Windows Analysis Report
[EXTERNAL] Re_ Quotes.eml

Overview

General Information

Sample name: [EXTERNAL] Re_ Quotes.eml
Analysis ID: 1539395
MD5: 3c0db89c15e308a748b61147c7e85c76
SHA1: 75605eb85037f23c90f27ad91b16dc9599258f02
SHA256: 777603c4a68501978f70cefa8d80e399fdf086b57349d6dde0e3f8b3e41ebce2
Infos:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

AI detected landing page (webpage, office document or email)
AI detected potential phishing Email
Detected non-DNS traffic on DNS port
Detected suspicious crossdomain redirect
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Stores files to the Windows start menu directory
Stores large binary data to the registry

Classification

Source: https://www.example.com/ HTTP Parser: No favicon
Source: unknown HTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.18:49698 version: TLS 1.2
Source: unknown HTTPS traffic detected: 40.126.32.138:443 -> 192.168.2.18:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 40.126.32.138:443 -> 192.168.2.18:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.18:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 2.23.209.140:443 -> 192.168.2.18:49712 version: TLS 1.2
Source: global traffic TCP traffic: 192.168.2.18:49745 -> 1.1.1.1:53
Source: C:\Program Files\Google\Chrome\Application\chrome.exe HTTP traffic: Redirect from: hnamedmr.ukremediatlon.co.uk to https://www.example.com
Source: Joe Sandbox View IP Address: 91.220.42.63 91.220.42.63
Source: Joe Sandbox View IP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox View IP Address: 93.184.215.14 93.184.215.14
Source: Joe Sandbox View JA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: Joe Sandbox View JA3 fingerprint: 6271f898ce5be7dd52b0fc260d0662b3
Source: unknown TCP traffic detected without corresponding DNS query: 52.182.141.63
Source: unknown TCP traffic detected without corresponding DNS query: 52.182.141.63
Source: unknown TCP traffic detected without corresponding DNS query: 52.182.141.63
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 52.182.141.63
Source: unknown TCP traffic detected without corresponding DNS query: 52.182.141.63
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: unknown TCP traffic detected without corresponding DNS query: 40.126.32.138
Source: global traffic HTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=ahXDKPZCcoot+6s&MD=6mmrbygb HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global traffic HTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=ahXDKPZCcoot+6s&MD=6mmrbygb HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global traffic HTTP traffic detected: GET /client/config?cc=CH&setlang=en-CH HTTP/1.1X-Search-CortanaAvailableCapabilities: NoneX-Search-SafeSearch: ModerateAccept-Encoding: gzip, deflateX-Device-MachineId: {92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A}X-UserAgeClass: UnknownX-BM-Market: CHX-BM-DateFormat: dd/MM/yyyyX-Device-OSSKU: 48X-BM-DTZ: -240X-DeviceID: 01000A410900B03DX-BM-WindowsFlights: FX:119E26AD,FX:11C0E96C,FX:11C6E5C2,FX:11C7EB6A,FX:11C9408A,FX:11C940DB,FX:11CB9A9F,FX:11CB9AC1,FX:11CC111C,FX:11D5BFCD,FX:11DF5B12,FX:11DF5B75,FX:1240931B,FX:124117A5,FX:124B38D0,FX:127FC878,FX:1283FFE8,FX:12840617,FX:128979F9,FX:128EBD7E,FX:129135BB,FX:129E053F,FX:12A74DB5,FX:12AB734D,FX:12B8450E,FX:12BD6E73,FX:12C3331B,FX:12C7D66E,FX:12CDE644,FX:12D1574C,FX:12D281C4,FX:12E8312D,FX:12E85C75X-Search-TimeZone: Bias=300; DaylightBias=-60; TimeZoneKeyName=Eastern Standard TimeX-BM-Theme: 000000;0078d7X-Search-RPSToken: t%3DEwDoAkR8BAAUcvamItSE/vUHpyZRp3BeyOJPQDsAAQ6GhAkHuPtVTVeAt8GnNTXiw/C/ancNPYhIm/WzQoKYIcnODiygMSaKDpesx7WgNrvREVrDFcW7ECyynHXFO5t3xlEzqcG1ZxCgB69iRgPFlRupuWqnS7P7CjA%2B0ZRmhmVy1qNBOkkSURe2oNh3wvug/05fcrZf8Kuql9X69BDdP/BG0bZp9l%2BTUvkp8y/Ov90S5AzzdoWEpMEU0TzuVBagb0vpBXkoa3Vl/isHcHiP3Yx0pICzN3HIdGMgw2mE/G48LyHtBFLWmVBXfPx4C54rMvzTrhGbawbkOLpWnyzQgfjGsatPHamcJpguASSRk19dp3Jm8Xl3Nu%2B6HP83mYAQZgAAEMegth5sow/To49b0%2BBFalCwAfN7MWOLqO6EDDUdcO1n6tQj/LX%2BSufX9heH%2BdPh0R2os5TVQlwMShLlZ/f9FDMiqPHn%2BDbcQMz8uXPYMkQD5gAYZRADhXwwZae3Pu%2BE5NHfggzGeGDBzu84EqaJawNdK3QX0iSLLyEoNhTFy/X9pnLRAv6v7tW7rE6uXbVAsl/VZ8n%2BwqmJTJg5H7G4FS1LIJbivlNG0XnnpdQPCYY7iobuq9U28f1/fp8EbWnyA88FBtE1NJk1bPKAN0zgsO1E2owcxf6xKuva4X2UgVGqtSZ9x%2BUm2omNcIXF3NAVBHOfEpxQ4V6UATzmqIXmFO%2B741E7csCvFR%2BNEPa4QAQbrkm84rtcfNsu2qZsch7mBw8KKLL37mI%2Bp2ZpmZIu5U7MvVr5LCBQRTRo%2B049iRQFZsLHWGw3sfZHsRUX3/c%2B4WAEU7kj3aaHeS9efYuGT/Yr/QgcBIF8jDcy0O0RGfCUUZShcEjHzk4mAVmfkqQbrElYViWvG6B53B6vvWMrsawnhdZFLyzXB9rk3VRAdJF3muLWzpSBLxBgSb8D%2BkECJG6BhEf7hKPJemwy8juifr8PH9oB%26p%3DX-Agent-DeviceId: 01000A410900B03DX-BM-CBT: 1729606233User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.7.19041; 10.0.0.0.19045.2006) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19045X-Device-isOptin: falseAccept-language: en-GB, en, en-USX-Device-Touch: falseX-Device-ClientSession: F7B3F22C310949C6A9567A248FB019C9X-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUIHost: www.bing.comConnection: Keep-AliveCookie: SRCHUID=V=2&GUID=B4BB39E5F80E411D94C438C0FA7ACF94&dmnchg=1; SRCHD=AF=NOFORM; SRCHUSR=DOB=20240207; SRCHHPGUSR=SRCHLANG=de&LUT=1707317051026&IPMH=6b344233&IPMID=1707317270835&HV=1707317277; ANON=A=680C1B1A649CBD64DD40EBFCFFFFFFFF; MUID=BC76BB0020D345C1A049A4820CB4C03C; MUIDB=BC76BB0020D345C1A049A4820CB4C03C
Source: global traffic HTTP traffic detected: GET /s/ZlrZCZYQ9UxMnWNsysRFBA-ZP?domain=hnamedmr.ukremediatlon.co.uk HTTP/1.1Host: url.uk.m.mimecastprotect.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /r/lJ_qgGoNKOtmgnbcVAzK9AK7bCK_bMUk-wR7tn7n2Yc-AiwWUwSJ5cdo4JD9L-rHbsi-7W3dO8y5uQV2nzI3pgGYX2bWfu1MDc-X9rMWVK_hsH3igqVCwlv82yO9Us1bD9QGVJXYV3iwcJyaZUtCzpN5gQCtVwfSk4NF3Jvvjo6dam7LE0uymt-W2XHlpqniDQv0P0k8ZJKYaCstCrmE1sq1ZoAQ3VLjp0OO2PZzixRmPZJK3FnHnTaIJwVqhz9-vSI1xigm4TWyfd7JWmu74nSWtZqj9NqEJglaSsVWuKMnELweU3CY7wK_cfeqtPwaqs8jlAL3SZc0pjK71K0ISYzpKLaSw_JCCc6zzmE5PGZHuWIotNrok3xDwjmYYdSvbsjWzlsuRUUe3Ge-nzuT_-uUD_uGughyFXcxYqfAHpXCIep-KQdcjuq5Gyqg4rYzIdDobbwKUqvbUjmSwsU6Kbz8qPGQrWgdumJENyi7ViVKh-mx850nErkNPPaV8cEVsF1xwTxYLEAhTmhHRFqA7DnqNRyYU8B2moBCnufp7KSRLhEp1_IHwcMi0uGvittYjkbd0gHZii0doZ1PDx7jizS1e86c9bnhOUytqDfaRPkGLrrmXFvMSMHe0VxnfFBGLZEIqK8aCvyVOEzBNaAsXqjn0X24VWZs0SIbrkF1BRP5g_6PPLDHAT96Al--7XzfEabS-JA9VJrrtaFy3rXYfe_PvCiuYE1POvOJHaa21-S6TObxg0FHlmY4H26jk9CS7vhpZOSEqojkHw-5NIh6Xakwp7HlCqrjIavb4slvXKlKIaN5TvHEmT0NJj9Tz-QJoPY9eQM87kb2xd-yGPumDZ7hR0YYULul-RYv02pa-1WDseD-F4nYtDSc3kB_FBhSsd7qv8I8acNjgeUi66fzcgkqjzwY1Ak8-rqfZ5tLgDhm9ERoKKIvhlix5yGPfqgo-DeV8vH-ifijkZj4e-P3X0N4ZVegzbHvflS2YJEfRIM2ZTxn5VC8ZDWCYGaXdMxa-Xov1SeLhzQ3sfqwVdjwkawHIkJjfU9pZvXyT4wweCBC_7qUW957fgdrFlNjD_OpvHMhKk1h1izSHy7ii-zdycvdZ55YGRKW-ie68VFpMpuz5oVeWVY8m0UNcRHEP8m5K8yoY5B6-eCpIAdFkvttmdpXGGaT12kyDsVFQFWETMsj8H1QDh_aI7A9POPidkQkb6OBHXgsuGpWFpJ7TZpJtZE_xchIobol4vmRh9vZ3C7SBFFUgu2j_6TsHiuUabrhI1LDwP2myyzmHFvUZYPA63CI0ALKTC_P6Bdxq6lht5KkGmACREYDtRBF-kGJGhffu6rERZeMQ0nfJSw2WChLK1jbgMCBHYL3S4-BEPw5PH-SiK9RaCgZ1w57VS9HyVp4OGintMwvFcQnU7rvdJzEkZdi4t8aDyLC9o716IyalFvWYhB4e3mlTwas-zp5HzyR4hjd1nJlTGZJWMuF6od9aAqJ7Km-rQxd5IqVVmylAAWZcvb-jW3S3DKhwFAbbm589D2i8V1Ahs9IA4oJJJ2bu9Awuqg-HnPHJKo_4hhaednodO1xzyNtzCbjY4E7eS3B-byyTokN9NXcayzRrrlbu-ZurIeZlGgKuBTF9L_m7XijX9CyiEOJxd5P9tMh_dWoXhuL43DvkDgu8YCVS7eHbfhAIrtQ0d6MIxxcL-850Mi3jgwhBdqQ2cOv7WeTXKWLZwdlTJ7VskYkBAOcWLTeSdttQUE3-QQ-kJfH-CEaeqzid78FONS1wZWx0Q4TQqpFFwX8eSv7UAMuKvVR0B3t_xGGzYWRIwBeVOXr5vZoBcF-UMBLMDSVPav9LcIQTX2kRlpaIqJ8ZIwFhoubGQDjrim0kRm_bNuVBgMgErHTJcV2pJTnJL__3tmZV69wE1a-RhSdL93OvwNV64V3vO0Mk4bo9ExF_PVACnZvL13I9EFyx5gx-FczdJEFLTL4jS49Rbm7U-13pOV0m7fZmA1jK2Le-Y_di64hqoJB23dOBPHhNuMYHq85KydOEFnP7Z_gU4UXxk0Ps4xjc7KgISdm3Oo-HIMF3JDqBZPpMlOEPxaOrXhz9KoGRPzxtjSALNe7ZMzlekRv9jFmUh0XeDON53e2BHdy5Y-Iqp0G4_4LYz1VAwO-ROsOS1HpU5iwxdGKXswYU88Ib8_7gaU4wozJ8bO64yNZKF5C2zrX8k3OUc2NoaVycJlmClbfiJm38U1iy7kIsgbYqZ4cbNxCUyN9JIXDNUEVq9hglStXb2skpoO7fOPCwpNJ8EouBnKaaqfqUwoEBOv0kg3KNHlQYcgNRHs7wdADjpIkc4SG9rKb-9cikDPyc8ewBOXVRgNMCId09T1jmoIKg81Y-x2m4lKFPFudbrhPD2SgwlCflAA8Pj29VMRney0ZsSZy7IkpSOOnUw63fCM01mEIK4h_AJxXkc95E_MdFjbrWGZphvIu3S4e9O_SL8PS6DmThM1gANG5sii-BspX62TapMynCEuVBu-NysWd3Q1yieP87FuW_flBV8SKtJdHT9Qbg6t2SJ_lnDQotoJa0yYsHbQDcIPPvXfh8mX42-pWTzjckUt5wV-Tu-elaapxyxJz6fkGt3Ov5FWCkJ8_EiImNX8ET64m6IBQ3UKoeUxke0usx91hq1MiTQYLQhN1wwIKXERA6HabvM8c8QnufMmaJ02EdZhbqvEYMHIFLv4CWsLX8tGcKTMw9-Nee4D74ju-n2k2X2d1Jb2My1dA-khL5uhYtUyOxu0fz_ZK9fy60xI8PCYY34A_n6fIbH4qra_OEkifHZnzIjEPUZE8CFZFlO1vb6h22fJZbVcX4dfodAQuFTI5EJZhsiQD6wUMTx26NdCU0VQXS__o4H8S5ERpqKkuYWeoMb3bN6hlD-C8QXfG9d7b1B6-gcO4WHVuMERXogy_ecxYjvbaVzjOnpeuwU21QchBWLt2GNjiq4BmeTWwsnAa3ubVm4JZj
Source: global traffic HTTP traffic detected: GET /ttpwp HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/runtime.5257ca6e429949972959.js HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/polyfills.5257ca6e429949972959.js HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/styles.5257ca6e429949972959.js HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/main.5257ca6e429949972959.js HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/runtime.5257ca6e429949972959.js HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/polyfills.5257ca6e429949972959.js HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/styles.5257ca6e429949972959.js HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/main.5257ca6e429949972959.js HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/mimecast-icons.bb1a2cd16db9345fc437.woff2?25417273 HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://security-uk.m.mimecastprotect.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: fontReferer: https://security-uk.m.mimecastprotect.com/ttpwpAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/languages/en.json HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Accept: application/json, text/plain, */*Content-Type: application/jsonx-context-route: ttpwpsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/images/mimecast-logo.png HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /service/get-caps-overrides HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/images/mimecast-logo.png HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/fa-solid-900.54dfc8f551be346014e4.woff2 HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://security-uk.m.mimecastprotect.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: fontReferer: https://security-uk.m.mimecastprotect.com/ttpwpAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/languages/en.json HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/images/favicon.ico HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/images/favicon.ico HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /api/ttp/url/get-page-data HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /api/ttp/userawareness/report-judgement HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: */*Sec-Fetch-Site: noneSec-Fetch-Mode: corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /ttpwp/resources/fa-regular-400.33904a1b964c9b363ce7.woff2 HTTP/1.1Host: security-uk.m.mimecastprotect.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"Origin: https://security-uk.m.mimecastprotect.comsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: corsSec-Fetch-Dest: fontReferer: https://security-uk.m.mimecastprotect.com/ttpwpAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /r/RriaybGmrgwONwzgO2MWfHO1F3XKarISRjLxdWFL9XTfpkBU58DEKAZvD2MCgNOj_j4DSYforTR9qwVYEIXZ9vgX1U2-QAqxPTdwA00ppsQ3I0PEAGksgw_D88Xbcu-938LX7owv5XD4D4tajr7iuKFr3ovoLy-wx9i8PuUSRC8srb5j8rtR59AW6TCsTLqBv9ArlBYnfQKackbQu2oh7s60TFBqbGaOhOk3E61Ni-TSKVAW6gCOBItKafCPhcsOrE2XBrkygs9LfXm5k72EqW-SQ-byKEw4nxjgLClTGiHS-9KrcZXei-A-5bwM53tgW4ZZp7qOACJQRcfx2T-sgC_a4-qWhBjSBnyBWgG8YlBIO6-ptXKlh_ew8SbFtzyYfQEoGuGnxBOl3pTDf8emhFLGba6waF235cMvP8IBjvXHxPg5VRhI3rP_Q6kb0DV1oE12clGaNL6NcRTfoTRbDlgNeNpbaygalyKjHEFTZv8p_K8x1wsVOAbDJjlVjVIQ7NIi-jvHJvlDlMpY4N6DjUricN81Pln9H-lMiYBef3aP0tfOM9_2YdimImSuUfnrQk0fz1qetdH-ObErarOvR2XgblbA7U-p-CeaQVx0zI7g-rFuT5W3zaB1Ybz8gZPNkqZSprSvLkQ0k14Er3vV6eAAfRb0MRcX6HmFlM-wcjwRpM7ZMp9zHv6uFQd7SYQZp9BB8Kdk3doXQo1XamRjetuzcWnY8uhjkIkmy4STUzoadv_-id4zbJ0QFxEQr67iuQ5PU8gKwqK5Q4Rt_qKVlHrALJ7B2Ods-W8cput7eLvYomJ3QZ6Jn74xbSl7Fz-jWlMv4rpuJP_nLIGmhf5eQf8A9Ks-_NTx6Ex_CBE2Lpp9vxcBkmsbP_Eya2Izz7utKXIhRdY7kNgK43OQLvlCyY1S4R_7xwULN0CftFftssUzf_0Ktam2hgHlQ45UsV_XcrISqJDUUpLTjbLX6gBmuQop0mJdzKyUKZUA5ulZBzwXFQAhV_FE3xkcMFJWW5Fp2g84_vn1TIIp_wtHSs3XfCOSuefjFuODjHvM91RMpeSYnlzIDR6OwPnzpMXY9tqaTa4BXxaivr4LnNA-0d5spwcRkbvM35oNJwf88sFkHEk2yWwbqsa2taBGxq98u389XBKxrVlLsdvMqnj94nXwYMuFIBX_r3k4d-B2V69fqfiRsFaXf4_PR3h0EPl-2B-iLBaFtaMFJdcKfliW_iCvhZvei_u4H4mWojrI5sL3fQi3zi11SNIGZVd2LTTQpzv3HynGbcXBVqX7Mlwi3lzRttUjc4q1lncAAoWAn3kNsqc4em1jBNKIm7J5zZXUQVZtyLjNvy7HFd_ZWzzi_coUhRjM1MBYqlzdj9WXPW1oeFxM7OdQkutiSyyAAE9aSrUucsS3rbigUxemmjVbGYmxz_edUf85XNDtDZ5rUXYSkcXpHBcdCtynRSMJWqz6WUpCLR3FjB6Ft-8vfCl-5tFO62gTZLXKbumb-rIxu1wiOWIUGLNbuZ_WMETf3YjBRL1Xb47woE14PMw-NQxhYqX0T5AAEd0i9IeE2rHzLCnwyhJNjEQMLb8GPUFoBa5iowWVLK0Gr9YLqNSGyp2pq-XZT3-lCP_lqD1DhASdLag_MRUcB3NM_K7uHqQeIxPdbj3gPLdT9vX9uYHK7ETYGoIjXvIO1StRGdHJvxUHsnA0sNGWrH3HbYbtkDSN9PPE1AAEPZfqnjpS0fgBOb8osJDoy8iN3PLLOJBJISIOTpooN5FEQnRGrlAZhJV0JVX_S5TOnqcQwb2q9DipyFUfRm6-ceBrshjrjb3tF9NOSv8OT_W86EExyK6S8EfeGhebgexQeNhjOPChNg4DG4eAN2hkubFQk-K-9eZG4P2Y7Vz4SyE-ITnRJ-M861_qUwMu-6GyKCN4uPU0ixZBpFAlOJACwozJaN6XeGRELHAIcXWUQBj1gPNGrXNbu1WURlmZGfwVg2-Z2xMEk0BaIbBKwM2-mHbhLIrLb5mutPL43i2YIbium7HsKAusWn9j5vnbwlmg-UoSWt_Rk-TPPfxfiiL-bwsLq8Tp50ZjV8mPiksdIUMSZSww-ihdfDVSSB2klrEU4AEb_vKD1oMXNe5FyvQwA2b6h3HnUSmPKqZ0ixLO9I5iY1olkbHNAW2RxQgKSGIE5WBPbbydl8AU0EK0c7vPWnKmCUWoGUqry7y2nQuox74rHM5vwkbhpg5rVbUAmYchRgiABkuVHFu_hxb0aGeSDy1jSu1NjBAODzauiWGf5YLL2qsjbFsJEO7rYi9cy9PPeWUshPgruazQ-36265G2xzh2MacA8yDimJu5ir5HxO4wlBhmjTLOX625iHGHf89-IyPu5dyjTEQExSqxJ-BX_clnSFrQtG8uyxZMIkLBrGonO4k0vqMr7n6VSsNOS9aD4fXuqmBGXKBLvwrtdtSyRzRtBJexUJBx1OjEtqf6yqRJYhGrFrOsUTCaUUh5gh8JUnsL4kkNnlup7ijElpsiIOx71ruOSQEz112G74bZCk3o08CjYV7d8tqJ4d6HmDIaHHTsvXOgosLmVSL8zolhT3N245ROIKRu49qxHe1ea0bMdiEWm4VQxBKZ9atSD-AiYFBsqrsr3-0vZJ3sANVEu0fR-L-6qLExMOPONRpqa3NakGQ3BjEu_N4RNhEq22gEwn63lP5dV--NSyXv8_Go4LuGFry6RpZhi7BNFYaiAjnJ36-X9CbRifBEaFcOfR6qCTO3uV8SGlOO1YDCv3EHVIBf3o9L21FBgCGQZCzpU4z0UvcozFWjSz0zio25U0vgLOYTCfXoNCEgqreBbc7EZYWGYYfJN1zjWIS8YENlJ_bpLL2R2MOiRPVQFCizRLpwX1CZQ03NfUlx2iopCP-knYqZpsYMi2SkkHT-K8wHe2MgmCWsRvdstwnJi4w2minILUoZIKUsQAzxwKslHRbKdEomExRgIdi_2CU7JyPCzE7vRCCwd
Source: global traffic HTTP traffic detected: GET /LVGwXwqP HTTP/1.1Host: hnamedmr.ukremediatlon.co.ukConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Host: www.example.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic HTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.example.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://www.example.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global traffic DNS traffic detected: DNS query: url.uk.m.mimecastprotect.com
Source: global traffic DNS traffic detected: DNS query: security-uk.m.mimecastprotect.com
Source: global traffic DNS traffic detected: DNS query: www.google.com
Source: global traffic DNS traffic detected: DNS query: hnamedmr.ukremediatlon.co.uk
Source: global traffic DNS traffic detected: DNS query: www.example.com
Source: unknown HTTP traffic detected: POST /RST2.srf HTTP/1.0Connection: Keep-AliveContent-Type: application/soap+xmlAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 10.0; Win64; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; IDCRL 24.10.0.19045.0.0; IDCRL-cfg 16.000.29743.00; App svchost.exe, 10.0.19041.1806, {DF60E2DF-88AD-4526-AE21-83D130EF0F68})Content-Length: 3592Host: login.live.com
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 22 Oct 2024 14:11:04 GMTContent-Type: text/html; charset=utf-8Content-Length: 180Connection: closex-content-type-options: nosniffx-xss-protection: 1; mode=blockx-frame-options: SAMEORIGINReferrer-Policy: no-referrerX-Robots-Tag: noindex, nofollowStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadETag: W/"b4-Rx6/Sa3RjWBf0k8YjdRg8WXd70U"Vary: Accept-Encoding
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 22 Oct 2024 14:11:09 GMTContent-Type: text/html; charset=utf-8Content-Length: 180Connection: closex-content-type-options: nosniffx-xss-protection: 1; mode=blockx-frame-options: SAMEORIGINReferrer-Policy: no-referrerX-Robots-Tag: noindex, nofollowStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadETag: W/"b4-Rx6/Sa3RjWBf0k8YjdRg8WXd70U"Vary: Accept-Encoding
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 22 Oct 2024 14:11:39 GMTContent-Type: text/html; charset=utf-8Content-Length: 180Connection: closex-content-type-options: nosniffx-xss-protection: 1; mode=blockx-frame-options: SAMEORIGINReferrer-Policy: no-referrerX-Robots-Tag: noindex, nofollowStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadETag: W/"b4-Rx6/Sa3RjWBf0k8YjdRg8WXd70U"Vary: Accept-Encoding
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundAge: 291460Cache-Control: max-age=604800Content-Type: text/htmlDate: Tue, 22 Oct 2024 14:11:46 GMTEtag: "1088432560+gzip+ident"Expires: Tue, 29 Oct 2024 14:11:46 GMTLast-Modified: Sat, 12 Oct 2024 03:26:51 GMTServer: ECAcc (dad/5FB0)Vary: Accept-EncodingX-Cache: 404-HITContent-Length: 1256Connection: close
Source: chromecache_173.10.dr String found in binary or memory: http://www.mimecast.com/
Source: chromecache_173.10.dr String found in binary or memory: https://community.mimecast.com/docs/DOC-241
Source: App1729606183002160900_0A09A35D-7331-45A2-8597-74C0710D4482.log.0.dr String found in binary or memory: https://login.windows.net
Source: ~WRS{5E8782E3-8D4A-45DD-A929-A96DB03A977F}.tmp.0.dr String found in binary or memory: https://pub.lucidpress.com/50f1c535-8058-4eec-b469-2bd69fae4557/
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastp=
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastprot=
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastprotec=
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/0c3qC3QDxSxmYrQsYCOFQ4SPB?domain=3D=
Source: ~WRS{5E8782E3-8D4A-45DD-A929-A96DB03A977F}.tmp.0.dr String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/0c3qC3QDxSxmYrQsYCOFQ4SPB?domain=citipostmail.co.uk/
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/0c3qC=
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/1k4bC2xBwh6=
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/1k4bC2xBwh6koDwi=
Source: ~WRS{5E8782E3-8D4A-45DD-A929-A96DB03A977F}.tmp.0.dr String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/1k4bC2xBwh6koDwiMu6F5BKCc?domain=urldefense.proofpoint.com
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/=
Source: ~WRS{5E8782E3-8D4A-45DD-A929-A96DB03A977F}.tmp.0.dr String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/P5e4CYWP9Ug3oyxU9iGFxYVR2?domain=whistl.co.uk
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/ZlrZCZYQ9UxMnWNsysRFBA-ZP?domain=3D=
Source: ~WRS{5E8782E3-8D4A-45DD-A929-A96DB03A977F}.tmp.0.dr String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/ZlrZCZYQ9UxMnWNsysRFBA-ZP?domain=hnamedmr.ukremediatlon.co.uk
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/cIB8C4Q0yS6JAw1iNFEF4GZlf?domain=3D=
Source: ~WRS{5E8782E3-8D4A-45DD-A929-A96DB03A977F}.tmp.0.dr String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/cIB8C4Q0yS6JAw1iNFEF4GZlf?domain=urldefense.proofpoint.com
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/lBBfC1WAvUOpwQYUYtmFVP1nh?domain=3D=
Source: ~WRS{5E8782E3-8D4A-45DD-A929-A96DB03A977F}.tmp.0.dr String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/lBBfC1WAvUOpwQYUYtmFVP1nh?domain=linkedin.com
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/lBBfC=
Source: [EXTERNAL] Re_ Quotes.eml String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/rS3GCXLO9cGn7LYCVh6=
Source: ~WRS{5E8782E3-8D4A-45DD-A929-A96DB03A977F}.tmp.0.dr String found in binary or memory: https://url.uk.m.mimecastprotect.com/s/rS3GCXLO9cGn7LYCVh6FWJ9uL?domain=whistl.co.uk/
Source: chromecache_185.10.dr, chromecache_179.10.dr String found in binary or memory: https://www.iana.org/domains/example
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49744
Source: unknown Network traffic detected: HTTP traffic on port 49710 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49743
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49740
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49743 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49737
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 49753 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49698
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49679 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49724 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49728 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49749 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 49752 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49728
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49726
Source: unknown Network traffic detected: HTTP traffic on port 49718 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49724
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49723
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49722
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 49706 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49748 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49722 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49718
Source: unknown Network traffic detected: HTTP traffic on port 49751 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49755 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 49698 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49755
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49710
Source: unknown Network traffic detected: HTTP traffic on port 49709 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49754
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49753
Source: unknown Network traffic detected: HTTP traffic on port 49673 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49752
Source: unknown Network traffic detected: HTTP traffic on port 49705 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49751
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49750
Source: unknown Network traffic detected: HTTP traffic on port 49726 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49747 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49744 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49723 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49709
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49706
Source: unknown Network traffic detected: HTTP traffic on port 49750 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49705
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49749
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49748
Source: unknown Network traffic detected: HTTP traffic on port 49754 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49747
Source: unknown Network traffic detected: HTTP traffic on port 49737 -> 443
Source: unknown HTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.18:49698 version: TLS 1.2
Source: unknown HTTPS traffic detected: 40.126.32.138:443 -> 192.168.2.18:49705 version: TLS 1.2
Source: unknown HTTPS traffic detected: 40.126.32.138:443 -> 192.168.2.18:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.18:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 2.23.209.140:443 -> 192.168.2.18:49712 version: TLS 1.2
Source: classification engine Classification label: mal48.winEML@23/71@12/7
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE File created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE File created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241022T1009420773-740.etl Jump to behavior
Source: unknown Process created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\[EXTERNAL] Re_ Quotes.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "0F810BE9-1EE3-4005-871B-CC3AF9EB26A5" "EB03CE19-C594-4EA9-AD58-197437118574" "740" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://url.uk.m.mimecastprotect.com/s/ZlrZCZYQ9UxMnWNsysRFBA-ZP?domain=hnamedmr.ukremediatlon.co.uk
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1944,i,1824875940929507423,6371601856566642731,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "0F810BE9-1EE3-4005-871B-CC3AF9EB26A5" "EB03CE19-C594-4EA9-AD58-197437118574" "740" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://url.uk.m.mimecastprotect.com/s/ZlrZCZYQ9UxMnWNsysRFBA-ZP?domain=hnamedmr.ukremediatlon.co.uk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1944,i,1824875940929507423,6371601856566642731,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: c2r64.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32 Jump to behavior
Source: Google Drive.lnk.9.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.9.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.9.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.9.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.9.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.9.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Window found: window name: SysTabControl32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common Jump to behavior

Persistence and Installation Behavior

barindex
Source: Email LLM: Email contains prominent button: 'click here'
Source: Email LLM: Detected potential phishing email: The email claims to have a 'request file' that requires login with email credentials, which is a common phishing tactic.
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Key value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\outlook\ConfigContextData 1 Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE File Volume queried: C:\Windows\SysWOW64 FullSizeInformation Jump to behavior
Source: [EXTERNAL] Re_ Quotes.eml Binary or memory string: XtoWLqcLpqQZO7d8htCRKkomVMCIeHgNIucVb5i22OMsx/eYCfmpSj86d7gHk4cNVwwhgAf69sDW
Source: [EXTERNAL] Re_ Quotes.eml Binary or memory string: tWsxSWCM141PgIYASbtD9SAmojEFKsWHGFS+zF+X1+dwu8zM4/Ggp3QFlAUMxvSk+r3MQZWd6vr/
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE Process information queried: ProcessInformation Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Queries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs