Phishing & Macro Abuse
Suspicious Lineage: outlook.exe or winword.exe → cmd.exe or powershell.exe.
Word processors have no legitimate business spawning command interpreters. This is a classic signature of a malicious macro executing a dropper payload.