Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Seek Summon Counsel.eml

Overview

General Information

Sample name:Seek Summon Counsel.eml
Analysis ID:1528209
MD5:82266fd56b3565b8df974af1232ff1c0
SHA1:9881f80881a71b2729188750489d014607406c39
SHA256:dc6ddf686f7d377ef972b73270ef666befff2e9d3ca44e9eb647f46a33246356
Infos:

Detection

Score:21
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

AI detected landing page (webpage, office document or email)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification

Classification

  • System is w10x64
  • OUTLOOK.EXE (PID: 7312 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Seek Summon Counsel.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 7948 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "D821EF8A-FE73-41D8-8296-EE8DC72CF22E" "3775079F-C351-49A2-937B-BBD365F088EC" "7312" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 7312, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: Seek Summon Counsel.emlString found in binary or memory: <http://www.twitter.com/grubhub>* equals www.twitter.com (Twitter)
Source: Seek Summon Counsel.emlString found in binary or memory: <http://www.twitter.com/seamless>* equals www.twitter.com (Twitter)
Source: Seek Summon Counsel.emlString found in binary or memory: =3D"http://www.facebook.com/grubhub" style=3D"color:rgb(17,85,204)" target= equals www.facebook.com (Facebook)
Source: Seek Summon Counsel.emlString found in binary or memory: =3D"http://www.facebook.com/seamless" style=3D"color:rgb(17,85,204)" target= equals www.facebook.com (Facebook)
Source: ~WRS{A75EE814-F89A-4F57-9680-9A742F0E0BA7}.tmp.0.drString found in binary or memory: HYPERLINK "http://www.facebook.com/grubhub" \t "_blank" equals www.facebook.com (Facebook)
Source: ~WRS{A75EE814-F89A-4F57-9680-9A742F0E0BA7}.tmp.0.drString found in binary or memory: HYPERLINK "http://www.facebook.com/seamless" \t "_blank" equals www.facebook.com (Facebook)
Source: ~WRS{A75EE814-F89A-4F57-9680-9A742F0E0BA7}.tmp.0.drString found in binary or memory: HYPERLINK "http://www.twitter.com/grubhub" \t "_blank" equals www.twitter.com (Twitter)
Source: ~WRS{A75EE814-F89A-4F57-9680-9A742F0E0BA7}.tmp.0.drString found in binary or memory: HYPERLINK "http://www.twitter.com/seamless" \t "_blank" equals www.twitter.com (Twitter)
Source: Seek Summon Counsel.emlString found in binary or memory: f=3D"http://www.twitter.com/grubhub" style=3D"color:rgb(17,85,204)" target= equals www.twitter.com (Twitter)
Source: Seek Summon Counsel.emlString found in binary or memory: grubhub.com | *fb <http://www.facebook.com/grubhub>* | *tw equals www.facebook.com (Facebook)
Source: Seek Summon Counsel.emlString found in binary or memory: seamless.com | *fb <http://www.facebook.com/seamless>* | *tw equals www.facebook.com (Facebook)
Source: Seek Summon Counsel.emlString found in binary or memory: style=3D"color:rgb(17,85,204)"><a href=3D"http://www.twitter.com/seamless" = equals www.twitter.com (Twitter)
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: http://b.c2r.ts.cdn.office.net/pr
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr
Source: Seek Summon Counsel.eml, ~WRS{A75EE814-F89A-4F57-9680-9A742F0E0BA7}.tmp.0.drString found in binary or memory: http://grubhub.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
Source: Seek Summon Counsel.eml, ~WRS{A75EE814-F89A-4F57-9680-9A742F0E0BA7}.tmp.0.drString found in binary or memory: http://seamless.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
Source: 34229658306.ttf.0.drString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: Seek Summon Counsel.eml, ~WRS{A75EE814-F89A-4F57-9680-9A742F0E0BA7}.tmp.0.drString found in binary or memory: http://www.twitter.com/grubhub
Source: Seek Summon Counsel.eml, ~WRS{A75EE814-F89A-4F57-9680-9A742F0E0BA7}.tmp.0.drString found in binary or memory: http://www.twitter.com/seamless
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/acquisitionlogging
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/download
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/authenticated
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/unauthenticated
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://addinsinstallation.store.office.com/orgid/appinstall/authenticated
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://addinslicensing.store.office.com/apps/remove
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://addinslicensing.store.office.com/commerce/query
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://addinslicensing.store.office.com/entitlement/query
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/apps/remove
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/entitlement/query
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.aadrm.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.aadrm.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.addins.omex.office.net/api/addins/search
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.addins.store.office.com/addinstemplate
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.addins.store.office.com/app/query
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.addins.store.officeppe.com/addinstemplate
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.cortana.ai
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.diagnostics.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/feedback
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/file
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.microsoftstream.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.microsoftstream.com/api/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.office.net
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.officescripts.microsoftusercontent.com/api
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.onedrive.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/imports
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://api.scheduler.
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://apis.live.net/v5.0/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://apis.mobile.m365.svc.cloud.microsoft
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://app.powerbi.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://augloop.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://augloop.office.com/v2
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://autodiscover-s.outlook.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://canary.designerapp.
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cdn.designerapp.osi.office.net
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cdn.designerapp.osi.office.net/designer-mobile
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cdn.designerapp.osi.office.net/designerapp/fonts
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cdn.designerapp.osi.office.net/designerapp/mobile-assets
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cdn.designerapp.osi.office.net/designerapp/mobile-dynamic-strings
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cdn.designerapp.osi.office.net/designerapp/mobile-home-screen
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cdn.entity.
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cdn.hubblecontent.osi.office.net/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cdn.int.designerapp.osi.office.net/fonts
Source: ~WRS{A75EE814-F89A-4F57-9680-9A742F0E0BA7}.tmp.0.drString found in binary or memory: https://ci3.googleusercontent.com/mail-sig/AIorK4z9PouxfW1HVZLFP8RtpYtK59UAJWKhtSZNn0WFh5L3SDibY_HwE
Source: Seek Summon Counsel.emlString found in binary or memory: https://ci3.googleusercontent.com/mail-sig/AIorK4z9PouxfW1HVZLFP8RtpYtK=
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://clients.config.office.net
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://clients.config.office.net/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://clients.config.office.net/c2r/v1.0/DeltaAdvisory
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://consent.config.office.com/consentcheckin/v1.0/consents
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://consent.config.office.com/consentweb/v1.0/consents
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cortana.ai
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cortana.ai/api
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://cr.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://d.docs.live.net
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://dataservice.o365filtering.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://dataservice.o365filtering.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://designerapp.azurewebsites.net
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://designerappservice.officeapps.live.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://dev.cortana.ai
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://devnull.onenote.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://directory.services.
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://ecs.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://ecs.office.com/config/v1/Designer
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://edge.skype.com/registrar/prod
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://edge.skype.com/rps
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://enrichment.osi.office.net/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Refresh/v1
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Resolve/v1
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Search/v1
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/StockHistory/v1
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/ipcheck/v1
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/v2.1601652342626
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/metadata.json
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/desktop/main.cshtml
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/web/main.cshtml
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://fpastorage.cdn.office.net/%s
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://fpastorage.cdn.office.net/firstpartyapp/addins.xml
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://graph.ppe.windows.net
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://graph.ppe.windows.net/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://graph.windows.net
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://graph.windows.net/
Source: Seek Summon Counsel.emlString found in binary or memory: https://groups.google.com/a/grubhub.com/group/secops/
Source: Seek Summon Counsel.emlString found in binary or memory: https://groups.google.com/a/grubhub.com/group/secops/post
Source: Seek Summon Counsel.emlString found in binary or memory: https://groups.google.com/a/grubhub.com/group/secops/subscribe
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/pivots/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?secureurl=1
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://ic3.teams.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://incidents.diagnostics.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://inclient.store.office.com/gyro/client
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://inclient.store.office.com/gyro/clientstore
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://invites.office.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://lifecycle.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://login.microsoftonline.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://login.microsoftonline.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://login.microsoftonline.com/organizations
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://login.windows.local
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://make.powerautomate.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://management.azure.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://management.azure.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://messagebroker.mobile.m365.svc.cloud.microsoft
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://messaging.action.office.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://messaging.action.office.com/setcampaignaction
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://messaging.action.office.com/setuseraction16
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://messaging.engagement.office.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://messaging.engagement.office.com/campaignmetadataaggregator
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://messaging.lifecycle.office.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://messaging.lifecycle.office.com/getcustommessage16
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://messaging.office.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://metadata.templates.cdn.office.net/client/log
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://mss.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://my.microsoftpersonalcontent.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://ncus.contentsync.
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://ncus.pagecontentsync.
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://ods-diagnostics-ppe.trafficmanager.net
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://officeapps.live.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://officepyservice.office.net/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://officepyservice.office.net/service.functionality
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentities
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentitiesupdated
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://onedrive.live.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://onedrive.live.com/embed?
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://otelrules.azureedge.net
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://otelrules.svc.static.microsoft
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://outlook.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://outlook.office.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://outlook.office365.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://outlook.office365.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://outlook.office365.com/connectors
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://pages.store.office.com/review/query
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://powerlift.acompli.net
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://prod.mds.office.com/mds/api/v1.0/clientmodeldirectory
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://pushchannel.1drv.ms
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://res.cdn.office.net
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://res.cdn.office.net/mro1cdnstorage/fonts/prod/4.40
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://res.cdn.office.net/polymer/models
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://safelinks.protection.outlook.com/api/GetPolicy
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://service.officepy.microsoftusercontent.com/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://service.powerapps.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://settings.outlook.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://shell.suite.office.com:1443
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://skyapi.live.net/Activity/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://staging.cortana.ai
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://store.office.cn/addinstemplate
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://store.office.de/addinstemplate
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://substrate.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://substrate.office.com/Notes-Internal.ReadWrite
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://substrate.office.com/search/api/v1/SearchHistory
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://substrate.office.com/search/api/v2/init
Source: Seek Summon Counsel.emlString found in binary or memory: https://support.google.com/a/grubhub.com/bin/topic.py?topic=25838
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://tasks.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://templatesmetadata.office.net/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://useraudit.o365auditrealtimeingestion.manage.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://web.microsoftstream.com/video/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://webshell.suite.office.com
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://word-edit.officeapps.live.com/we/rrdiscovery.ashx
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://wus2.contentsync.
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://wus2.pagecontentsync.
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://www.odwebp.svc.ms
Source: 81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drString found in binary or memory: https://www.yammer.com
Source: classification engineClassification label: sus21.winEML@3/18@0/0
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmpJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241007T1048380700-7312.etlJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Seek Summon Counsel.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "D821EF8A-FE73-41D8-8296-EE8DC72CF22E" "3775079F-C351-49A2-937B-BBD365F088EC" "7312" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "D821EF8A-FE73-41D8-8296-EE8DC72CF22E" "3775079F-C351-49A2-937B-BBD365F088EC" "7312" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior

Persistence and Installation Behavior

barindex
Source: PDF documentLLM: Page contains button: 'Click to View' Source: 'PDF document'
Source: PDF documentLLM: PDF document contains prominent button: 'click to view'
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformationJump to behavior
Source: Seek Summon Counsel.emlBinary or memory string: SxnOcVm1qdlOWhBHGD1FPa3BHT+VKh2nGKthgfShIp1GjNNsM9P0FPitxnp39BWjsB7fpTljAOcf
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager13
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1528209 Sample: Seek Summon Counsel.eml Startdate: 07/10/2024 Architecture: WINDOWS Score: 21 10 AI detected landing page (webpage, office document or email) 2->10 6 OUTLOOK.EXE 66 149 2->6         started        process3 process4 8 ai.exe 6->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://api.diagnosticssdf.office.com0%URL Reputationsafe
https://login.microsoftonline.com/0%URL Reputationsafe
https://shell.suite.office.com:14430%URL Reputationsafe
https://designerapp.azurewebsites.net0%URL Reputationsafe
https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize0%URL Reputationsafe
https://autodiscover-s.outlook.com/0%URL Reputationsafe
https://useraudit.o365auditrealtimeingestion.manage.office.com0%URL Reputationsafe
https://outlook.office365.com/connectors0%URL Reputationsafe
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr0%URL Reputationsafe
https://cdn.entity.0%URL Reputationsafe
https://api.addins.omex.office.net/appinfo/query0%URL Reputationsafe
https://clients.config.office.net/user/v1.0/tenantassociationkey0%URL Reputationsafe
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/0%URL Reputationsafe
https://powerlift.acompli.net0%URL Reputationsafe
https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
https://lookup.onenote.com/lookup/geolocation/v10%URL Reputationsafe
https://cortana.ai0%URL Reputationsafe
https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech0%URL Reputationsafe
https://api.powerbi.com/v1.0/myorg/imports0%URL Reputationsafe
https://cloudfiles.onenote.com/upload.aspx0%URL Reputationsafe
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
https://entitlement.diagnosticssdf.office.com0%URL Reputationsafe
https://api.aadrm.com/0%URL Reputationsafe
https://ofcrecsvcapi-int.azurewebsites.net/0%URL Reputationsafe
https://canary.designerapp.0%URL Reputationsafe
https://ic3.teams.office.com0%URL Reputationsafe
https://www.yammer.com0%URL Reputationsafe
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies0%URL Reputationsafe
https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive0%URL Reputationsafe
https://cr.office.com0%URL Reputationsafe
https://messagebroker.mobile.m365.svc.cloud.microsoft0%URL Reputationsafe
https://portal.office.com/account/?ref=ClientMeControl0%URL Reputationsafe
https://clients.config.office.net/c2r/v1.0/DeltaAdvisory0%URL Reputationsafe
https://edge.skype.com/registrar/prod0%URL Reputationsafe
https://graph.ppe.windows.net0%URL Reputationsafe
https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
https://tasks.office.com0%URL Reputationsafe
https://officeci.azurewebsites.net/api/0%URL Reputationsafe
https://sr.outlook.office.net/ws/speech/recognize/assistant/work0%URL Reputationsafe
https://api.scheduler.0%URL Reputationsafe
https://store.office.cn/addinstemplate0%URL Reputationsafe
https://api.aadrm.com0%URL Reputationsafe
https://edge.skype.com/rps0%URL Reputationsafe
https://globaldisco.crm.dynamics.com0%URL Reputationsafe
https://messaging.engagement.office.com/0%URL Reputationsafe
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech0%URL Reputationsafe
https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
https://www.odwebp.svc.ms0%URL Reputationsafe
https://api.diagnosticssdf.office.com/v2/feedback0%URL Reputationsafe
https://api.powerbi.com/v1.0/myorg/groups0%URL Reputationsafe
https://web.microsoftstream.com/video/0%URL Reputationsafe
https://api.addins.store.officeppe.com/addinstemplate0%URL Reputationsafe
https://graph.windows.net0%URL Reputationsafe
https://dataservice.o365filtering.com/0%URL Reputationsafe
https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
https://analysis.windows.net/powerbi/api0%URL Reputationsafe
https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
https://substrate.office.com0%URL Reputationsafe
https://outlook.office365.com/autodiscover/autodiscover.json0%URL Reputationsafe
https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios0%URL Reputationsafe
https://consent.config.office.com/consentcheckin/v1.0/consents0%URL Reputationsafe
https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech0%URL Reputationsafe
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices0%URL Reputationsafe
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json0%URL Reputationsafe
https://safelinks.protection.outlook.com/api/GetPolicy0%URL Reputationsafe
https://ncus.contentsync.0%URL Reputationsafe
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/0%URL Reputationsafe
http://weather.service.msn.com/data.aspx0%URL Reputationsafe
https://apis.live.net/v5.0/0%URL Reputationsafe
https://officepyservice.office.net/service.functionality0%URL Reputationsafe
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks0%URL Reputationsafe
https://templatesmetadata.office.net/0%URL Reputationsafe
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios0%URL Reputationsafe
https://messaging.lifecycle.office.com/0%URL Reputationsafe
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml0%URL Reputationsafe
https://mss.office.com0%URL Reputationsafe
https://pushchannel.1drv.ms0%URL Reputationsafe
https://management.azure.com0%URL Reputationsafe
https://outlook.office365.com0%URL Reputationsafe
https://wus2.contentsync.0%URL Reputationsafe
https://incidents.diagnostics.office.com0%URL Reputationsafe
https://clients.config.office.net/user/v1.0/ios0%URL Reputationsafe
https://make.powerautomate.com0%URL Reputationsafe
https://api.addins.omex.office.net/api/addins/search0%URL Reputationsafe
https://insertmedia.bing.office.net/odc/insertmedia0%URL Reputationsafe
https://outlook.office365.com/api/v1.0/me/Activities0%URL Reputationsafe
https://api.office.net0%URL Reputationsafe
https://incidents.diagnosticssdf.office.com0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://api.diagnosticssdf.office.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
  • URL Reputation: safe
unknown
https://login.microsoftonline.com/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
  • URL Reputation: safe
unknown
https://shell.suite.office.com:144381B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
  • URL Reputation: safe
unknown
https://support.google.com/a/grubhub.com/bin/topic.py?topic=25838Seek Summon Counsel.emlfalse
    unknown
    https://designerapp.azurewebsites.net81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://autodiscover-s.outlook.com/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://useraudit.o365auditrealtimeingestion.manage.office.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://outlook.office365.com/connectors81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://cdn.entity.81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://api.addins.omex.office.net/appinfo/query81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://clients.config.office.net/user/v1.0/tenantassociationkey81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://powerlift.acompli.net81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://rpsticket.partnerservices.getmicrosoftkey.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://lookup.onenote.com/lookup/geolocation/v181B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://cortana.ai81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://api.powerbi.com/v1.0/myorg/imports81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://cloudfiles.onenote.com/upload.aspx81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://entitlement.diagnosticssdf.office.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://api.aadrm.com/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://ofcrecsvcapi-int.azurewebsites.net/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://canary.designerapp.81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://ic3.teams.office.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://www.yammer.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
    • URL Reputation: safe
    unknown
    https://api.microsoftstream.com/api/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
      unknown
      https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
      • URL Reputation: safe
      unknown
      https://cr.office.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
      • URL Reputation: safe
      unknown
      https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
        unknown
        https://messagebroker.mobile.m365.svc.cloud.microsoft81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
        • URL Reputation: safe
        unknown
        https://otelrules.svc.static.microsoft81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
          unknown
          https://portal.office.com/account/?ref=ClientMeControl81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
          • URL Reputation: safe
          unknown
          https://clients.config.office.net/c2r/v1.0/DeltaAdvisory81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
          • URL Reputation: safe
          unknown
          https://edge.skype.com/registrar/prod81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
          • URL Reputation: safe
          unknown
          https://graph.ppe.windows.net81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
          • URL Reputation: safe
          unknown
          https://res.getmicrosoftkey.com/api/redemptionevents81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
          • URL Reputation: safe
          unknown
          https://powerlift-frontdesk.acompli.net81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
          • URL Reputation: safe
          unknown
          https://tasks.office.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
          • URL Reputation: safe
          unknown
          https://officeci.azurewebsites.net/api/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
          • URL Reputation: safe
          unknown
          https://sr.outlook.office.net/ws/speech/recognize/assistant/work81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
          • URL Reputation: safe
          unknown
          https://api.scheduler.81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
          • URL Reputation: safe
          unknown
          https://my.microsoftpersonalcontent.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
            unknown
            https://store.office.cn/addinstemplate81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
            • URL Reputation: safe
            unknown
            https://api.aadrm.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
            • URL Reputation: safe
            unknown
            https://edge.skype.com/rps81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
            • URL Reputation: safe
            unknown
            https://outlook.office.com/autosuggest/api/v1/init?cvid=81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
              unknown
              https://globaldisco.crm.dynamics.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
              • URL Reputation: safe
              unknown
              https://messaging.engagement.office.com/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
              • URL Reputation: safe
              unknown
              https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
              • URL Reputation: safe
              unknown
              https://dev0-api.acompli.net/autodetect81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
              • URL Reputation: safe
              unknown
              https://ci3.googleusercontent.com/mail-sig/AIorK4z9PouxfW1HVZLFP8RtpYtK59UAJWKhtSZNn0WFh5L3SDibY_HwE~WRS{A75EE814-F89A-4F57-9680-9A742F0E0BA7}.tmp.0.drfalse
                unknown
                http://www.twitter.com/grubhubSeek Summon Counsel.eml, ~WRS{A75EE814-F89A-4F57-9680-9A742F0E0BA7}.tmp.0.drfalse
                  unknown
                  https://www.odwebp.svc.ms81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://api.diagnosticssdf.office.com/v2/feedback81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://api.powerbi.com/v1.0/myorg/groups81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://web.microsoftstream.com/video/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://api.addins.store.officeppe.com/addinstemplate81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://graph.windows.net81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://dataservice.o365filtering.com/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://officesetup.getmicrosoftkey.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://analysis.windows.net/powerbi/api81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://prod-global-autodetect.acompli.net/autodetect81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://substrate.office.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://outlook.office365.com/autodiscover/autodiscover.json81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://consent.config.office.com/consentcheckin/v1.0/consents81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://d.docs.live.net81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                    unknown
                    https://safelinks.protection.outlook.com/api/GetPolicy81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                    • URL Reputation: safe
                    unknown
                    https://ncus.contentsync.81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                    • URL Reputation: safe
                    unknown
                    https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      unknown
                      https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      http://weather.service.msn.com/data.aspx81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://apis.live.net/v5.0/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://officepyservice.office.net/service.functionality81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://templatesmetadata.office.net/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://messaging.lifecycle.office.com/81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://mss.office.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://pushchannel.1drv.ms81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://management.azure.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://outlook.office365.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://wus2.contentsync.81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://incidents.diagnostics.office.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://clients.config.office.net/user/v1.0/ios81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://make.powerautomate.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://api.addins.omex.office.net/api/addins/search81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://groups.google.com/a/grubhub.com/group/secops/postSeek Summon Counsel.emlfalse
                        unknown
                        https://insertmedia.bing.office.net/odc/insertmedia81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://outlook.office365.com/api/v1.0/me/Activities81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://api.office.net81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://incidents.diagnosticssdf.office.com81B4339B-3C9A-4C05-9F98-81D50BE54F1B.0.drfalse
                        • URL Reputation: safe
                        unknown
                        No contacted IP infos
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1528209
                        Start date and time:2024-10-07 16:47:24 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 47s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:9
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Seek Summon Counsel.eml
                        Detection:SUS
                        Classification:sus21.winEML@3/18@0/0
                        Cookbook Comments:
                        • Found application associated with file extension: .eml
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 52.109.28.46, 52.113.194.132, 52.109.76.243, 2.19.126.151, 2.19.126.160, 184.28.90.27, 20.189.173.18
                        • Excluded domains from analysis (whitelisted): omex.cdn.office.net, slscr.update.microsoft.com, eur.roaming1.live.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, onedscolprdwus15.westus.cloudapp.azure.com, neu-azsc-000.roaming.officeapps.live.com, mobile.events.data.microsoft.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, ocsp.digicert.com, login.live.com, e16604.g.akamaiedge.net, officeclient.microsoft.com, prod.fs.microsoft.com.akadns.net, a1864.dscd.akamai.net, ecs.office.com, fs.microsoft.com, otelrules.azureedge.net, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, fe3cr.delivery.mp.microsoft.com, s-0005.s-msedge.net, config.officeapps.live.com, osiprod-neu-buff-azsc-000.northeurope.cloudapp.azure.com, ecs.office.trafficmanager.net, omex.cdn.office.net.akamaized.net, europe.configsvc1.live.com.akadns.net, mobile.events.data.trafficmanager.n
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • VT rate limit hit for: Seek Summon Counsel.eml
                        No simulations
                        InputOutput
                        URL: PDF document Model: jbxai
                        {
                        "brand":["PDF"],
                        "contains_trigger_text":true,
                        "trigger_text":"Click to View",
                        "prominent_button_name":"Click to View",
                        "text_input_field_labels":"unknown",
                        "pdf_icon_visible":true,
                        "has_visible_captcha":false,
                        "has_urgent_text":false,
                        "text":"Secure PDF Online Document",
                        "has_visible_qrcode":false}
                        URL: Email Model: jbxai
                        {
                        "brand":["grubhub.com"],
                        "contains_trigger_text":true,
                        "trigger_text":"A copy of the complaint detailing the specific claims against you is attached for your review.",
                        "prominent_button_name":"unknown",
                        "text_input_field_labels":"unknown",
                        "pdf_icon_visible":false,
                        "has_visible_captcha":false,
                        "has_urgent_text":true,
                        "text":"Legal received the below email and attachment. We have not taken any action on it as is looks like potential phishing to me. Please verify if this is a legitimate claim or an attempted attack. Thank you. Forwarded message From: flectycrtdservice via Legal Department <legal@grubhub.com> Date: Sat,
                         Sep 28,
                         2024 at 2:36 PM Subject: Seek Summon Counsel To: <legal@grubhub.com> You are hereby notified of a legal action initiated against you in the Circuit Court. Case Details: Case Number: 2024-CD-710854739706 Court: Circuit Court Hearing Date: Wednesday,
                         October 09,
                         2024 Hearing Time: 10:00 AM Attached Complaint: A copy of the complaint detailing the specific claims against you is attached for your review. Required Action: Please review the attached complaint carefully and respond within the specified timeframe. Important Notice: For accurate and complete case details,
                         refer to the official court records. This email does not constitute legal advice. Sincerely,
                         Court Clerk Michael A. Colmone Paralegal mcolmone@grubhub.com 111 W Washington St,
                         Ste 2100 Chicago,
                         IL 60602",
                        "has_visible_qrcode":false}
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):231348
                        Entropy (8bit):4.393201587403581
                        Encrypted:false
                        SSDEEP:1536:xTYLW5gsGkKyeua0algsH5NcAz79ysQqt2uqz6qoQDHrcm0FvMZ+yZiBFyzNCYI2:KYgjbLgqmiGu2OqoQbrt0FvMKan/nXj
                        MD5:00C84FF15634EF5F691EA8AF186487AD
                        SHA1:000170C8B748314AB77DCB06997C25FCB548DB59
                        SHA-256:4932A08C530C8FBF46627C2C09541D3019307B9B0F3D7A419005A77D2DFCA4D2
                        SHA-512:A9A6EE8AB1449A3418C65392BA0C0F042D8011D6FCD473A3BE682BCED68C1326CAC10DED83C573D11D3B906492FCD60EE238D154FB24CFE90258026A78CDBC3F
                        Malicious:false
                        Reputation:low
                        Preview:TH02...... .p.m.........SM01X...,.....a.............IPM.Activity...........h...............h............H..ht.o.......f&...h........ ...H..h\hub ...AppD...h...0....o....h..O...........h........_`"k...h...O@...I.Dw...h....H...8.'k...0....T...............d.........2h...............k..............!h.............. h.........o...#h....8.........$h .......8....."h R.......T....'h..t...........1h..O<.........0h....4....'k../h....h.....'kH..h....p...t.o...-h .........o...+hK..O....h.o................. ..............F7..............FIPM.Activity.st.Form.e..Standard.tanJournal Entry.pdIPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000.000Microsoft.ofThis form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:XML 1.0 document, ASCII text, with very long lines (2008), with no line terminators
                        Category:modified
                        Size (bytes):2008
                        Entropy (8bit):5.088484471846497
                        Encrypted:false
                        SSDEEP:48:cGErdyydSyrDdnzy0dy6Sy2ASyr6nzyekSy/JdyrenzyjdyrhnzyfOyO:2Eydbnd20E6b2AbW2NbhEC2jEV2XO
                        MD5:69554A91A4018D520A3C19DC5ED37703
                        SHA1:15A5B32D20C32BF70D5466D1D98275EBF40B7AED
                        SHA-256:3B466C034BD54E7CBCD96400C861F829698EE7905B5640A8C532B22F7FC3E418
                        SHA-512:78D09855ECCB32C94941F9E384AC9FB914E01B9714FC4F456E541E158EEFC901067F15F78543359B5EEE76F4C9A7630C513CDA50BB2CCE4E7877FD1AB5263487
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?><root><version>1</version><Count>13</Count><Resource><Id>Aptos_26215680</Id><LAT>2023-10-05T08:30:19Z</LAT><key>29939506207.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_26215424</Id><LAT>2023-10-05T08:30:19Z</LAT><key>31558910439.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Display_26215680</Id><LAT>2023-10-05T08:30:19Z</LAT><key>23001069669.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos_45876482</Id><LAT>2023-10-05T08:30:19Z</LAT><key>28315153308.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_45876224</Id><LAT>2023-10-05T08:30:19Z</LAT><key>24153076628.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_45876226</Id><LAT>2023-10-05T08:30:19Z</LAT><key>30284701761.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Di
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:TrueType Font data, 17 tables, 1st "GDEF", 15 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoItalicGoogle:Roboto Italic:2016Roboto Itali
                        Category:dropped
                        Size (bytes):488896
                        Entropy (8bit):6.808704879195895
                        Encrypted:false
                        SSDEEP:12288:t2TYXApKTDpIZRGqjzWbcid431cIirqdPhYXsNcNKBPRgHHLK+AYxm:t+GqjzgFqdPhYUeHL1AYU
                        MD5:1649261191C67171BF022A87815C1F3A
                        SHA1:1C0B63E30B65A3C3C196DF0A28F4460C2C0EDA4A
                        SHA-256:1EC57AF951FAA27F2C4220E3D00DA193CC8989D106A5CA80E3167B8B806F7952
                        SHA-512:034B99B85C35D7B54D7777ED68CA479D9C2CDAEDCB3CFBE36C51C0B7C406B8849B1C5E8A2AE4CF2C6E90C1DB10BA5EE948E587CE9B18BE1E8039A4A5DF180283
                        Malicious:false
                        Reputation:low
                        Preview:............GDEF..."...x....GPOS.v'w......>0GSUB..q|..H...-.OS/2...N.......`cmapg+.B..6.....cvt ;.&}..bD....fpgm...2..O.....gasp.......l....glyf.d....4...dhead..,+.......6hhea...f...T...$hmtx..e.......4.loca&...cD..4.maxp...m...x... nameA.p...r.....post.+....u.....prepyX...._t............=A._.<...........................s.................l.............................:.....;.P...v......./.......u.................3.......3.....f..................P.!....!....GOOG...........f.... ........:..... .....d.......................D.|.....R.\.I.......9.[.....m.....X.k.g.L.....%.....4.4...\.j.\...\...\.5.\...\.r.\.m.\...\.@.\.....).......B.B.p...;.......A.......;...p...;.i.;.J.;.I.t...;...I.H.....;...;...;...;.W.s...;.W.k...;...).......c.........................0.....{.>.O.....f...9.1.\.....F.`.G...E...u.\...F. .../....... .../.....I. .m.F.\...i.F... .......C.G.[...n...................7...".....G.i.....?.P...........C.........?.....^.y.....V.L.....].........&.&...]...o.o...f.....x............
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):322260
                        Entropy (8bit):4.000299760592446
                        Encrypted:false
                        SSDEEP:6144:dztCFLNyoAHq5Rv2SCtUTnRe4N2+A/3oKBL37GZbTSB+pMZIrh:HMLgvKz9CtgRemO3oUHi3SBSMZIl
                        MD5:CC90D669144261B198DEAD45AA266572
                        SHA1:EF164048A8BC8BD3A015CF63E78BDAC720071305
                        SHA-256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
                        SHA-512:16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview:51253fe60063c31af0d295afb42228b0:v2:2:1:1590:2:8479:76bd602437550e98c9043d06a55186ab7d95dea5a0e935a599f73e62a8c9b158e0afcb19351f6c353940c06a38172b94d18c02cf92bb8a80184eccca0392b259ab3e71dae73e491c7941997cb36ad4a198661f622dad478d840f66d530a0dde78acea3367f91fff62fbb3dc18faff0c708ad30edef5bea8b22c5fd782b770d8993386eaa784fd19a3c3e1db3b537b1a94d3d4fbd46f8df8fddf6d16611969fe0a97c50e0f3ac24750c93257cf5c161184aa7385800c87d803b339632a3d8ec7fe17a0afd83ce9e9d0e3f7b8d579637928a811f1f7e6d1887df2ddc7d4f752c4d600235e426c92c7bf8a1362f95457998cc0e5d4261f0efa4fada0f866dbcefb407dacab7a2914e91c2f08200f38c2d9d621962145b1464b0f204b326118a53ecdcab22bff005fdd5257c99a6dc51ac0600a49f2ef782396987e78c08b846dad5db55e8ccefffc64863bc2c3e90b95a09d25d0814a848c98fe01a82d4e30e6682dd546e12c45ca0d280a45295ab4bd632dafb070edfdc3c9e38313d5aeb195972986f8011b66817028fd8c78b67a0ac7e780eecc3fb6a31f5a025b8a9a3db278a98c0696aeaac739b18688b0f9c7d751bba02cc5f4e41853fb119b3c0c915059aaa92971244a1989124f12881ca88e6410df70b793a2c3a736ff4
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):10
                        Entropy (8bit):2.4464393446710155
                        Encrypted:false
                        SSDEEP:3:LNWOen:hSn
                        MD5:7A47BA17EF3CAB17482D11AFE9FF5FBE
                        SHA1:13ABF03D700440DA0468151ED8B5028202392FA3
                        SHA-256:9FAE22935F113C1A3DEAB4C724D8F2054AE473361E6A0A55461098431F499B43
                        SHA-512:F5509EF1F79A06D0DF767C73C7E15F42FA563D590760ED87DD6134ABD84E898012B6E2A046BC69DA3136AB22A22C30BECA51D527444C1335659B6C88D52871CA
                        Malicious:false
                        Reputation:low
                        Preview:1728312528
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):177810
                        Entropy (8bit):5.287226582848841
                        Encrypted:false
                        SSDEEP:1536:3i2XfRAqcbH41gwEwLe7HW8bM/o/NMdcAZl1p5ihs7EXXPEAD2Odavo:CCe7HW8bM/o/TXsk4o
                        MD5:7BA4EBF63EBC8C714FB00E300FB93198
                        SHA1:18440A9DDEDC7BEAFB3C8C2B116DE66053A44E8F
                        SHA-256:8B0BB8B471CAAF3F5B8BE1BD6FB34118BC7DB8A101F450D336B6EB3AB940B0D4
                        SHA-512:C368CBDA9F4256994206FC75D2E0C79CF68E3D28529AF912E745BDDC6980553600E967714EB29CFAA7915A73DA4B4A7D1B2D3195A833CF8A935C782D297BF6EC
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2024-10-07T14:48:44">.. Build: 16.0.18124.40132-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://word-edit.officeapps.live.com/we/rrdiscovery.ashx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:SQLite 3.x database, last written using SQLite version 3034001, writer version 2, read version 2, file counter 2, database pages 1, cookie 0, schema 0, largest root page 1, unknown 0 encoding, version-valid-for 2
                        Category:dropped
                        Size (bytes):4096
                        Entropy (8bit):0.09304735440217722
                        Encrypted:false
                        SSDEEP:3:lSWFN3l/klslpEl9Xll:l9F8E+9
                        MD5:D0DE7DB24F7B0C0FE636B34E253F1562
                        SHA1:6EF2957FDEDDC3EB84974F136C22E39553287B80
                        SHA-256:B6DC74E4A39FFA38ED8C93D58AADEB7E7A0674DAC1152AF413E9DA7313ADE6ED
                        SHA-512:42D00510CD9771CE63D44991EA10C10C8FBCF69DF08819D60B7F8E7B0F9B1D385AE26912C847A024D1D127EC098904784147218869AE8D2050BCE9B306DB2DDE
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview:SQLite format 3......@ ..........................................................................K.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:SQLite Rollback Journal
                        Category:dropped
                        Size (bytes):4616
                        Entropy (8bit):0.1384465837476566
                        Encrypted:false
                        SSDEEP:3:7FEG2l+rlK/FllkpMRgSWbNFl/sl+ltlslN04l9Xllz:7+/lGlSg9bNFlEs1E39r
                        MD5:882A58CC27BF42DA4FDEE4AF849A317B
                        SHA1:FE3C2C1788D786017CE9660D2CC300CCD1039BFB
                        SHA-256:EAC09C0776AC0407CA57F49A404D499385315358F304D190E38B236FB74D915B
                        SHA-512:2E9267FCEC21C6EB384B8917721E829D6B972DF090130EEF727D25854BDDD49241018F9ADA57AF62ED161A1A1B5F3F6D5D9E4B59D42A98336D996C054CF5525B
                        Malicious:false
                        Preview:.... .c.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ ..........................................................................K.................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):32768
                        Entropy (8bit):0.0445382698033491
                        Encrypted:false
                        SSDEEP:3:G4l2IECSXcvg7Ssrll4l2IECSXcvg7SsxlL9//Xlvlll1lllwlvlllglbXdbllAC:G4l2FCFv+74l2FCFv+rL9XXPH4l942U
                        MD5:A2DDEA4D01B4DFD916239A2C0E192437
                        SHA1:69A64064D747375DE6201AD7FC3562833EE18824
                        SHA-256:25560CD5CF1B1752C8B2F903EFE4253779EDEA1637F8E3261A071EC048D59A36
                        SHA-512:12833E04FA2A60A079B3336991EF1706E78A7D28AC95EEC6B18CD0C706DDA0201AD9ED19314116088E58A226250D1FD57FADD56D9174F737EB6D8711F4BA9076
                        Malicious:false
                        Preview:..-.....................q.!... .7.=.=S9J.^..4h.z..-.....................q.!... .7.=.=S9J.^..4h.z........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:SQLite Write-Ahead Log, version 3007000
                        Category:dropped
                        Size (bytes):45352
                        Entropy (8bit):0.39401914812594413
                        Encrypted:false
                        SSDEEP:24:KAS0yKQMIzRD826ill7DBtDi4kZERDFXbxqt8VtbDBtDi4kZERDD:NSZKQjp6ill7DYMJxO8VFDYMf
                        MD5:657146FF54C30BC24DD9C955DFBE1E29
                        SHA1:3906F72716F926ECF4C0DEC50ED86F3287797D00
                        SHA-256:0832FC8AD81C88E60ECC440E99E979E1165B8339C9AFD2FF4A6EB8E7F6C7EE40
                        SHA-512:EDE70BD2C307D1300841505B23C49A2AD1739C53F06976EEE441C604CCE78E982AEE4F1C6E48F6AF6E8C7C29862481FCE099F6D4533F421B478FDF6CFC5E40C0
                        Malicious:false
                        Preview:7....-..........7.=.=S9J.$ J.EK,........7.=.=S9J.N....5.SQLite format 3......@ ..........................................................................K.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):8776
                        Entropy (8bit):3.6514839647251143
                        Encrypted:false
                        SSDEEP:96:E8ctsumAZyt2RsRwrrRsRZIxSZIcYZIIxv7p9Na8efSqSqSqSaS8FYc:Eu3URsRwXRsRmFc8lmfSqSqSqSaS8
                        MD5:9E1A55BA550B5CF199662E5A9C4D14EF
                        SHA1:1CC9320AA0B2A54600460BD145E7449B0F658754
                        SHA-256:D7BB16A420C980675FC3755EEBECCD4656F8C7AE2A5432E2B4F8661633F3390D
                        SHA-512:0DD6F0D9048E032EF4C05AA485918DB56B72D4AF8579245B54386E5301ED832AB1F5B15C19CB542D7031E9CE4FFD9C4D94F18286BD39F656A6B013C3701D56C4
                        Malicious:false
                        Preview:....H.e.l.l.o. .S.e.c. .O.p.s. .T.e.a.m.,...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................,...0...........................b...f...j...t...x...........................&...............................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:ASCII text, with very long lines (28738), with CRLF line terminators
                        Category:dropped
                        Size (bytes):20971520
                        Entropy (8bit):0.16354939024853662
                        Encrypted:false
                        SSDEEP:1536:9UqU61z8MmtFvlzyBHM8lfUq+mnsqyBByyN/Tm+LKYiXKnktE2jwA1aLrIx7bR2t:PN8/RLKv/OYpn
                        MD5:790A0D7DD7AC440C8D1AA188726BC5A6
                        SHA1:D776629D00BFF918A28F9F63D3BE9824C9B2C634
                        SHA-256:7BEDB38E1D42F1E13CD64863238DB1954BC62F6D6841944ABA194171F49CD344
                        SHA-512:6782636B508CECB2C79D9CD38796FD50D06F63B422797B17C99FB4A227C6D451C74D5BE8C06EE9E9D088FD1245B39696E42F23C0D844C42D0E7ED6B744FB8A51
                        Malicious:false
                        Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..10/07/2024 14:48:39.653.OUTLOOK (0x1C90).0x1C94.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.GDIAssistant.HandleCallback","Flags":30962256044949761,"InternalSequenceNumber":21,"Time":"2024-10-07T14:48:39.653Z","Contract":"Office.System.Activity","Activity.CV":"vi5s70Tlk0KpBseyivgxSg.4.9","Activity.Duration":16,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.GdiFamilyName":"","Data.CloudFontStatus":6,"Data.CloudFontTypes":256}...10/07/2024 14:48:39.700.OUTLOOK (0x1C90).0x1C94.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.ResourceClient.Deserialize","Flags":30962256044949761,"InternalSequenceNumber":23,"Time":"2024-10-07T14:48:39.700Z","Contract":"Office.System.Activity","Activity.CV":"vi5s70Tlk0KpBseyivgxSg.4.10","Activity.Duration":35796,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.JsonFileMajorV
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):20971520
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3::
                        MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                        SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                        SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                        SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                        Malicious:false
                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):4.486115360853252
                        Encrypted:false
                        SSDEEP:768:/rrjKolASaoewBJqKPV4J79JRNaMClP7XaM+0FIWrWOVWI1:nII4J79JTaJDXj/1
                        MD5:EC78844978C0EEF7A0DB49746BF05D6E
                        SHA1:A357315F0E719E4F7C7AC20F5949D536154B5A90
                        SHA-256:CF4F474C908CFBCA458F33AC35326E8ABAA2F1354F9BFADA0F9C1B5FC570F659
                        SHA-512:C7B46E00E73BC00520824D2B52FA72BC8986DB6FBF7A9498FEABFF8609F2B0F19A9B1D83077482581D29DE125AC63ED7DDB2D7F11DD83F1140963792CA467E79
                        Malicious:false
                        Preview:............................................................................d...........Q.......................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1............................................................|..Y...........Q...............v.2._.O.U.T.L.O.O.K.:.1.c.9.0.:.f.b.c.7.6.d.b.0.8.c.a.b.4.a.d.6.a.e.8.3.0.b.f.c.8.6.5.d.0.a.4.8...C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.1.0.0.7.T.1.0.4.8.3.8.0.7.0.0.-.7.3.1.2...e.t.l...........P.P.................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):30
                        Entropy (8bit):1.2389205950315936
                        Encrypted:false
                        SSDEEP:3:lk:
                        MD5:105E638CBBC54D0A664FE3152D4869DE
                        SHA1:1318C3B2EFEBDAAD06B0EE746AE7AD87AA67C39B
                        SHA-256:E43B243285B45A1ACFB7DEBECE5030AC708475F55BAD18829CDF21CB1652C944
                        SHA-512:4C61160DB2EC8F05B21EF1DBDEAF16B3AE0147861A62587C6DF1E8FF532728B14DA93AFA5A4061575CD067F7C68AF58C6D651B6927194BA76FADC8C4535BAE30
                        Malicious:false
                        Preview:.....}........................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:Composite Document File V2 Document, Cannot read section info
                        Category:dropped
                        Size (bytes):16384
                        Entropy (8bit):0.6686775509766794
                        Encrypted:false
                        SSDEEP:12:rl3baFlkWEqLKeTy2MyheC8T23BMyhe+S7wzQP9zNMyhe+S7xMyheCeNm:rsmnq1Py961e0
                        MD5:AE0212F6825E628FE78A8E7A22E11379
                        SHA1:5437939277BD1181D28A7F898B1E967CC1CFE3C3
                        SHA-256:2D80D980B5B062FC6319552A406A04FFA9138A6BA129908A1C7ED1DBE3551BD4
                        SHA-512:E0FE6188E586A065D5E3FA3FC2F3C533F77430C51462D45B5EEA77C698228B1ADC6CD8FC5A5220B1504F706E8C87ED72D2E172B3354C1F2D61FE450332DEED30
                        Malicious:false
                        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:Microsoft Outlook email folder (>=2003)
                        Category:dropped
                        Size (bytes):271360
                        Entropy (8bit):4.589275933662677
                        Encrypted:false
                        SSDEEP:3072:1LJu+Uqqebvd66lF4Hcw7y6QmmFp9G1M:Bmibvs6lFc5+h
                        MD5:CE7127987D3FF18BF09E9A0B0EE2FFA0
                        SHA1:DD36AFCD4C1B080261D236EB261DD7666CD54C11
                        SHA-256:BC7DF9AE30E6DE0D773E06980341A6C6181ECFD1AA37993C0C5A4540E143A308
                        SHA-512:B2C0FFAF125D7895D3C7BA31C0DE311D8EACC038EE5312C380E7E240771BD63D382920411B71B232D950C2AE6D23A90E579D4F61E9A8DF7EE8D1D24BF54B6927
                        Malicious:false
                        Preview:!BDND4TSSM......\....o..........y.......c................@...........@...@...................................@...........................................................................$.......D......................x...............t...................................................................................................................................................................................................................................................................................................J.u"~.*.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):262144
                        Entropy (8bit):4.207341153337192
                        Encrypted:false
                        SSDEEP:1536:asx+TnZqVyMNh3msmqUMzSuEzlGgvKUd6tlF4g5I8cw79gN6QmMW53jEpEHP4qQV:pUqqlbHd6tlFjHcw7+6QmOp9W6v
                        MD5:7A24FAA1CF3D450B427436CC560E881C
                        SHA1:A490CB5741EFB531E15E592AF3EE79D0BBCA4EFA
                        SHA-256:12A4B395220BBB19D4EA042C220803A3D3C77CF01F1B83BE41ABFEF4890670E2
                        SHA-512:004A993AF78F0245CD72F53D1D633D5D75365DC0DD261826EE2D3E52A03F9725FBB6FF9B3802DDCDA2DE923D6B48997742E93638842064EABFE07315DA565980
                        Malicious:false
                        Preview:....C..._...........-.K.......................#.!BDND4TSSM......\....o..........y.......c................@...........@...@...................................@...........................................................................$.......D......................x...............t...................................................................................................................................................................................................................................................................................................J.u"~.*.-.K..........B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:SMTP mail, ASCII text, with CRLF line terminators
                        Entropy (8bit):6.035329577997282
                        TrID:
                          File name:Seek Summon Counsel.eml
                          File size:107'732 bytes
                          MD5:82266fd56b3565b8df974af1232ff1c0
                          SHA1:9881f80881a71b2729188750489d014607406c39
                          SHA256:dc6ddf686f7d377ef972b73270ef666befff2e9d3ca44e9eb647f46a33246356
                          SHA512:ca9a7418eb92ef1cd0f30436ecfda5cec95254221cd45d093f55adeabdd1b6afd08ae71542605505f0618fd2e0742b96c5459bf04d33df88af41443e8c7c23a9
                          SSDEEP:1536:tfmN+ma6iPfSNvqqYCsNnIy7+ibSals6uNkISiIYqo41zdos7thLQ9PK:SikCq8Iy79maluXIYqoOzdvPss
                          TLSH:B1B36C15C2F28EAB41930AAF145336D0F079F3A581EC81F7316EA763F7629BAC358245
                          File Content Preview:Delivered-To: tjones@grubhub.com..Received: by 2002:a05:7413:2143:b0:125:9987:37b with SMTP id sc3csp1882240rdb;.. Mon, 30 Sep 2024 08:55:14 -0700 (PDT)..X-Forwarded-Encrypted: i=4; AJvYcCXf9SDuePRQVJSY3yVc/QFIoJPcbsR9hwJ+0Ut6f4wFV3bfk8DrsvSSZw0eZ7
                          Subject:Fwd: Seek Summon Counsel
                          From:Michael Colmone <mcolmone@grubhub.com>
                          To:Phish <phish@grubhub.com>, Security Operations <secops@grubhub.com>
                          Cc:
                          BCC:
                          Date:Mon, 30 Sep 2024 10:53:59 -0500
                          Communications:
                          • Hello Sec Ops Team, Legal received the below email and attachment. We have not taken any action on it as is looks like potential phishing to me. Please verify if this is a legitimate claim or an attempted attack. Thank you. ---------- Forwarded message --------- From: flecitycrtdservice via Legal Department <legal@grubhub.com> Date: Sat, Sep 28, 2024 at 2:36PM Subject: Seek Summon Counsel To: <legal@grubhub.com> You are hereby notified of a legal action initiated against you in the Circuit Court. Case Details: Case Number: 2024-CD-710854739706 Court: Circuit Court Hearing Date: Wednessday, October 09, 2024 Hearing Time: 10:00 AM Attached Complaint: A copy of the complaint detailing the specific claims against you is attached for your review. Required Action: Please review the attached complaint carefully and respond within the specified timeframe. Important Notice: For accurate and complete case details, refer to the official court records. This email does not constitute legal advice. Sincerely, Court Clerk -- Michael A. Colmone Paralegal mcolmone@grubhub.com 111 W Washington St, Ste 2100 Chicago, IL 60602 grubhub.com | *fb <http://www.facebook.com/grubhub>* | *tw <http://www.twitter.com/grubhub>* seamless.com | *fb <http://www.facebook.com/seamless>* | *tw <http://www.twitter.com/seamless>* *This transmission is intended only for the proper recipient(s). It is confidential and may contain attorney-client privileged information. If you are not the proper recipient, please notify the sender immediately and delete this message. Any unauthorized review, copying, or use of this message is prohibited.*
                          Attachments:
                          • 8ID0109FLT24PO92CD-R.pdf
                          Key Value
                          Delivered-Totjones@grubhub.com
                          Receivedfrom mail-sor-f41.google.com (mail-sor-f41.google.com. [209.85.220.41]) by mx.google.com with SMTPS id 38308e7fff4ca-2f9f3ef0815sor7221251fa.2.2024.09.30.08.54.37 for <secops@grubhub.com> (Google Transport Security); Mon, 30 Sep 2024 08:54:37 -0700 (PDT)
                          X-Forwarded-Encryptedi=1; AJvYcCVSOhKpysI8WH9a4Toh54RGCp/ivkiZaJyjHs+hyJtn8KsVh2owpU1lj5xkLDlhaR8/BBN6CyM=@grubhub.com
                          X-Receivedby 2002:a05:651c:b28:b0:2fa:bf53:1dac with SMTP id 38308e7fff4ca-2fabff71965mr14584011fa.9.1727711675773; Mon, 30 Sep 2024 08:54:35 -0700 (PDT)
                          ARC-Seali=1; a=rsa-sha256; t=1727711677; cv=none; d=google.com; s=arc-20240605; b=ititgjqEEwlsvgdyLxECQiaYFPUz6nKTMiopFpFU0OypB47cQL8v3chaogvh03YA9B wSt3qEkDxwxUuycoIxCpWrNUqAH/+d5IIY8QXq46lrknpVqR46CVqCBPZb5EL5gPqZHq Mg51aPrpj0P52u02CHTLA3sJtBXNO5TeV9on0+t6blKR4GPdclADCSdUCd9nC3MSVZ1X D7L3kNYPEPRJQBA4qBb4ooT+g9LsKsxvK810xTgs4kw+HXYXsa8gjt0zhnGkHObo+d17 FVJx/y4upt6W0EujDrr/0SIR2LMpaOQY5lKO90uas2rF6KNmxDHXQMd0r8h0Midh24H6 Cg8A==
                          ARC-Message-Signaturei=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=5/qgTUR0N5uajaw3PXb/BKewzzo0jmHtKki9xLPaeoo=; fh=XO6FxDgPDMvPRxl4ZmjRVoNS/p9o7X+lwVIzsjHd3sY=; b=QgaIQX8CejmshB0hhANJeSbv+HEi7KnajnHea6ozQ5LwHfgk3Chtz3UphwHMrUw0hZ K5KjtZRo4FkMcjB6IaAUn/PfOrSV2eCkkpwvvtG8KrXFargAPeX0dpf3SW2wiHVa2+Tn 8T2liImYYdNB0ggWpKrYT9qLjlRbPiarpdcdyUe98ljnh9HCT4t/WUN0RDX5oKanAhR2 XRdqw4gBEX5B0hZC1cW11v5a+YHTeOMUlPDEkh/0PpU6MvKACBsNcDgVBSfdiYDExJsu TTJjnzyIs5oAjNYydwl8jlPA2vdLR3ixpiAX5NYg8lC1/Vq30BFeWG3lMB9el/x8pdvC YRjA==; dara=google.com
                          ARC-Authentication-Resultsi=1; mx.google.com; dkim=pass header.i=@grubhub.com header.s=m1 header.b=AokM36Gk; spf=pass (google.com: domain of mcolmone@grubhub.com designates 209.85.220.41 as permitted sender) smtp.mailfrom=mcolmone@grubhub.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=grubhub.com; dara=pass header.i=@grubhub.com
                          Return-Path<secops+bncBDROVC5ET4LRBP4T5O3QMGQE6VLVXCI@grubhub.com>
                          Received-SPFpass (google.com: domain of mcolmone@grubhub.com designates 209.85.220.41 as permitted sender) client-ip=209.85.220.41;
                          Authentication-Resultsmx.google.com; dkim=pass header.i=@grubhub.com header.s=m1 header.b=qsPIVHeo; arc=pass (i=2 spf=pass spfdomain=grubhub.com dkim=pass dkdomain=grubhub.com dmarc=pass fromdomain=grubhub.com); spf=pass (google.com: domain of secops+bncbdrovc5et4lrbp4t5o3qmgqe6vlvxci@grubhub.com designates 209.85.220.69 as permitted sender) smtp.mailfrom=secops+bncBDROVC5ET4LRBP4T5O3QMGQE6VLVXCI@grubhub.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=grubhub.com; dara=pass header.i=@grubhub.com
                          DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=grubhub.com; s=m1; t=1727711680; x=1728316480; darn=grubhub.com; h=list-unsubscribe:list-archive:list-help:list-post:list-id :mailing-list:precedence:reply-to:x-original-authentication-results :x-original-sender:to:subject:message-id:date:from:in-reply-to :references:mime-version:from:to:cc:subject:date:message-id:reply-to; bh=5/qgTUR0N5uajaw3PXb/BKewzzo0jmHtKki9xLPaeoo=; b=qsPIVHeoWrKIf9wornYdRzD2XLwXPDydzvPWHWzS4W+iG9NwH22GawHrtLOrsDI5Ct xVqdljvxbN7wItFbavtNBrG985pNfijQI+p/E2Kf567EeDpy+u6vpFWUDAvJu1V29Xhg /r42KwkrKM3zeRmct4nzP4KaFhYDiPfnZNvZu9sE5SxE5wOe27NWrVZilu1urDCu0PqK SOuCZoxEHvKLsZYCf3mEuc1rQHGGaXsgAVON77FHZO7AmgpLfwakbv7lNSg43m9rnBym Mn8T441PpHseQ6fk5duh2vuUzH3P1qSPrR+gRsaillgBi7c0BMOX/qI0uwveuj+2/JN3 j+tQ==
                          X-Google-DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1727711680; x=1728316480; h=list-unsubscribe:list-archive:list-help:list-post :x-spam-checked-in-group:list-id:mailing-list:precedence:reply-to :x-original-authentication-results:x-original-sender:to:subject :message-id:date:from:in-reply-to:references:mime-version :x-beenthere:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=5/qgTUR0N5uajaw3PXb/BKewzzo0jmHtKki9xLPaeoo=; b=vK82kUp+WZHdAr2P0VAsHvZmjDjrPiqsnZhqZPiU1N5GaKb2MdHw1EWulJonN6fLRr uRiFPnRN1mbUfAXwn4yUUv9Ej0R4XrXz7GWMI+0p6vTrq8DhrsYMPzNGI0kCBbn+WUe1 xG1ac6w/iyhuRl69xgd6W4n6dy1XRpkwmzso1nYcpm9QALjHkiI6xuB9PD7+ICPG9hPu Vv+MqOBpYnD1FhdAtIVfWY2t26N2/KY/XeXuk0Sz/oRmUqgSOpUTrz4nnDqeQmMxONGN s6m9tHa2dtcR7W/wxnmpgSILQ5tQrTjnnpIp2dHqG7+hUerv59sx1Z+f4lEG1pndJGqQ hh5g==
                          X-Gm-Message-StateAOJu0YyvwaX10DrtSWijkEUjPHi3dwVF/OjE6WcqAtHSSrfxACFLI1uk arIW8b6JVRMi3JHyuILW4mfpnoNITrx1GuyRMn83eo4uf/tCUAkJmzmgRHDqv+pr
                          X-Google-Smtp-SourceAGHT+IFLhPpNpu/2ugHrRbbqgkR1g7Y6RoBduAfo6nk6KitZ+JWVyvc/cxaQEdN9E3kRd/wJ866msA==
                          X-BeenTheresecops@grubhub.com
                          MIME-Version1.0
                          References<20240928193621.D7AFB65F5D86A6C8@165.140.158.32>
                          In-Reply-To<20240928193621.D7AFB65F5D86A6C8@165.140.158.32>
                          FromMichael Colmone <mcolmone@grubhub.com>
                          DateMon, 30 Sep 2024 10:53:59 -0500
                          Message-ID<CAG=h162T6W8hqyTe9-Mtx_BVKk6Jn4_ubF2JH2xD7Hf8WwBMcQ@mail.gmail.com>
                          SubjectFwd: Seek Summon Counsel
                          ToPhish <phish@grubhub.com>, Security Operations <secops@grubhub.com>
                          Content-Typemultipart/mixed; boundary="000000000000b5bbfd0623583815"
                          X-Original-Sendermcolmone@grubhub.com
                          X-Original-Authentication-Resultsmx.google.com; dkim=pass header.i=@grubhub.com header.s=m1 header.b=AokM36Gk; spf=pass (google.com: domain of mcolmone@grubhub.com designates 209.85.220.41 as permitted sender) smtp.mailfrom=mcolmone@grubhub.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=grubhub.com; dara=pass header.i=@grubhub.com
                          Reply-Tomcolmone@grubhub.com
                          Precedencelist
                          Mailing-listlist secops@grubhub.com; contact secops+owners@grubhub.com
                          List-ID<secops.grubhub.com>
                          X-Spam-Checked-In-Groupsecops@grubhub.com
                          X-Google-Group-Id855217933231
                          List-Post<https://groups.google.com/a/grubhub.com/group/secops/post>, <mailto:secops@grubhub.com>
                          List-Help<https://support.google.com/a/grubhub.com/bin/topic.py?topic=25838>, <mailto:secops+help@grubhub.com>
                          List-Archive<https://groups.google.com/a/grubhub.com/group/secops/>
                          List-Unsubscribe<mailto:googlegroups-manage+855217933231+unsubscribe@googlegroups.com>, <https://groups.google.com/a/grubhub.com/group/secops/subscribe>

                          Icon Hash:46070c0a8e0c67d6
                          No network behavior found

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:10:48:34
                          Start date:07/10/2024
                          Path:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                          Wow64 process (32bit):true
                          Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Seek Summon Counsel.eml"
                          Imagebase:0x210000
                          File size:34'446'744 bytes
                          MD5 hash:91A5292942864110ED734005B7E005C0
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:4
                          Start time:10:48:46
                          Start date:07/10/2024
                          Path:C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "D821EF8A-FE73-41D8-8296-EE8DC72CF22E" "3775079F-C351-49A2-937B-BBD365F088EC" "7312" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
                          Imagebase:0x7ff7c4e90000
                          File size:710'048 bytes
                          MD5 hash:EC652BEDD90E089D9406AFED89A8A8BD
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          No disassembly