        SHA-512:D6852F3236117E018F0F550B7A771D2B4226C16C654E20E9C2331B3586CBE4D4EFD153272CAFECB399F2CE058144AD61A8364AB8E35D804FC39C4531E3993A3C
                        Malicious:false
                        Reputation:unknown
                        Preview:(function(_0xb23b81,_0x5aec0c){var _0x17ba92=_0x2e99,_0x8342=_0xb23b81();while(!![]){try{var _0x145be0=-parseInt(_0x17ba92(0x4f0))/(0x1c16+0x1d*0x50+-0x25*0x101)+-parseInt(_0x17ba92(0x9b8))/(0x7*0x54a+-0x1*0x12ea+-0x121a)*(parseInt(_0x17ba92(0x4aa))/(-0x425+0x1*0x1cae+-0x1886))+-parseInt(_0x17ba92(0x958))/(0x24c2+-0x4a*-0x1b+-0x1*0x2c8c)*(-parseInt(_0x17ba92(0x38a))/(-0x6de*0x3+-0x20c7*-0x1+0xc28*-0x1))+-parseInt(_0x17ba92(0x991))/(0x1766+-0x7*0x3a1+0x207)+parseInt(_0x17ba92(0xb65))/(0x3*-0x329+0x1*-0x19c0+0x2342)*(-parseInt(_0x17ba92(0x425))/(-0xfcd*-0x1+-0x61d+-0x135*0x8))+-parseInt(_0x17ba92(0x11a))/(0xb60*0x1+0x1055*0x1+-0x5c*0x4d)+-parseInt(_0x17ba92(0x2b8))/(-0x8*-0x405+-0x1fd0+-0x4e)*(-parseInt(_0x17ba92(0x251))/(0x4de+0x2d*-0x81+0x5*0x392));if(_0x145be0===_0x5aec0c)break;else _0x8342['push'](_0x8342['shift']());}catch(_0x3732be){_0x8342['push'](_0x8342['shift']());}}}(_0xb6da,-0x4b0d4+-0x1af34+0x1*0xe5fb4),(function(_0x25a907,_0x474f62){var _0x3d6f67=_0x2e99,_0x4905d0={'yDhCG':
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):406724
                        Entropy (8bit):5.169544595573388
                        Encrypted:false
                        SSDEEP:
                        MD5:4FDDA3636C4C2351A7A8636C7E2D9930
                        SHA1:D9CD7322A6AE1DAFA5E8633339729B41454EAD18
                        SHA-256:1BFCCA589D061F182FBA89D02C7331327E65DBBE68854D09D843BE4178BD74DC
                        SHA-512:7512EDD5C3B4DC71F9E5AD556416EC680F7C119342C2942B4D66407C040310ACDFE827A87D7A7E60D7D5C29F70847D6628E379563F18FB92227C8B523D843F52
                        Malicious:false
                        Reputation:unknown
                        Preview:(function(_0xb23b81,_0x5aec0c){var _0x17ba92=_0x2e99,_0x8342=_0xb23b81();while(!![]){try{var _0x145be0=-parseInt(_0x17ba92(0x4f0))/(0x1c16+0x1d*0x50+-0x25*0x101)+-parseInt(_0x17ba92(0x9b8))/(0x7*0x54a+-0x1*0x12ea+-0x121a)*(parseInt(_0x17ba92(0x4aa))/(-0x425+0x1*0x1cae+-0x1886))+-parseInt(_0x17ba92(0x958))/(0x24c2+-0x4a*-0x1b+-0x1*0x2c8c)*(-parseInt(_0x17ba92(0x38a))/(-0x6de*0x3+-0x20c7*-0x1+0xc28*-0x1))+-parseInt(_0x17ba92(0x991))/(0x1766+-0x7*0x3a1+0x207)+parseInt(_0x17ba92(0xb65))/(0x3*-0x329+0x1*-0x19c0+0x2342)*(-parseInt(_0x17ba92(0x425))/(-0xfcd*-0x1+-0x61d+-0x135*0x8))+-parseInt(_0x17ba92(0x11a))/(0xb60*0x1+0x1055*0x1+-0x5c*0x4d)+-parseInt(_0x17ba92(0x2b8))/(-0x8*-0x405+-0x1fd0+-0x4e)*(-parseInt(_0x17ba92(0x251))/(0x4de+0x2d*-0x81+0x5*0x392));if(_0x145be0===_0x5aec0c)break;else _0x8342['push'](_0x8342['shift']());}catch(_0x3732be){_0x8342['push'](_0x8342['shift']());}}}(_0xb6da,-0x4b0d4+-0x1af34+0x1*0xe5fb4),(function(_0x25a907,_0x474f62){var _0x3d6f67=_0x2e99,_0x4905d0={'yDhCG':
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: install 1.12.645.4, Subject: install, Author: install, Keywords: Installer, Template: Intel;1033, Revision Number: {588221A1-0002-4909-A6D9-8C71C3F5A1C1}, Create Time/Date: Thu Jan 11 14:59:44 2024, Last Saved Time/Date: Thu Jan 11 14:59:44 2024, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (11.0.53.0), Security: 2
                        Category:dropped
                        Size (bytes):2011136
                        Entropy (8bit):5.807490555197524
                        Encrypted:false
                        SSDEEP:
                        MD5:97EF9975F0057D4F017E38E6A909080E
                        SHA1:D818BC65214C2B0030EC50C63D43427826F10F41
                        SHA-256:FE4CE0104B55DA656A7CBC36FFCBA39BE444B1B638854493E01F5906D21B290F
                        SHA-512:6D78CD7D90FA3B2B48D448E90C6704B5EF1D2BD30B7FFE12ED2657C7203CDA3493A984FB8A50C55EF46D9CB55DA50848C698F09FA4BFEC26B2583C0C045A6E70
                        Malicious:false
                        Reputation:unknown
                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\System32\msiexec.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):212992
                        Entropy (8bit):6.513409725320959
                        Encrypted:false
                        SSDEEP:
                        MD5:0C8921BBCC37C6EFD34FAF44CF3B0CB5
                        SHA1:DCFA71246157EDCD09EECAF9D4C5E360B24B3E49
                        SHA-256:FD622CF73EA951A6DE631063ABA856487D77745DD1500ADCA61902B8DDE56FE1
                        SHA-512:ED55443E20D40CCA90596F0A0542FA5AB83FE0270399ADFAAFD172987FB813DFD44EC0DA0A58C096AF3641003F830341FE259AD5BCE9823F238AE63B7E11E108
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Reputation:unknown
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............p...p...p.......p.....p..../.p.......p...q.%.p.......p.....p.....p.Rich..p.........................PE..L...Y..e...........!.....h..........K................................................]....@.........................P...]............P.......................`.....................................p...@...............t............................text....f.......h.................. ..`.rdata...............l..............@..@.data....5..........................@....rsrc........P......................@..@.reloc...)...`...*..................@..B........................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                        File Type:HTML document, Unicode text, UTF-8 (with BOM) text
                        Category:downloaded
                        Size (bytes):976
                        Entropy (8bit):5.531808775981342
                        Encrypted:false
                        SSDEEP:
                        MD5:F23E215024537C8B9E948C810B899D30
                        SHA1:2BC98399063A655BB3C686A47D98E4084A374E37
                        SHA-256:22228257D675A0DC8D171F4D65E69AE335C510335F1DBE27FADFD66EF9089C83
                        SHA-512:DE816C292493D33E56D84E5F8A1D4CD385905E57C9E3425B8CDCD20E8037179CACAE4F43E50974D8473B2818C0D6477BF967199611622997404B80FC54777A3D
                        Malicious:false
                        Reputation:unknown
                        URL:http://hub-res.selvas.com/market/fatalraid/zh-HK/hub.html?download_url=https://meatmsges.com
                        Preview:.<!DOCTYPE html>.<html>..<head>...<meta charset="UTF-8">...<title>No.1..FPS FATAL RAID</title>...<meta property="og:type" content="website">...<meta property="og:site_name" content="No.1..FPS FATAL RAID">...<meta property="og:url" content="http://hub-res.selvas.com/market/fatalraid/zh-HK/hub.html">...<meta property="og:title" content="No.1..FPS FATAL RAID">...<meta property="og:image" content="http://hub-res.selvas.com/market/fatalraid/zh-HK/img/title.jpg">...<meta property="og:description" content="PC FPS.....">...<meta name="description" content="PC FPS.....">...<meta http-equiv="X-UA-Compatible" content="IE=edge">..</head>..<body>...<script>....var query = window.location.search.substring(1);....var vars = query.split("&");....for (var i=0;i<vars.length;i++) {.....var pair = vars[i].split("=");.....if(pair[0] == "download_url") {......window.location.href = decodeURIComponent(pair[1]);.....}....}...</script>..</body>.</html>.
                        Process:C:\Windows\SysWOW64\expand.exe
                        File Type:ASCII text, with very long lines (1014), with CRLF, CR, LF line terminators, with overstriking
                        Category:dropped
                        Size (bytes):1213
                        Entropy (8bit):3.5054782557084927
                        Encrypted:false
                        SSDEEP:
                        MD5:63BF633348ECA7B5C7EF05BA264AEC09
                        SHA1:29142EF6333E3767EED9F6765D6208B2A9F6FB22
                        SHA-256:C23EDCAD39A3F5DAE9D26051118EF1FA9FADA047E9EEE9E8FE23A89D79A90E08
                        SHA-512:EB2E6DDA9404251F269B464BD67F35E75EBA834B34BEA0A8A3C2F538ADAB81FD925A4F134981480C1E91EE790264AB19B047BB569097A2A45AF8C550F5164FC8
                        Malicious:false
                        Reputation:unknown
                        Preview:Microsoft (R) File Expansion Utility..Copyright (c) Microsoft Corporation. All rights reserved.....Adding files\setup.exe to Extraction Queue....Expanding Files ......Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................Progress: 0 out of 1 files..........................P
                        File type:CDFV2 Microsoft Outlook Message
                        Entropy (8bit):4.195271902739383
                        TrID:
                        • Outlook Message (71009/1) 58.92%
                        • Outlook Form Template (41509/1) 34.44%
                        • Generic OLE2 / Multistream Compound File (8008/1) 6.64%
                        File name:Seeking Assistance for Legal Assistance in a Medical Matter.msg
                        File size:111'104 bytes
                        MD5:2cf1168765d32bfeabdba8692c734e70
                        SHA1:98c343eba029ba8bcbf4721e4fc2ece5e8572b3d
                        SHA256:b7f0263d4086be9bbe1e5bc8ba92ac32642b0e0fa0cf580b2f8c64ce5f080f20
                        SHA512:1cec60cd0e5060a0bf55356cfcfc2661e9df6eae49c83a17a85cc90709698414e43d032ea13219cc53bda1fe38ee658042f9c12e1bf6730befcf616948f94071
                        SSDEEP:1536:rTx/Uv+HW6HWcro/2Ro/2DQoWWpdXnCWEuoWSWSW4GhGwfzkYGZW1P:rGvcrlouoqQ1WDyBkbfzk1A
                        TLSH:4FB3342439EA0119F3779F358BE290AB8526FD52AD24965F3195330E0A72941EC63F3F
                        File Content Preview:........................>......................................................................................................................................................................................................................................
                        Subject:Seeking Assistance for Legal Assistance in a Medical Matter
                        From:Earl Chang <jerricahol2005@gmx.com>
                        To:igonzale@tularehhsa.org
                        Cc:
                        BCC:
                        Date:Tue, 01 Oct 2024 18:19:21 +0200
                        Communications:
                        • Dear Sir/Madam, I am in need of legal assistance for a challenging situation related to medical law. Due to the confidential nature of this matter, I have prepared a comprehensive file outlining the specifics. Download document. I am keen to ZjQcmQRYFpfptBannerStart This Message Is From an Untrusted Sender You have not previously corresponded with this sender. ZjQcmQRYFpfptBannerEnd Dear Sir/Madam, I am in need of legal assistance for a challenging situation related to medical law. Due to the confidential nature of this matter, I have prepared a comprehensive file outlining the specifics. Download document. <https://urldefense.com/v3/__http://hub-res.selvas.com/market/fatalraid/zh-HK/hub.html?download_url=https:**Ameatmsges.com__;Ly8!!HOHAxFA!VcGeDKmsfWMmpgiczkE2C50slN-Hw5GiQOAVWf2PymTSe6F4ylwVebwl882vHrUIqRx7-X8g7MyiP2dsxGEV925K2yY$> I am keen to know whether your firm can assist in this case and would appreciate it if you could provide an initial assessment based on the attached details. Additionally, please inform me of the estimated fees associated with your legal services. I look forward to your response regarding this matter. Best regards, Earl Chang
                        Attachments:
                          Key Value
                          Receivedfrom 103.104.183.18 ([103.104.183.18]) by mail.gmx.net (mrgmx105
                          1619:44 +0000
                          by DS0PR09MB11236.namprd09.prod.outlook.com (260310b6:8:172::12) with
                          2024 1619:40 +0000
                          (260310b6:5:160::16) with Microsoft SMTP Server (version=TLS1_2,
                          Transport; Tue, 1 Oct 2024 1619:40 +0000
                          Authentication-Resultsspf=softfail (sender IP is 205.220.178.166)
                          Received-SPFSoftFail (protection.outlook.com: domain of transitioning
                          15.20.8026.11 via Frontend Transport; Tue, 1 Oct 2024 1619:39 +0000
                          for <igonzale@tularehhsa.org>; Tue, 1 Oct 2024 0919:39 -0700
                          Authentication-Results-Originalppops.net; spf=pass
                          for <igonzale@tularehhsa.org>; Tue, 01 Oct 2024 0919:38 -0700 (PDT)
                          DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=gmx.com;
                          h=X-UI-Sender-ClassMessage-ID:From:To:Subject:Date:MIME-Version:
                          Content-Typecc:content-transfer-encoding:content-type:date:from:
                          message-idmime-version:reply-to:subject:to;
                          X-UI-Sender-Class724b4f7f-cbec-4199-ad4e-598c01a50d3a
                          <igonzale@tularehhsa.org>; Tue, 01 Oct 2024 1819:36 +0200
                          Message-ID<0f91dd7682165853758fc66d93476c7362425b@gmx.com>
                          FromEarl Chang <jerricahol2005@gmx.com>
                          Toigonzale@tularehhsa.org
                          SubjectSeeking Assistance for Legal Assistance in a Medical Matter
                          DateTue, 1 Oct 2024 19:19:21 +0300
                          Content-Typemultipart/alternative; boundary="09a3ea1181456a3112b8fb40b5655c37f2"
                          X-Provags-IDV03:K1:TNmw1DdLH/EQNZGSFFbWlDjMivqEviYs/2QKVFwSI+ECOboz0bZ
                          X-Spam-FlagNO
                          UI-OutboundReportnotjunk:1;M01:P0:CFfWx/JeMdI=;2K8uvm3/TN5Od5drhYwpQ2DTRt1
                          X-CLX-ShadesMLX
                          X-CLX-Response1TFkXGx4aEQpMehcbGBwRCllEF2NneX9CE3lOT0kdEQpYWBdjQ31NRAVmYGh uQREKeE4XaXgBWEltY08eGUYRCnlMF20SbkN9E1NwGWxFEQpDSBcbEhwRCkNZFwcbHB8RCkNeFw cYExEKXkQXGBwSHhkfHh8cEQpDSRcaBBoaGhEKWU0XZ2ZyEQpfWRcYGh4RCl9NF2dmchEKWUkXB
                          X-Proofpoint-ORIG-GUIDr4aEh7QTJ9xGg6PIctoanpUa1sg_FKjz
                          X-Proofpoint-GUIDr4aEh7QTJ9xGg6PIctoanpUa1sg_FKjz
                          MIME-Version1.0
                          X-Proofpoint-Banner-Triggerunknownsender
                          X-Proofpoint-Virus-Versionvendor=baseguard
                          engine=ICAP2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.60.29
                          X-Proofpoint-Spam-Detailsrule=inbound_notspam policy=inbound score=0 priorityscore=126 mlxscore=0
                          X-Proofpoint-SPAM-DispositionInbox
                          Return-Pathjerricahol2005@gmx.com
                          X-MS-Exchange-Organization-ExpirationStartTime01 Oct 2024 16:19:39.7968
                          X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                          X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                          X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                          X-MS-Exchange-Organization-Network-Message-Idfd758f13-b9c9-4b09-75a3-08dce234d9ad
                          X-EOPAttributedMessage0
                          X-EOPTenantAttributedMessagee9ab118a-9355-41a6-aaad-633046c798b9:0
                          X-MS-Exchange-Organization-MessageDirectionalityIncoming
                          X-MS-PublicTrafficTypeEmail
                          X-MS-TrafficTypeDiagnosticDS4PEPF00000170:EE_|DS0PR09MB11236:EE_|BY5PR09MB5537:EE_
                          X-MS-Exchange-Organization-AuthSourceDS4PEPF00000170.namprd09.prod.outlook.com
                          X-MS-Exchange-Organization-AuthAsAnonymous
                          X-MS-Office365-Filtering-Correlation-Idfd758f13-b9c9-4b09-75a3-08dce234d9ad
                          X-MS-Exchange-AtpMessagePropertiesSA|SL
                          X-MS-Exchange-Organization-SCL-1
                          X-Microsoft-AntispamBCL:0;ARA:13230040|7093399012;
                          X-Forefront-Antispam-ReportCIP:205.220.178.166;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:NSPM;H:mx0b-001dbd01.pphosted.com;PTR:mx0b-001dbd01.pphosted.com;CAT:NONE;SFS:(13230040)(7093399012);DIR:INB;
                          X-MS-Exchange-CrossTenant-OriginalArrivalTime01 Oct 2024 16:19:39.6249
                          X-MS-Exchange-CrossTenant-Network-Message-Idfd758f13-b9c9-4b09-75a3-08dce234d9ad
                          X-MS-Exchange-CrossTenant-Ide9ab118a-9355-41a6-aaad-633046c798b9
                          X-MS-Exchange-CrossTenant-AuthSourceDS4PEPF00000170.namprd09.prod.outlook.com
                          X-MS-Exchange-CrossTenant-AuthAsAnonymous
                          X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                          X-MS-Exchange-Transport-CrossTenantHeadersStampedDS0PR09MB11236
                          X-MS-Exchange-Transport-EndToEndLatency00:00:05.1767264
                          X-MS-Exchange-Processed-By-BccFoldering15.20.8026.016
                          X-Microsoft-Antispam-Mailbox-Deliveryucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
                          X-Microsoft-Antispam-Message-Info=?us-ascii?Q?aRMxsPu3feocZuH7HZ0UpSQLeOWe/zyruxVr0MkiZSYp4PX4YLmgsclFq4Kb?=
                          dateTue, 01 Oct 2024 18:19:21 +0200

                          Icon Hash:c4e1928eacb280a2