Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Fw INVOICE TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.zip

Overview

General Information

Sample name:Fw INVOICE TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.zip
Analysis ID:1484921
MD5:ae7cfab4b1dd7bd43c954abf9c202ee0
SHA1:b996b9c0de51017f56118d42e7b3b793fc648ea3
SHA256:4d6a89ed07b16b0345d2ec78fe9c8f3a59416cb4d942e03194726891007ca574
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • rundll32.exe (PID: 1824 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • OUTLOOK.EXE (PID: 5408 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\AppData\Local\Temp\Temp1_Fw INVOICE TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.zip\Fw INVOICE TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.msg" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 5204 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "106CC214-4CDC-4F43-A7CF-4B979FECDB8F" "4CC7A8D2-B3F7-4F41-BAFD-3B5439DA98B8" "5408" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • Acrobat.exe (PID: 5768 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\XSG1MZTQ\Invoice TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 6228 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 3840 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2260 --field-trial-handle=1596,i,11347821635958592760,3381670014622489091,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
    • chrome.exe (PID: 6936 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://secure.zervant.com/recipient-portal/?accessToken=z5YY1SAZlE9ODNw4Ec%2FHXLTwpvEg1Bkp%2BBzy%2BqYzP7jv7qsKrjqjCEE7sClXZPwhDtT9x9IrjRrFzBtcRZ5Hb%2BmiLgQDNu2NFopbyYe2AQ7MdzoDr8RXBuK3W9ZuNOBbCfbjsiXNOaeKBnyzLe4zFCg%2FYmJ%2BIAMDy8YNQyXVS%2FGeMlrd5znKWRXmIqRnIe3zlnpDzVayuVk8k1N%2FnOlrQgsuLatQoETDGD6BmLyZSlwwYXDP84erK7dpVTk01QYp MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7108 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 --field-trial-handle=1948,i,5261554049205928031,3153245880327705366,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 5408, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
Source: Registry Key setAuthor: frack113: Data: Details: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\XSG1MZTQ\, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 5408, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Security\OutlookSecureTempFolder
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: about:srcdocLLM: Score: 7 brands: Intuit QuickBooks Reasons: The URL 'about:srcdoc' is highly suspicious as it is not a valid domain and is typically used in phishing attacks to display content without a proper web address. The image shows an invoice from 'Intuit QuickBooks', a legitimate brand, but the presence of a 'Download PDF' link without a clear and trustworthy URL is a common phishing tactic. Additionally, the use of 'about:srcdoc' suggests an attempt to obscure the true source of the content. There is no prominent login form or captcha, but the social engineering technique of presenting an urgent invoice is evident. Therefore, this site is likely a phishing site. DOM: 6.5.pages.csv
Source: https://m.stripe.network/inner.html#url=https%3A%2F%2Fsecure.zervant.com%2Frecipient-portal%2F%3FaccessToken%3Dz5YY1SAZlE9ODNw4Ec%252FHXLTwpvEg1Bkp%252BBzy%252BqYzP7jv7qsKrjqjCEE7sClXZPwhDtT9x9IrjRrFzBtcRZ5Hb%252BmiLgQDNu2NFopbyYe2AQ7MdzoDr8RXBuK3W9ZuNOBbCfbjsiXNOaeKBnyzLe4zFCg%252FYmJ%252BIAMDy8YNQyXVS%252FGeMlrd5znKWRXmIqRnIe3zlnpDzVayuVk8k1N%252FnOlrQgsuLatQoETDGD6BmLyZSlwwYXDP84erK7dpVTk01QYp&title=&referrer=&muid=NA&sid=NA&version=6&preview=falseHTTP Parser: No favicon
Source: about:srcdocHTTP Parser: No favicon
Source: https://js.stripe.com/v3/m-outer-3437aaddcdf6922d623e172c2d6f9278.html#url=https%3A%2F%2Fsecure.zervant.com%2Frecipient-portal%2F%3FaccessToken%3Dz5YY1SAZlE9ODNw4Ec%252FHXLTwpvEg1Bkp%252BBzy%252BqYzP7jv7qsKrjqjCEE7sClXZPwhDtT9x9IrjRrFzBtcRZ5Hb%252BmiLgQDNu2NFopbyYe2AQ7MdzoDr8RXBuK3W9ZuNOBbCfbjsiXNOaeKBnyzLe4zFCg%252FYmJ%252BIAMDy8YNQyXVS%252FGeMlrd5znKWRXmIqRnIe3zlnpDzVayuVk8k1N%252FnOlrQgsuLatQoETDGD6BmLyZSlwwYXDP84erK7dpVTk01QYp&title=&referrer=&muid=NA&sid=NA&version=6&preview=falseHTTP Parser: No favicon
Source: chrome.exeMemory has grown: Private usage: 1MB later: 30MB
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.221.95
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: secure.zervant.com
Source: global trafficDNS traffic detected: DNS query: use.typekit.net
Source: global trafficDNS traffic detected: DNS query: js.stripe.com
Source: global trafficDNS traffic detected: DNS query: p.typekit.net
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: test-translations.zerv.me
Source: global trafficDNS traffic detected: DNS query: m.stripe.network
Source: global trafficDNS traffic detected: DNS query: m.stripe.com
Source: global trafficDNS traffic detected: DNS query: stripe.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: classification engineClassification label: mal48.phis.winZIP@38/84@30/120
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20240730T1401020998-5408.etl
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.ini
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /f "C:\Users\user\AppData\Local\Temp\Temp1_Fw INVOICE TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.zip\Fw INVOICE TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.msg"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "106CC214-4CDC-4F43-A7CF-4B979FECDB8F" "4CC7A8D2-B3F7-4F41-BAFD-3B5439DA98B8" "5408" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\XSG1MZTQ\Invoice TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2260 --field-trial-handle=1596,i,11347821635958592760,3381670014622489091,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 8A9CF643742EF8A4F21F01FDB1EB22A5
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "106CC214-4CDC-4F43-A7CF-4B979FECDB8F" "4CC7A8D2-B3F7-4F41-BAFD-3B5439DA98B8" "5408" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\XSG1MZTQ\Invoice TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2260 --field-trial-handle=1596,i,11347821635958592760,3381670014622489091,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://secure.zervant.com/recipient-portal/?accessToken=z5YY1SAZlE9ODNw4Ec%2FHXLTwpvEg1Bkp%2BBzy%2BqYzP7jv7qsKrjqjCEE7sClXZPwhDtT9x9IrjRrFzBtcRZ5Hb%2BmiLgQDNu2NFopbyYe2AQ7MdzoDr8RXBuK3W9ZuNOBbCfbjsiXNOaeKBnyzLe4zFCg%2FYmJ%2BIAMDy8YNQyXVS%2FGeMlrd5znKWRXmIqRnIe3zlnpDzVayuVk8k1N%2FnOlrQgsuLatQoETDGD6BmLyZSlwwYXDP84erK7dpVTk01QYp
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 --field-trial-handle=1948,i,5261554049205928031,3153245880327705366,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://secure.zervant.com/recipient-portal/?accessToken=z5YY1SAZlE9ODNw4Ec%2FHXLTwpvEg1Bkp%2BBzy%2BqYzP7jv7qsKrjqjCEE7sClXZPwhDtT9x9IrjRrFzBtcRZ5Hb%2BmiLgQDNu2NFopbyYe2AQ7MdzoDr8RXBuK3W9ZuNOBbCfbjsiXNOaeKBnyzLe4zFCg%2FYmJ%2BIAMDy8YNQyXVS%2FGeMlrd5znKWRXmIqRnIe3zlnpDzVayuVk8k1N%2FnOlrQgsuLatQoETDGD6BmLyZSlwwYXDP84erK7dpVTk01QYp
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2004 --field-trial-handle=1948,i,5261554049205928031,3153245880327705366,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
Rundll32
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Registry Run Keys / Startup Folder
1
Process Injection
Security Account Manager14
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Extra Window Memory Injection
1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Extra Window Memory Injection
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
about:srcdoc0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
secure.zervant.com
3.161.119.28
truefalse
    unknown
    edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
    217.20.57.20
    truefalse
      unknown
      test-translations.zerv.me
      13.32.121.12
      truefalse
        unknown
        m.stripe.com
        44.236.136.3
        truefalse
          unknown
          dexeqbeb7giwr.cloudfront.net
          18.66.122.50
          truefalse
            unknown
            stripe.com
            198.137.150.81
            truefalse
              unknown
              www.google.com
              142.250.185.68
              truefalse
                unknown
                stripecdn.map.fastly.net
                151.101.0.176
                truefalse
                  unknown
                  use.typekit.net
                  unknown
                  unknownfalse
                    unknown
                    p.typekit.net
                    unknown
                    unknownfalse
                      unknown
                      m.stripe.network
                      unknown
                      unknownfalse
                        unknown
                        js.stripe.com
                        unknown
                        unknownfalse
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://secure.zervant.com/recipient-portal/?accessToken=z5YY1SAZlE9ODNw4Ec%2FHXLTwpvEg1Bkp%2BBzy%2BqYzP7jv7qsKrjqjCEE7sClXZPwhDtT9x9IrjRrFzBtcRZ5Hb%2BmiLgQDNu2NFopbyYe2AQ7MdzoDr8RXBuK3W9ZuNOBbCfbjsiXNOaeKBnyzLe4zFCg%2FYmJ%2BIAMDy8YNQyXVS%2FGeMlrd5znKWRXmIqRnIe3zlnpDzVayuVk8k1N%2FnOlrQgsuLatQoETDGD6BmLyZSlwwYXDP84erK7dpVTk01QYpfalse
                            unknown
                            https://m.stripe.network/inner.html#url=https%3A%2F%2Fsecure.zervant.com%2Frecipient-portal%2F%3FaccessToken%3Dz5YY1SAZlE9ODNw4Ec%252FHXLTwpvEg1Bkp%252BBzy%252BqYzP7jv7qsKrjqjCEE7sClXZPwhDtT9x9IrjRrFzBtcRZ5Hb%252BmiLgQDNu2NFopbyYe2AQ7MdzoDr8RXBuK3W9ZuNOBbCfbjsiXNOaeKBnyzLe4zFCg%252FYmJ%252BIAMDy8YNQyXVS%252FGeMlrd5znKWRXmIqRnIe3zlnpDzVayuVk8k1N%252FnOlrQgsuLatQoETDGD6BmLyZSlwwYXDP84erK7dpVTk01QYp&title=&referrer=&muid=NA&sid=NA&version=6&preview=falsefalse
                              unknown
                              https://js.stripe.com/v3/m-outer-3437aaddcdf6922d623e172c2d6f9278.html#url=https%3A%2F%2Fsecure.zervant.com%2Frecipient-portal%2F%3FaccessToken%3Dz5YY1SAZlE9ODNw4Ec%252FHXLTwpvEg1Bkp%252BBzy%252BqYzP7jv7qsKrjqjCEE7sClXZPwhDtT9x9IrjRrFzBtcRZ5Hb%252BmiLgQDNu2NFopbyYe2AQ7MdzoDr8RXBuK3W9ZuNOBbCfbjsiXNOaeKBnyzLe4zFCg%252FYmJ%252BIAMDy8YNQyXVS%252FGeMlrd5znKWRXmIqRnIe3zlnpDzVayuVk8k1N%252FnOlrQgsuLatQoETDGD6BmLyZSlwwYXDP84erK7dpVTk01QYp&title=&referrer=&muid=NA&sid=NA&version=6&preview=falsefalse
                                unknown
                                about:srcdoctrue
                                • Avira URL Cloud: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                13.32.27.95
                                unknownUnited States
                                7018ATT-INTERNET4USfalse
                                3.161.119.28
                                secure.zervant.comUnited States
                                16509AMAZON-02USfalse
                                217.20.57.20
                                edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comDenmark
                                15516DK-DANSKKABELTVDKfalse
                                151.101.0.176
                                stripecdn.map.fastly.netUnited States
                                54113FASTLYUSfalse
                                184.28.88.176
                                unknownUnited States
                                16625AKAMAI-ASUSfalse
                                18.165.122.85
                                unknownUnited States
                                3MIT-GATEWAYSUSfalse
                                13.32.121.129
                                unknownUnited States
                                16509AMAZON-02USfalse
                                216.58.206.72
                                unknownUnited States
                                15169GOOGLEUSfalse
                                2.19.126.206
                                unknownEuropean Union
                                16625AKAMAI-ASUSfalse
                                142.250.185.202
                                unknownUnited States
                                15169GOOGLEUSfalse
                                20.189.173.17
                                unknownUnited States
                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                64.233.166.84
                                unknownUnited States
                                15169GOOGLEUSfalse
                                198.137.150.81
                                stripe.comUnited States
                                3356LEVEL3USfalse
                                52.6.155.20
                                unknownUnited States
                                14618AMAZON-AESUSfalse
                                142.250.186.110
                                unknownUnited States
                                15169GOOGLEUSfalse
                                172.217.18.99
                                unknownUnited States
                                15169GOOGLEUSfalse
                                2.16.202.91
                                unknownEuropean Union
                                16625AKAMAI-ASUSfalse
                                44.236.136.3
                                m.stripe.comUnited States
                                16509AMAZON-02USfalse
                                172.64.41.3
                                unknownUnited States
                                13335CLOUDFLARENETUSfalse
                                52.113.194.132
                                unknownUnited States
                                8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                35.162.151.58
                                unknownUnited States
                                16509AMAZON-02USfalse
                                18.66.122.50
                                dexeqbeb7giwr.cloudfront.netUnited States
                                3MIT-GATEWAYSUSfalse
                                142.250.185.68
                                www.google.comUnited States
                                15169GOOGLEUSfalse
                                1.1.1.1
                                unknownAustralia
                                13335CLOUDFLARENETUSfalse
                                52.109.68.130
                                unknownUnited States
                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                2.16.241.15
                                unknownEuropean Union
                                20940AKAMAI-ASN1EUfalse
                                13.32.121.12
                                test-translations.zerv.meUnited States
                                16509AMAZON-02USfalse
                                239.255.255.250
                                unknownReserved
                                unknownunknownfalse
                                52.109.28.46
                                unknownUnited States
                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                172.217.16.195
                                unknownUnited States
                                15169GOOGLEUSfalse
                                151.101.192.176
                                unknownUnited States
                                54113FASTLYUSfalse
                                IP
                                192.168.2.16
                                Joe Sandbox version:40.0.0 Tourmaline
                                Analysis ID:1484921
                                Start date and time:2024-07-30 19:59:39 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:23
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • EGA enabled
                                Analysis Mode:stream
                                Analysis stop reason:Timeout
                                Sample name:Fw INVOICE TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.zip
                                Detection:MAL
                                Classification:mal48.phis.winZIP@38/84@30/120
                                Cookbook Comments:
                                • Found application associated with file extension: .zip
                                • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 52.109.28.46, 52.113.194.132
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtQueryAttributesFile calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtSetValueKey calls found.
                                • VT rate limit hit for: Fw INVOICE TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.zip
                                InputOutput
                                URL: about:srcdoc Model: Perplexity: mixtral-8x7b-instruct
                                {"loginform": false,"urgency": true,"captcha": false,"reasons": ["The webpage contains text that creates a sense of urgency, such as 'Download PDF Of P Au toebic d, dispute Lhis & you .2ZE3Z7E. oate it Tet* I ussng.'","The text also includes phrases like 'Total amount due us 53gg_oo Pa ymer t terms: Buyer's referentey INTUIT QUICKBOOKS zervant' which may prompt the user to take immediate action."]}
                                Title: Invoice  Created with Zervant OCR: Sent INVOICE - TEST-4 quickbooks 2017.2024 INTUITOUlCK300KS 2813.2024 $399.00 quiek Beaks INTUIT guvwecoxs 2702 :WuIiLir' Oue in 29 days (29_oa 20241 Download PDF Of P Au toebic d, dispute Lhis & you .2ZE3Z7E. oate it Tet* I ussng.ao Toea' MAT uss3g9DD Total amount due us 53gg_oo Pa ymer t terms: Buyer's referentey INTUIT QUICKBOOKS zervant Created using Zervant Professional invoicing software 
                                URL: about:srcdoc Model: gpt-4o
                                ```json
                                {
                                  "phishing_score": 7,
                                  "brands": "Intuit QuickBooks",
                                  "phishing": true,
                                  "suspicious_domain": true,
                                  "has_prominent_loginform": false,
                                  "has_captcha": false,
                                  "setechniques": true,
                                  "has_suspicious_link": true,
                                  "legitmate_domain": "quickbooks.intuit.com",
                                  "reasons": "The URL 'about:srcdoc' is highly suspicious as it is not a valid domain and is typically used in phishing attacks to display content without a proper web address. The image shows an invoice from 'Intuit QuickBooks', a legitimate brand, but the presence of a 'Download PDF' link without a clear and trustworthy URL is a common phishing tactic. Additionally, the use of 'about:srcdoc' suggests an attempt to obscure the true source of the content. There is no prominent login form or captcha, but the social engineering technique of presenting an urgent invoice is evident. Therefore, this site is likely a phishing site."
                                }
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):287
                                Entropy (8bit):5.172027217160768
                                Encrypted:false
                                SSDEEP:
                                MD5:55E0E595ACD85F8DF4D5B05657A037C5
                                SHA1:451FC804E0EB92E4956F3102144A4AD8AE0DFD79
                                SHA-256:42BB05D0223DC6563256D703A4E64C9A67A6F4FBAFD339EB8C9B8F40B2D7672C
                                SHA-512:D49AA76FDAFABE43B1C8C3165FB5C77F6A8E13C52DF4A84C1B8A0781E6885704EF6100ACCE8BA0D4A060E542513CC73755CF283322CF44E36C936FF455321A9C
                                Malicious:false
                                Reputation:unknown
                                Preview:2024/07/30-14:01:13.643 2f4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/07/30-14:01:13.646 2f4 Recovering log #3.2024/07/30-14:01:13.646 2f4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):331
                                Entropy (8bit):5.1888632402128945
                                Encrypted:false
                                SSDEEP:
                                MD5:D93F9735AA43E85884729C5A264209C5
                                SHA1:59BE8B2F9962D6A18D701A69E44A9DFBF6691A25
                                SHA-256:9A0E404DB064E93AAD40F0E74C0EA538E9F11B0DC1F94FF82E760D0BECFD49F2
                                SHA-512:3AFC1948B17D55D19C1D26ED63D88A2AA752F4147048A1B1665A076BBA0E64D1D3AA0AEB648836DAC8477F34B3DF0FA7AA0C0AACC0F00AE56879A829D8BF114F
                                Malicious:false
                                Reputation:unknown
                                Preview:2024/07/30-14:01:13.561 cd8 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/07/30-14:01:13.564 cd8 Recovering log #3.2024/07/30-14:01:13.566 cd8 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):4099
                                Entropy (8bit):5.225283715554595
                                Encrypted:false
                                SSDEEP:
                                MD5:86CA3F4E7AB9138D2D7BBDE9985954A7
                                SHA1:50CC2F86481516711E21E5ADA977E5834B033A4F
                                SHA-256:1A7309BEB7731567E9FE7A0455318B1C620881A316D87804849FF193B1FA8CDC
                                SHA-512:F38A9B180E256AB8C83F7440AAC1EF4EF183C313C185472358E73CE2C008A3A4A494317DC4E2EAEA6C23FE0237385D50B74D42F826056A3B90FA24A1C70718B9
                                Malicious:false
                                Reputation:unknown
                                Preview:*...#................version.1..namespace-e...o................next-map-id.1.Pnamespace-1d95df23_a38f_44a8_b732_4e62dd896a16-https://rna-resource.acrobat.com/.0y.S_r................next-map-id.2.Snamespace-2a884c18_b39c_4e3d_942f_252e530ca4bd-https://rna-v2-resource.acrobat.com/.16.X:r................next-map-id.3.Snamespace-2e78bfda_7188_4688_a4aa_1ff81b6e5eaa-https://rna-v2-resource.acrobat.com/.2.P.@o................next-map-id.4.Pnamespace-09c119c2_97bc_4467_8f67_f92472c9e5dc-https://rna-resource.acrobat.com/.346.+^...............Pnamespace-1d95df23_a38f_44a8_b732_4e62dd896a16-https://rna-resource.acrobat.com/....^...............Pnamespace-09c119c2_97bc_4467_8f67_f92472c9e5dc-https://rna-resource.acrobat.com/..?&a...............Snamespace-2a884c18_b39c_4e3d_942f_252e530ca4bd-https://rna-v2-resource.acrobat.com/_...a...............Snamespace-2e78bfda_7188_4688_a4aa_1ff81b6e5eaa-https://rna-v2-resource.acrobat.com/...o................next-map-id.5.Pnamespace-07af9ee9_2076_4f12_94b5_
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):319
                                Entropy (8bit):5.217873733598778
                                Encrypted:false
                                SSDEEP:
                                MD5:8CC22F10DD9D9E3DA8ADFF9E6B57DD7B
                                SHA1:421DC7EF3ED60FD6622BDE9F3B2D12C000AEE8D5
                                SHA-256:CAD7A2717D5EA1B4CCB9EF55462230694D51CC1851AE0E5BBD02D4C7444A5549
                                SHA-512:156A13F32E565865831FF447E73183F1F3523A7D2A8E2B788FEF7F50F3FB7CE46E978A98EEE1145F0CBB0BF4FFE8D9BD0E5E666F1FE3EE67EA4FDAC2E7DBEF0F
                                Malicious:false
                                Reputation:unknown
                                Preview:2024/07/30-14:01:13.691 cd8 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/07/30-14:01:13.693 cd8 Recovering log #3.2024/07/30-14:01:13.695 cd8 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
                                Category:dropped
                                Size (bytes):65110
                                Entropy (8bit):0.9511211438848483
                                Encrypted:false
                                SSDEEP:
                                MD5:8BA8359F2C78C2897F4B6A41BEC17ED8
                                SHA1:27ADD97B14AD09E774CCCC792BC3CABC2677A36E
                                SHA-256:48469D5B1EE7A2BBF5D551FD488F47B52A2C054176E8C9A596E5A50483B79154
                                SHA-512:3D8F52C999BA21DAC3A9187E99B9CCD550D08AD1024B9350FE0E8A8D005508A235EBECB5D7183D640B1DBE5552024937303DF30229183E7368957BC9D79419FF
                                Malicious:false
                                Reputation:unknown
                                Preview:BMV.......6...(...k...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 2, database pages 14, cookie 0x5, schema 4, UTF-8, version-valid-for 2
                                Category:dropped
                                Size (bytes):57344
                                Entropy (8bit):3.291927920232006
                                Encrypted:false
                                SSDEEP:
                                MD5:A4D5FECEFE05F21D6F81ACF4D9A788CF
                                SHA1:1A9AC236C80F2A2809F7DE374072E2FCCA5A775C
                                SHA-256:83BE4623D80FFB402FBDEC4125671DF532845A3828A1B378D99BD243A4FD8FF2
                                SHA-512:FF106C6B9E1EA4B1F3E3AB01FAEA21BA24A885E63DDF0C36EB0A8C3C89A9430FE676039C076C50D7C46DC4E809F6A7E35A4BFED64D9033FEBD6121AC547AA5E9
                                Malicious:false
                                Reputation:unknown
                                Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:SQLite Rollback Journal
                                Category:dropped
                                Size (bytes):16928
                                Entropy (8bit):1.2160291275063095
                                Encrypted:false
                                SSDEEP:
                                MD5:26A1A5B25A439F41E9ACAA0241608E7A
                                SHA1:BDD2EDF0CF4742033BF9A024BBCE2BB2C341F691
                                SHA-256:D2B83B5E6B2B1BCBA52B541BFCEA3CBB476110D792636B654A995560CCD6D3C8
                                SHA-512:113180EC7349ABFA07E872627A89B06B6F96AEF6B154C737CEE1A329A4EE6B301DAFB371ED9F61F76DA70620D61E2E8B423F19E465E5638F7D20C7CDC278A154
                                Malicious:false
                                Reputation:unknown
                                Preview:.... .c......]..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                Category:dropped
                                Size (bytes):71954
                                Entropy (8bit):7.996617769952133
                                Encrypted:true
                                SSDEEP:
                                MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                Malicious:false
                                Reputation:unknown
                                Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):893
                                Entropy (8bit):7.366016576663508
                                Encrypted:false
                                SSDEEP:
                                MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                                SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                                SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                                SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                                Malicious:false
                                Reputation:unknown
                                Preview:0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                File Type:data
                                Category:modified
                                Size (bytes):328
                                Entropy (8bit):3.144086598890895
                                Encrypted:false
                                SSDEEP:
                                MD5:C4D13069329F4E9210E2DD53581C2F3E
                                SHA1:B19CCEFD75E68EDF51D273E0E3FCEA37BFA7C963
                                SHA-256:074A6A3B710AC6AABF8299C15E1A32B1E2D99E1EECC5D0B792EEAE2D59511F7E
                                SHA-512:3460423BB6EF5EB9CEC77298EF6C4B1B688525889D994B3DB5BB1E6C2308B6730EFE0122AF1E429FDC5F9975F9699589F9F884310062D2B4802EB352DCFD42DF
                                Malicious:false
                                Reputation:unknown
                                Preview:p...... ........=......(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):252
                                Entropy (8bit):3.0264678871426307
                                Encrypted:false
                                SSDEEP:
                                MD5:F775A9075E74532710C6E57EB5BB13DA
                                SHA1:F8E3DCE69F51C296ED7DDFF8AD0A89B1D33094D7
                                SHA-256:7AF32FA67E9733992087F9774AE33C168109B95EB769AB927ED11960FAB42500
                                SHA-512:CABE3105C5E9A69AE963F813A687923A38BF106A044FFE1C66FF8BBA1C49FB968502B7AD6F437AEE4FF30A61D3F1B4E6FDEBABD0C147E56326BA5CDD95F3B5BE
                                Malicious:false
                                Reputation:unknown
                                Preview:p...... ....`....M.~....(....................................................... ........!.M........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.6.0.7.9.b.8.c.0.9.2.9.c.0."...
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:PostScript document text
                                Category:dropped
                                Size (bytes):185099
                                Entropy (8bit):5.182478651346149
                                Encrypted:false
                                SSDEEP:
                                MD5:94185C5850C26B3C6FC24ABC385CDA58
                                SHA1:42F042285037B0C35BC4226D387F88C770AB5CAA
                                SHA-256:1D9979A98F7C4B3073BC03EE9D974CCE9FE265A1E2F8E9EE26A4A5528419E808
                                SHA-512:652657C00DD6AED1A132E1DFD0B97B8DF233CDC257DA8F75AC9F2428F2F7715186EA8B3B24F8350D409CC3D49AFDD36E904B077E28B4AD3E4D08B4DBD5714344
                                Malicious:false
                                Reputation:unknown
                                Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Reg.FamilyName:Agency FB.StyleName:Regular.MenuName:Agency FB.StyleBits:0.WeightClass:400.WidthClass:3.AngleClass:0.FullName:Agency FB.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB.FileLength:58920.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Bold.FamilyName:Agency FB.StyleName:Bold.MenuName:Agency FB.StyleBits:2.WeightClass:700.WidthClass:3.AngleClass:0.FullName:Agency FB Bold.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB Bold.FileLength:60656.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB Bold.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Algerian.FamilyName:Algerian.StyleName:Regular.MenuName:Algerian.StyleBits:0.We
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:PostScript document text
                                Category:dropped
                                Size (bytes):0
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:
                                MD5:94185C5850C26B3C6FC24ABC385CDA58
                                SHA1:42F042285037B0C35BC4226D387F88C770AB5CAA
                                SHA-256:1D9979A98F7C4B3073BC03EE9D974CCE9FE265A1E2F8E9EE26A4A5528419E808
                                SHA-512:652657C00DD6AED1A132E1DFD0B97B8DF233CDC257DA8F75AC9F2428F2F7715186EA8B3B24F8350D409CC3D49AFDD36E904B077E28B4AD3E4D08B4DBD5714344
                                Malicious:false
                                Reputation:unknown
                                Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Reg.FamilyName:Agency FB.StyleName:Regular.MenuName:Agency FB.StyleBits:0.WeightClass:400.WidthClass:3.AngleClass:0.FullName:Agency FB.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB.FileLength:58920.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Bold.FamilyName:Agency FB.StyleName:Bold.MenuName:Agency FB.StyleBits:2.WeightClass:700.WidthClass:3.AngleClass:0.FullName:Agency FB Bold.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB Bold.FileLength:60656.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB Bold.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Algerian.FamilyName:Algerian.StyleName:Regular.MenuName:Algerian.StyleBits:0.We
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):295
                                Entropy (8bit):5.371757948895893
                                Encrypted:false
                                SSDEEP:
                                MD5:668258A6D9164D1D2E7139C386E87EC4
                                SHA1:C317306A0035E28B98DA69EA060516A7863AC8BB
                                SHA-256:3092223FA15E73D96677B817B817DCC6B508D672EC4B57C73A67476C1F926640
                                SHA-512:7860230EBCE8B6A518BC6DEFDA20755A636D8D0A53E49A8D848524C46C835EF41884CA6B912F389A2820FB2E12B75DF344665EFBDF52D4B363835A37807EB650
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):294
                                Entropy (8bit):5.3218635095043405
                                Encrypted:false
                                SSDEEP:
                                MD5:FD7870E5AD1B450E6E6F9C4C4ED20A44
                                SHA1:96A7CE48A1EC67C91A01F25193EE83FEE74F664F
                                SHA-256:1AFC100D4D9C5701ECD19BAF3506E331260A7FF4E542CFE0DA2631D00A7B9A5D
                                SHA-512:9E2D476F62D5D575A44AFF8489AF6AB22CA043170D2BCE9BA9B084742C6829080D8A0CA759CD523973FC47243ED91E6922F17EB18335549D1F790AC523C847AF
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):294
                                Entropy (8bit):5.2998161095037
                                Encrypted:false
                                SSDEEP:
                                MD5:9ADE6EE00FA0EAB0EF3712D3BA578BA0
                                SHA1:F10E6B3689501AEC3C94F86120BFA1E1DCF08B0C
                                SHA-256:00D8F66CE7C32FF0B55AFE8F134E30EB8F9112D3195BB5836EF1A6E21F37E82E
                                SHA-512:007F1E1094FD2B7C46BACEC97CF0D827E622D2C5CC3DCC3979AA3277F37ECC305D4EE796AA3766CC2504443698E1766FEB16D7AAF14AC686AD2A21C86A1B91EB
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):285
                                Entropy (8bit):5.360432683692281
                                Encrypted:false
                                SSDEEP:
                                MD5:E6CEEFD488B04FE4FAACFD5C50513444
                                SHA1:92ED11C14486CEDDA9725860094C232F1603DF7F
                                SHA-256:61566750B85CFAF98E52FD5ABFAB814CE2BC810FEE00A3F90B9455A7FBCA7D5B
                                SHA-512:A4660C22180F21A7211156C625037CD8F015DE4D5F6A390F48A16CB4AF926604F63C919F120BEE504CE19C5CAD59A512583607A1F453E1D8625B2B1F205C3A27
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):1063
                                Entropy (8bit):5.668288062944746
                                Encrypted:false
                                SSDEEP:
                                MD5:371B6040C3A8016F2C2500766A0AFD1A
                                SHA1:C47F9AA8CF2D96FE6159AC50F1213D3ACBC4E37A
                                SHA-256:E772F5D3E7E57B28369AFA3943DF4282EBA8AE25E081F4F6D551E291CEDC2A98
                                SHA-512:6AEA1AAE470803A69C8B1B25CEE632467F2132EC8BA771CA7FAC1DBB906121B160AFF8F80D61B05918960E4909443E51550D28DFD2FC72A34F5156EA8CA6CF7D
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85534_264855ActionBlock_2","campaignId":85534,"containerId":"1","controlGroupId":"","treatmentId":"afb9c2a3-eaf4-41f9-9d73-768e72f72282","variationId":"264855"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkNvbnZlcnQgZmlsZXMgdG8gYW5kIGZyb20gUERGXG53aXRob3V0IGxpbWl0cy4ifSwidGNhdElkIjpudWxsfQ==","dataType":"application\/json","encodingSc
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):1050
                                Entropy (8bit):5.655533314731801
                                Encrypted:false
                                SSDEEP:
                                MD5:12B001E6853E20A559E590C1FEDA7798
                                SHA1:8AC5BB1040E50E8106CA8713708B15F4BE342557
                                SHA-256:C6728C518C13C7388D3CD9E1EE97D8A17CEB8C9D3028C6691CBC6138EFC07784
                                SHA-512:5B004CD32DEAF3A21D989A2D6A0064DC4440AD310348BB83C71FB4D0525A4CB82FF97F6BCCB7F4461EB6C2DEC1795B16467ECAD7E47EFCC143335BD7534663A9
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Disc_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85534_264855ActionBlock_0","campaignId":85534,"containerId":"1","controlGroupId":"","treatmentId":"0924134e-3c59-4f53-b731-add558c56fec","variationId":"264855"},"containerId":1,"containerLabel":"JSON for DC_Reader_Disc_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkNvbnZlcnQsIGVkaXQgYW5kIGUtc2lnblxuZm9ybXMgJiBhZ3JlZW1lbnRzLiJ9LCJ0Y2F0SWQiOm51bGx9","dataType":"application\/json","encodingScheme":true},"
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):292
                                Entropy (8bit):5.311539466287375
                                Encrypted:false
                                SSDEEP:
                                MD5:F3442EAF4F05BD1B24CDBE3E88E5F9F0
                                SHA1:4E3F5502A08542FC48359C6ABE8C82E7186CD447
                                SHA-256:D0FA89EC08B10EBCEE4ED61CD5A50DB2909FCFC5BEE23DCC12068C640B3CDB4F
                                SHA-512:1836157E647755ABED3DBF5C8A382615B921B20698ECB5869C63A0D2D9C8AADC3D42F4A53236736E2DB21BEE6F4A5F0F931444307238CB6411BA3CA4C3BB3774
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):1038
                                Entropy (8bit):5.64884790840229
                                Encrypted:false
                                SSDEEP:
                                MD5:36FD41A63D6A5600E57F88000BAC62EC
                                SHA1:4D60A7FCC9A5903C153985EB1D18F5C31B695CEA
                                SHA-256:04A0684688B96B65DBF1F91AC61AA104EC12AE1954A7F5E1321FC69E14CDB170
                                SHA-512:30B4EABD8FAB8B01C0FF18A263A0C9DB9B1DFB83B65C37CD8C210976C2DA87B331278CBC44FACE90A405300F899FD63C4F706A1C1DAC8C85B227A7856C57380F
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Edit_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85534_264855ActionBlock_1","campaignId":85534,"containerId":"1","controlGroupId":"","treatmentId":"49d2f713-7aa9-44db-aa50-0a7a22add459","variationId":"264855"},"containerId":1,"containerLabel":"JSON for DC_Reader_Edit_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVkaXQgdGV4dCwgaW1hZ2VzLCBwYWdlcywgYW5kIG1vcmUuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"application\/json","encodingScheme":true},"endDTS":1744
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):1164
                                Entropy (8bit):5.7026264203260935
                                Encrypted:false
                                SSDEEP:
                                MD5:81DA4BBB2B91515BE26128A29D26912C
                                SHA1:5A5E0E88EE4830BB85C7228E4D9A8D7709EEED1D
                                SHA-256:24AEDB58CCC3D2577DCEB1AEBC40A2B40B549C28BA8CD457AC3FA47D18337233
                                SHA-512:98F06F72046914E059CD3DB3623E4B5791385D1A23B9663D394419DCD864FBE4ED3A245191A228DCE6A0BD660B4FF9ED05F611E4312F3C7C8EC0F7678A1072FA
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Home_LHP_Trial_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85531_264848ActionBlock_0","campaignId":85531,"containerId":"1","controlGroupId":"","treatmentId":"ee1a7497-76e7-43c2-bb63-9a0551e11d73","variationId":"264848"},"containerId":1,"containerLabel":"JSON for DC_Reader_Home_LHP_Trial_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IlRyeSBBY3JvYmF0IFBybyJ9LCJ1aSI6eyJ0aXRsZV9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE1cHgiLCJmb250X3N0eWxlIjoiMCJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjEzcHgiLCJmb250X3N0eWxlIjoiLTEifSwidGl0bGUiOiJGcmVlIHRyaWFsIiwiZGVzY3JpcHRpb24iOiJHZXQgdW5saW1pdGVkIGFjY2VzcyB0b1xucHJlbWl1bSBQREYgYW5kIGUtc2lnbmluZ1xudG9vbHMuIn0sImJhbm5lcl9zdHlsaW5nIjo
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):289
                                Entropy (8bit):5.315270149836527
                                Encrypted:false
                                SSDEEP:
                                MD5:04535CE7ED42BCD4F3A02386C0A5FA50
                                SHA1:C16A434A210046DB5E748EAE57AFFA587433561D
                                SHA-256:D18D58F3873F1693BC7B7138F0148F8400D28953B7F2AEC34579B6535A0A3A09
                                SHA-512:4AB4637F14959B4C5609DFA0F0C06AF0887366EFEDE515F089AAEDE2621464B73F73FEBB7C136D5A01A3F432AFDA7F4482FE4432970E9D7AEBD64A3FB5F019D0
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):1395
                                Entropy (8bit):5.776688029606016
                                Encrypted:false
                                SSDEEP:
                                MD5:26F141ADEE165F4B374D4777C191A225
                                SHA1:7AA49959F80A95FDC9739B3025169F5A3F3BCEA8
                                SHA-256:E0AAB14C97D2C010D385189CD8403386C2BC9D3624387F5E41EC7F7006C862C1
                                SHA-512:8C45285488624E3951227B0C805CD0E9D36A4282EBD533FFC3081787AF2CACECA1120ED2CF8C629FC4632CB4FBD2329E852DE16BC88CA4D5521B687A1377CE51
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_RHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"57802_176003ActionBlock_0","campaignId":57802,"containerId":"1","controlGroupId":"","treatmentId":"d0374f2d-08b2-49b9-9500-3392758c9e2e","variationId":"176003"},"containerId":1,"containerLabel":"JSON for Reader DC RHP Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctRGF5IFRyaWFsIiwiZ29fdXJsIjoiaHR0cHM6Ly9hY3JvYmF0LmFkb2JlLmNvbS9wcm94eS9wcmljaW5nL3VzL2VuL3NpZ24tZnJlZS10cmlhbC5odG1sP3RyYWNraW5naWQ9UEMxUFFMUVQmbXY9aW4tcHJvZHVjdCZtdjI9cmVhZGVyIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjEyIiwiZm9udF9zdHlsZSI6IjMifSwidGl0
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):291
                                Entropy (8bit):5.298712298026977
                                Encrypted:false
                                SSDEEP:
                                MD5:F1BC2A8087E45A49788739CBDA2D91FE
                                SHA1:E1E40190084B98A2FBEA419771A30FD951233C96
                                SHA-256:A0439C0D48B5D849034203A744368BEA3543B0302E68965AA5D71716CF0A45B7
                                SHA-512:67498F7C4FB321B167F2BF1D9B931B5413501FFB3152945086BE837A42BB62D9C520E71E3823D300953F315C182BE6DE52114EB75B2FFF2D101A036DE77794EC
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):287
                                Entropy (8bit):5.302304980017948
                                Encrypted:false
                                SSDEEP:
                                MD5:B966A6B9B6CC1652A6D82628387C7F97
                                SHA1:0A80F2F3D7CDE8825A31427A6F8B3247859DAF6B
                                SHA-256:B1118DFEF2B40372DB7D42F1EF635F6042CFCE4345F186278C70937950D2C7F0
                                SHA-512:F289527288B2909983ABF06102CB840CC8ADEEAD6FE98C7DC624B2C0127AFB5A111DE435FD0D137B69C65B76D6F28559A86D84CF9A5B7160ED4713531F0031EB
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):1058
                                Entropy (8bit):5.656975315484793
                                Encrypted:false
                                SSDEEP:
                                MD5:97A4DC199962991E3819ABCA1CDC2AC4
                                SHA1:96BF46446DD87828355920744EF23A389C19DD04
                                SHA-256:8C20FF89E006D1C26B1F0AE78764307E8C664BD1628B4AFE5AA8843411868535
                                SHA-512:978E06E8EBE3E7DC4C8BD55CFF31079566C5785FB7E84EF82A382F8487CA8C216295145616E5DF63707F856E7DDDF08E6DE557B63F2432E96B391CBCBA1C089E
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85534_264855ActionBlock_3","campaignId":85534,"containerId":"1","controlGroupId":"","treatmentId":"ece07729-7db6-4f20-9f8d-7976ad373049","variationId":"264855"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IlNlbmQgZG9jdW1lbnRzICYgZm9ybXNcbmZvciBmYXN0IGUtc2lnbmluZyBvbmxpbmUuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"application\/json","encodingScheme"
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):286
                                Entropy (8bit):5.27653860170018
                                Encrypted:false
                                SSDEEP:
                                MD5:FD67AD9AD4AD6B1EE8CE5BC7DBA14454
                                SHA1:89FF5E4559CFFFDB536BD4535933D63508EEDD93
                                SHA-256:F99477E13A428736EC72373DA2F1ABF8276B672F274B01831590D2A1B0623E2B
                                SHA-512:651DE6109838ECA8209104938F2FF2A9C170F13431F5194BB4C31A21F600979787EB08952C7BA888452E423C6A3340B05A42EE8C59B82D4EF6898CCD4B7A8527
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):782
                                Entropy (8bit):5.369335029885633
                                Encrypted:false
                                SSDEEP:
                                MD5:0270C192F186F37C7365B0A4B1946DFF
                                SHA1:E99214DA270ECBAB846971B8DBD7A4CE3AA56B86
                                SHA-256:F543938F2E1B88C444B0A07DF89B47B8AE8CCE21969CFFD259A221222F3AFF7D
                                SHA-512:D78E00E4C9100AE93E7DA6D748AA1A9020C6D106761D77F4AC6444F6D0CE5145560CA3458866026D440833E24B729F6B082B9BB0F9F5DCD12AD17C8113213535
                                Malicious:false
                                Reputation:unknown
                                Preview:{"analyticsData":{"responseGUID":"96661604-708a-434f-9dfc-2706c64ad40d","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1722535983964,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"Edit_InApp_Aug2020"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"20360_57769ActionBlock_0","campaignId":20360,"containerId":"1","controlGroupId":"","treatmentId":"3c07988a-9c54-409d-9d06-53885c9f21ec","variationId":"57769"},"containerId":1,"containerLabel":"JSON for switching in-app test","content":{"data":"eyJ1cHNlbGxleHBlcmltZW50Ijp7InRlc3RpZCI6IjEiLCJjb2hvcnQiOiJicm93c2VyIn19","dataType":"application\/json","encodingScheme":true},"endDTS":1735804679000,"startDTS":1722362478993}}}}
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):4
                                Entropy (8bit):0.8112781244591328
                                Encrypted:false
                                SSDEEP:
                                MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                Malicious:false
                                Reputation:unknown
                                Preview:....
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):2818
                                Entropy (8bit):5.136866345520302
                                Encrypted:false
                                SSDEEP:
                                MD5:0EF3AFF3950402A35D07B93D6E4C791E
                                SHA1:0AF0ACCECA1668ED71F6DEB0FEC4A301081D2722
                                SHA-256:3576099205D1FBF74F611049A38767ACC04D55A3A9E8ABA7447FB592967C7BE5
                                SHA-512:F7CC12F16591952F0C85EA0A4BE7CEA80FB3501D0B59D2FEF95B5DCCE9EFC7E529EF47B5A5532A8C224D8FC4ECB8768294AC03F6D773E2FE04225BE3BC2FCCE0
                                Malicious:false
                                Reputation:unknown
                                Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"a9c88f614f1b48eb02d6263e51b124e9","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":1050,"ts":1722362478000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"c632b031fdfb042c823d78c87c6dd20b","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":1164,"ts":1722362478000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"d0ae37ec9d4bf2ff0da3397f08c1a8d6","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1058,"ts":1722362478000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"8f911c2eafa8f2f5f9745ec00b0cf4b0","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1063,"ts":1722362478000},{"id":"DC_Reader_Edit_LHP_Banner","info":{"dg":"b9d56fe9c1131003d927b48b5e15a135","sid":"DC_Reader_Edit_LHP_Banner"},"mimeType":"file","size":1038,"ts":1722362478000},{"id":"Edit_InApp_Aug2020","info":{"dg":"c6101a4916fadf92ccf57412b2f420ab","sid":"Edit_InApp_Aug2020"},"mimeType":"file","size":782,"ts":17
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
                                Category:dropped
                                Size (bytes):12288
                                Entropy (8bit):0.9891021753528279
                                Encrypted:false
                                SSDEEP:
                                MD5:F0B1A76F7327406ACD3CC499EE54B650
                                SHA1:A79E6C9CC99B63E9AC24F316E92050B3543913AF
                                SHA-256:3FA3D0689121678007815986E8762C11CE19C068D188D39155F3756C4608F9DB
                                SHA-512:E9B88B2B43C8DB2AFD1FA012AE25319D145974E8FFC9567E337FC39BFB1D4F8AF975ABB490D6B3D5E05EDD6126C3DE975943A9AFA6200CD742301A713A258924
                                Malicious:false
                                Reputation:unknown
                                Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:SQLite Rollback Journal
                                Category:dropped
                                Size (bytes):8720
                                Entropy (8bit):1.342879487285626
                                Encrypted:false
                                SSDEEP:
                                MD5:F5B0A42CCAB5DDA0A152ADDC235B24EB
                                SHA1:FE8579BBEC396D4B01011C846A1BE1E39D6B5A08
                                SHA-256:4533ECE13D44E35535D21AE2ED2B80264F4294B6752A746DF58FC59D7BF778E9
                                SHA-512:034793431D52F5D638F0723EF6C22839C47F88B970302ECB153223081C47A76D6D6DF93B78874A4E50174C7CA8B04B4F892E270C3CE9D896A18F9BB03CF12121
                                Malicious:false
                                Reputation:unknown
                                Preview:.... .c.....If?N......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j...#..#.#.#.#.#.#.#.#.7.7........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):231348
                                Entropy (8bit):4.387290220820706
                                Encrypted:false
                                SSDEEP:
                                MD5:6301FC9C10C5D055F52D5E7936B3FB19
                                SHA1:062F0B72E1B2A55EEC69F87146C9A1DAC6784FCD
                                SHA-256:927B5945840BBED10796B5259508DF7A800B9147D0A1AC9E0F22A832ECE1B310
                                SHA-512:23ED9C0B3FD0674D197B46164BDF76F30354E64A1E418E55A0A2830EF5DB56405AC86B5B391AB0B178D578043ACA7B46A27976D9ACE3BC693D53AB6A4A6DB155
                                Malicious:false
                                Reputation:unknown
                                Preview:TH02...... .`.H........SM01X...,......H............IPM.Activity...........h...............h............H..h......@1I(...h........ p..H..h\cal ...pDat...h....0...H......h.5qA...........h........_`Wk...h.4qA@...I.lw...h....H...8.\k...0....T...............d.........2h...............k..............!h.............. h.P......`.....#h....8.........$h p......8....."h........p.....'h..............1h.5qA<.........0h....4....\k../h....h.....\kH..h....p.......-h .............+h.5qA.............. ...... ..............F7..............FIPM.Activity....Form....Standard....Journal Entry...IPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000....Microsoft...This form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):175399
                                Entropy (8bit):5.288142706212429
                                Encrypted:false
                                SSDEEP:
                                MD5:F6260F68E1E6A2ED03E2BFDA7DEC5660
                                SHA1:A7082F6B10E213D3EA285898E74370CC4EEB4F8D
                                SHA-256:92AA1A62E272211A723660B2E16BB2CE3350422754CA6F0376B69ADF256FAA39
                                SHA-512:8CE9F65A76F7466A0DEE5A4F4BEB8A9DAD11D6AF08E280F9DB8E5936802DAFA76A47FC2563D653192F8A7D41C190465ACB59AC4D9B7FCBAAE96094F4153F46F9
                                Malicious:false
                                Reputation:unknown
                                Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2024-07-30T18:01:05">.. Build: 16.0.17902.40125-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://word-edit.officeapps.live.com/we/rrdiscovery.ashx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):32768
                                Entropy (8bit):0.04604146709717531
                                Encrypted:false
                                SSDEEP:
                                MD5:2806BD1EAB441310C5926EECCA1F09CF
                                SHA1:33706B230BF0AE43625630E62A0413C2B506DBC6
                                SHA-256:0508274886A536B482CEAD2F2365F3F9C2AB6730C382E110E38A1536F2EFAB1C
                                SHA-512:9484D13C4293212DF8C042132449493946C0D9045FC0EF437EEAEB1FE91DF323361F0A299E871C156DAD84510653F7DDD42FD5875940EFDC895E96BE3EEFE329
                                Malicious:false
                                Reputation:unknown
                                Preview:..-......................).Fo.%...=e,.rY.s."V.....-......................).Fo.%...=e,.rY.s."V...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:SQLite Write-Ahead Log, version 3007000
                                Category:dropped
                                Size (bytes):49472
                                Entropy (8bit):0.4822265807296381
                                Encrypted:false
                                SSDEEP:
                                MD5:D20ABE52F59EA0CBAC4B2C4EB269510A
                                SHA1:F62C429B1F204F1C5E6F81B1F9569B012356B651
                                SHA-256:56816E2B8EA784F1452C24628246165C1DBA927048AC20BB7DCD9C46C0A20F02
                                SHA-512:5852FFA6AFF69DC36B8720FACE8049616DD7131062384767493AEC121D5DECE542F174D2370D9619C0169E0157D0C4C479452ACC13E44E3109073DA31AA5BE7C
                                Malicious:false
                                Reputation:unknown
                                Preview:7....-............=e,.rY:$..K.<...........=e,.rY.PK.....SQLite format 3......@ .......................................................................... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:PDF document, version 1.4, 1 pages
                                Category:dropped
                                Size (bytes):163074
                                Entropy (8bit):7.5184884822206675
                                Encrypted:false
                                SSDEEP:
                                MD5:06895825B338A72D3699D8DCC6CF8304
                                SHA1:B882DD130B464566D312F6606A03FEE6796873B5
                                SHA-256:6240BCC2A27EF265B799EB05770FF50E9A6B69038384D66AD254A55A4F1ABA2F
                                SHA-512:6EF79CC51BB36E1A4C39364E9ACA3CEFA6F4A7ECA17470D21C6F04E53329DD17B4B7F98338B937F339B9143815CA24582CF358EFA870541F67BF8169AE1496A2
                                Malicious:false
                                Reputation:unknown
                                Preview:%PDF-1.4.%.....1 0 obj.<</Title (INVOICE)./Creator (Chromium)./Producer (Skia/PDF m123)./CreationDate (D:20240730145516+00'00')./ModDate (D:20240730145516+00'00')>>.endobj.3 0 obj.<</ca 1./BM /Normal>>.endobj.6 0 obj.<</N 3./Filter /FlateDecode./Length 246>> stream.x.}..J.A....(..-,..."..E..J..6?.M..m..e......Nl|.m}..B.T>B.b.&.L..T.=........2..T.*........R..&.K..$.~......M0T..pt.m.(.{a.....4IA\......P.W._a.h........wS..f.wv.....p>.......v..S..<...^..]$...V.X......]....._.97.}..bbB..H.D(...P..[.=..endstream.endobj.4 0 obj.<</Type /XObject./Subtype /Image./Width 1200./Height 381./ColorSpace [/ICCBased 6 0 R]./SMask 5 0 R./BitsPerComponent 8./Filter /FlateDecode./Length 12551>> stream.x...y|T....._...I&.3.!...e..@pk...Z.....R.z.z..V{[..s.][[..0.9.L.....M...b.M.MA.....uf~.. ....fr.....<x.<.s...........................................................................................................................................................................................
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:ASCII text, with CRLF line terminators
                                Category:modified
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:
                                MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
                                SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
                                SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
                                SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
                                Malicious:false
                                Reputation:unknown
                                Preview:[ZoneTransfer]..ZoneId=3..
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):7840
                                Entropy (8bit):3.7613237692806845
                                Encrypted:false
                                SSDEEP:
                                MD5:AA0AF27AE7FD4E6B5E4ACBF9FB41B6DB
                                SHA1:9DD52AFB6D6076D8A38A615EBCF0785D5D43FB67
                                SHA-256:A905E613D6D826E1F410B848310B0A490D8494D7FA4C710A75CFD3B444669157
                                SHA-512:8D191B0A22F16698A9FF1CF2E6604DC4142F02A3F8830970C9E9CD31864F46671FB46FA9BF56B1FE605A0F9A98A7ECBED5D891507FE8ADBB645FE493DE35A188
                                Malicious:false
                                Reputation:unknown
                                Preview:....*.*.*.A.T.T.E.N.T.I.O.N.*.*.*...T.h.i.s. .e.m.a.i.l. .o.r.i.g.i.n.a.t.e.d. .f.r.o.m. .o.u.t.s.i.d.e. .o.f. .t.h.e. .G.o.v.e.r.n.m.e.n.t. .o.f. .C.a.n.a.d.a... .........................................................................................................................................................................................................................................................................................................................................................................$...~........... ...$...(...,...0...f...v.......p.....................................................................................................................................................................................................................................................................................................................................d...d.[$.\$.*...$..$.If........!v..h.#v....:V.......t.....6......5.......4........4........a..........
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:ASCII text, with very long lines (28728), with CRLF line terminators
                                Category:dropped
                                Size (bytes):20971520
                                Entropy (8bit):0.1594378505968789
                                Encrypted:false
                                SSDEEP:
                                MD5:7548216E4FA6EC38793C8E0C6DD37ECB
                                SHA1:C0774D914C81FDCC135D67428262FAA811F2A62A
                                SHA-256:3246CA853FC42F0D61145A4D695C97FCEBF52E7348CEA6B09222351DD41E6ED5
                                SHA-512:E0151FE243F7106F396085F1E61638D70DC0CA495ABCF2BE03D4B3F564D4A234F20CB14335A0517BE9A968EAAA943640DD051C210E3CCD694B44B3474DBD5D0C
                                Malicious:false
                                Reputation:unknown
                                Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..07/30/2024 18:01:03.253.OUTLOOK (0x1520).0x36C.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.GDIAssistant.HandleCallback","Flags":30962256044949761,"InternalSequenceNumber":21,"Time":"2024-07-30T18:01:03.253Z","Contract":"Office.System.Activity","Activity.CV":"Q+iR6cd6zEiuWliOx7SyPg.4.9","Activity.Duration":16,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.GdiFamilyName":"","Data.CloudFontStatus":6,"Data.CloudFontTypes":256}...07/30/2024 18:01:03.285.OUTLOOK (0x1520).0x36C.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.ResourceClient.Deserialize","Flags":30962256044949761,"InternalSequenceNumber":23,"Time":"2024-07-30T18:01:03.285Z","Contract":"Office.System.Activity","Activity.CV":"Q+iR6cd6zEiuWliOx7SyPg.4.10","Activity.Duration":13598,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.JsonFileMajorVer
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):20971520
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:
                                MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                                SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                                SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                                SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                                Malicious:false
                                Reputation:unknown
                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):246
                                Entropy (8bit):3.5030768995714583
                                Encrypted:false
                                SSDEEP:
                                MD5:93E9861100ADFA70C76AC04615E5B66A
                                SHA1:1362F448ADA61E34D64CB7C760BCC230831CDE02
                                SHA-256:4525CD99BDA9C6829C37D43688C3C9B5A1AE7D9A31D698C8F3CA080083A172FF
                                SHA-512:AFB437586E62F3F00E33B003B0D1D40C546EBE748F5F63C16E29AD1B1115006E8681FD118674D786EF91D3CDBF3060EB21C42FB02975362303C5013EF9D77CF8
                                Malicious:false
                                Reputation:unknown
                                Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .3.0./.0.7./.2.0.2.4. . .1.4.:.0.1.:.2.0. .=.=.=.....
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:data
                                Category:modified
                                Size (bytes):90112
                                Entropy (8bit):4.447153250225758
                                Encrypted:false
                                SSDEEP:
                                MD5:C8D166537F57F81E3E7167DC820180CD
                                SHA1:9E49DB20CC2B07E063BD0A9B9CCB1DBF223E99DA
                                SHA-256:49EE5958B22816E50722E9AE8754CE2126B6E84F2B54C25D56E81A60A0EE0223
                                SHA-512:8662C0B1EAF57FB5FD658A163D3E8353ECE8A183D2DD01EACDCBD2A34EBF9049AD848A3031F7F6BE8E07F09D673A213097598D49F0CAE9228188C5F06425ACFA
                                Malicious:false
                                Reputation:unknown
                                Preview:............................................................................`...l... ......q....................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1...........................................................@M.:.Y.............q............v.2._.O.U.T.L.O.O.K.:.1.5.2.0.:.f.8.b.8.7.e.f.c.4.6.5.e.4.d.c.a.a.d.1.0.3.f.f.9.f.c.a.a.b.4.f.d...C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.0.7.3.0.T.1.4.0.1.0.2.0.9.9.8.-.5.4.0.8...e.t.l.......P.P.l... ......q............................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:ASCII text, with very long lines (393)
                                Category:dropped
                                Size (bytes):16525
                                Entropy (8bit):5.353642815103214
                                Encrypted:false
                                SSDEEP:
                                MD5:91F06491552FC977E9E8AF47786EE7C1
                                SHA1:8FEB27904897FFCC2BE1A985D479D7F75F11CEFC
                                SHA-256:06582F9F48220653B0CB355A53A9B145DA049C536D00095C57FCB3E941BA90BB
                                SHA-512:A63E6E0D25B88EBB6602885AB8E91167D37267B24516A11F7492F48876D3DDCAE44FFC386E146F3CF6EB4FA6AF251602143F254687B17FCFE6F00783095C5082
                                Malicious:false
                                Reputation:unknown
                                Preview:SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:073+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:073+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="SetConfig:
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:ASCII text, with very long lines (393), with CRLF line terminators
                                Category:dropped
                                Size (bytes):15113
                                Entropy (8bit):5.334889219340283
                                Encrypted:false
                                SSDEEP:
                                MD5:07851AA39AE58FB206E4F31BB0CF5FBA
                                SHA1:EB61366E628C327A20953D6E765BBF194D151151
                                SHA-256:610A352E60595DFB974F2EC67C6DCAAE9CFF0AF8D4AE36972B507C0C6280EF18
                                SHA-512:C84EE44FA757A10F7F84E2EAF84EEE4867FD4D865B0848A9FAF9351CB8C3ECC001A54E357980388FAD0849D9858B42F97D802FDF3043E42D6082AA47A91494C8
                                Malicious:false
                                Reputation:unknown
                                Preview:SessionID=4d17278c-d7b3-4da3-950c-7261ecbe18d8.1722362475424 Timestamp=2024-07-30T14:01:15:424-0400 ThreadID=4264 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=4d17278c-d7b3-4da3-950c-7261ecbe18d8.1722362475424 Timestamp=2024-07-30T14:01:15:426-0400 ThreadID=4264 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=4d17278c-d7b3-4da3-950c-7261ecbe18d8.1722362475424 Timestamp=2024-07-30T14:01:15:426-0400 ThreadID=4264 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=4d17278c-d7b3-4da3-950c-7261ecbe18d8.1722362475424 Timestamp=2024-07-30T14:01:15:426-0400 ThreadID=4264 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=4d17278c-d7b3-4da3-950c-7261ecbe18d8.1722362475424 Timestamp=2024-07-30T14:01:15:426-0400 ThreadID=4264 Component=ngl-lib_NglAppLib Description="SetConf
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):29752
                                Entropy (8bit):5.415711449637227
                                Encrypted:false
                                SSDEEP:
                                MD5:9E0B4D34411B467228E402308AB713E8
                                SHA1:639140FD9083B93BFFBB88C72B13864783860FDE
                                SHA-256:AAEE1BE84033C30941F56C2D052C9EABB6CB18383B95AB4F2DE235E7F47B81A3
                                SHA-512:FAF289CB7D0EEA45F22F813CCC26B622FEC16E97506F98B745A8B8B72300D1C0E23F81930B925CB0CFF55206C4FB7CFDCB2FA27D7EAC03BBC8724CC07E250C4F
                                Malicious:false
                                Reputation:unknown
                                Preview:06-10-2023 10:08:42:.---2---..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : Starting NGL..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..06-10-2023 10:08:42:.Closing File..06-10-
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                Category:dropped
                                Size (bytes):386528
                                Entropy (8bit):7.9736851559892425
                                Encrypted:false
                                SSDEEP:
                                MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                Malicious:false
                                Reputation:unknown
                                Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                Category:dropped
                                Size (bytes):1419751
                                Entropy (8bit):7.976496077007677
                                Encrypted:false
                                SSDEEP:
                                MD5:1A39CAAE4C5F8AD2A98F0756FFCBA562
                                SHA1:279F2B503A0B10E257674D31532B01EA7DE0473F
                                SHA-256:57D198C7BDB9B002B8C9C1E1CCFABFE81C00FE0A1E30A237196A7C133237AA95
                                SHA-512:73D083E92FB59C92049AF8DC31A0AA2F38755453FFB161D18A1C4244747EE88B7A850F7951FC10F842AE65F6CC8F6164231DB6261777EC5379B337CB379BEF99
                                Malicious:false
                                Reputation:unknown
                                Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                Category:dropped
                                Size (bytes):758601
                                Entropy (8bit):7.98639316555857
                                Encrypted:false
                                SSDEEP:
                                MD5:3A49135134665364308390AC398006F1
                                SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                Malicious:false
                                Reputation:unknown
                                Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                                Category:dropped
                                Size (bytes):1407294
                                Entropy (8bit):7.97605879016224
                                Encrypted:false
                                SSDEEP:
                                MD5:A0CFC77914D9BFBDD8BC1B1154A7B364
                                SHA1:54962BFDF3797C95DC2A4C8B29E873743811AD30
                                SHA-256:81E45F94FE27B1D7D61DBC0DAFC005A1816D238D594B443BF4F0EE3241FB9685
                                SHA-512:74A8F6D96E004B8AFB4B635C0150355CEF5D7127972EA90683900B60560AA9C7F8DE780D1D5A4A944AF92B63C69F80DCDE09249AB99696932F1955F9EED443BE
                                Malicious:false
                                Reputation:unknown
                                Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:CDFV2 Microsoft Outlook Message
                                Category:dropped
                                Size (bytes):262144
                                Entropy (8bit):6.644437966171274
                                Encrypted:false
                                SSDEEP:
                                MD5:8F23075E483E179608358FE1172FA61C
                                SHA1:7D959230ACA53BE0D11A9C114AB9E9C3FD82DA9C
                                SHA-256:06B839AA99F338D57C5FF83E5BB96AA1F2DA6B4AE51C0DC82A0DD10CEE4C8552
                                SHA-512:CB4E68017AF6AFC5917571DC950FCB59885B7E238017C3BECEA30884E7A4A043DC457079DB5FEFF29A80F774F4DE32D01C7AFBC8DC998A427347726FFAC07C96
                                Malicious:false
                                Reputation:unknown
                                Preview:......................>.......................................................3...............................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y......................................................................................................O......_._.p.r.o.p.e.r.t.i.e.s._.v.e.r.s.i.o.n.1...0...................0.......................................................`......._._.n.a.m.e.i.d._.v.e.r.s.i.o.n.1...0...........................(...........m.......................@..........................._._.s.u.b.s.t.g.1...0._.0.E.0.4.0.0.1.F.........................*.......................................
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):512
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:
                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                Malicious:false
                                Reputation:unknown
                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):30
                                Entropy (8bit):1.2389205950315936
                                Encrypted:false
                                SSDEEP:
                                MD5:5F089038E57C0BA537EE1BDD3979CF36
                                SHA1:BB41E4404BE27C5CDC9D0D1E5760A70A78495C84
                                SHA-256:7F1E4A422C5B6F1B11E717A9B8330357F9DEAAEE00E136D7895A278D810B8A3D
                                SHA-512:C2A776F3EDDDF95BD3317D57981EC7A7BA254B524E2F79010EC0C7E823C7BA6FFD1A2E4B8FE6149CFD8A8A4EEB035C2D9B106DA76394C9F42AA7F10AC9FB58B1
                                Malicious:false
                                Reputation:unknown
                                Preview:....W.........................
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 30 17:01:49 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                Category:dropped
                                Size (bytes):2673
                                Entropy (8bit):3.9916430798478273
                                Encrypted:false
                                SSDEEP:
                                MD5:F73C432A025F1BD635A597BD00FBCF81
                                SHA1:262BC67E38524065B92C4700873083E413D78FB0
                                SHA-256:77585BA5EBB3AC6A502BF9A5462EC39DD252840F267D283CC079DDD18CBD270A
                                SHA-512:0B0C371D018F63534EB2018311C4009798E9D56A4A66E55E7233ABD6FD2E0FA73352C8E01AA7DDAE223D263686DEAC6858589025FE3B54BBEB02082886513C73
                                Malicious:false
                                Reputation:unknown
                                Preview:L..................F.@.. ...$+.,....~.~.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Xz.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X7.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X7.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X7............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X9............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 30 17:01:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                Category:dropped
                                Size (bytes):2675
                                Entropy (8bit):4.006729235198171
                                Encrypted:false
                                SSDEEP:
                                MD5:67EF7C039679E10449B3E083DC6CDC6C
                                SHA1:38A434B9A4C13FF6D10642B6884E62C862E348C9
                                SHA-256:2399668D5A51BF8AC812F69442938E1EC563074C7D8558C2CAFD5414586A9474
                                SHA-512:74BFA7E0FE9E26AE58B5F0026CC5425A9FD3687E8CB20FB5FD45533FCD414CD8CF805BD9D539B312B282E0FF7BA6B20F91B681C623E6245BF2ECEEC1F80A0E7F
                                Malicious:false
                                Reputation:unknown
                                Preview:L..................F.@.. ...$+.,....8pq.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Xz.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X7.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X7.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X7............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X9............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                Category:dropped
                                Size (bytes):2689
                                Entropy (8bit):4.0144914960678575
                                Encrypted:false
                                SSDEEP:
                                MD5:305EFC26EE8F46CDFF097EBC2C17199C
                                SHA1:74B903518B3F07A6614C37D468691DDA35D1FED4
                                SHA-256:936733F49F9B9E774C3E774EB4460A05AB198D52B281C203734DB5D44FAA8238
                                SHA-512:D3C8FE321E003D5FD3584E3B28A4FDF0EC6295D7236BED511C9A054BD623E07C58FF681B64FAFEDE69F6473F5057ADF31CB005B8EB6D03C58F041A9D8852636C
                                Malicious:false
                                Reputation:unknown
                                Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Xz.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X7.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X7.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X7............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 30 17:01:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                Category:dropped
                                Size (bytes):2677
                                Entropy (8bit):4.005030198522504
                                Encrypted:false
                                SSDEEP:
                                MD5:7AFC851E1447958886CD2353F2475201
                                SHA1:7C4647E7A4AD84D8AE2289E6BFED117B31D50BCA
                                SHA-256:E62C4180D82DF63D583370AB8B41229238B6B2A18FB8A3D5CC0489089B8010FE
                                SHA-512:F9808A4D3D2E7B8D9DC0D7BE318A3EE0FF0F2216786BDDF78EBAEF786FF424FCF6C6097C072244A826EAD50DF8257A439F0E6809AC75B6BB7D6A72D4B93EB4F2
                                Malicious:false
                                Reputation:unknown
                                Preview:L..................F.@.. ...$+.,......k.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Xz.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X7.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X7.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X7............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X9............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 30 17:01:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                Category:dropped
                                Size (bytes):2677
                                Entropy (8bit):3.994709422358504
                                Encrypted:false
                                SSDEEP:
                                MD5:5A4637144CB28DFB5B2679FF00AFA417
                                SHA1:40E99EEAA53076B8BE20EF4A9A22EE4FB76E35FF
                                SHA-256:CD8FB1C8C168A3EDEB1968058C3852141A0704E1F829CA08E0F735D50845A510
                                SHA-512:16318BD156CEE18BEB0215F942E8711A4AB74C8276ADE1F48035BD6C3ADF1A045D497F8B9094259B5925ED0D32E0C21B7741A1DA272760A5C778AF56C8C2BC0A
                                Malicious:false
                                Reputation:unknown
                                Preview:L..................F.@.. ...$+.,......w.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Xz.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X7.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X7.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X7............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X9............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Jul 30 17:01:48 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                Category:dropped
                                Size (bytes):2679
                                Entropy (8bit):4.004215928574908
                                Encrypted:false
                                SSDEEP:
                                MD5:C40D088E319F722D8FC9F61847FB79FE
                                SHA1:5C8FEFA9E08DB8FBA69A2E642D8FC1F3368FA183
                                SHA-256:C4753268AD8301A9106A192147D7B4C9BC0E53D1AA1EE82DEE45E52E971D721B
                                SHA-512:A1115D56BDE2B66E5143A52CA192AE57848C9CBDA8D52AB8F4F04A77A51F33661D84E72FE1563E8D1376C1E5524633759800EFA471B1BD8C07522726952B927A
                                Malicious:false
                                Reputation:unknown
                                Preview:L..................F.@.. ...$+.,....V.`.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I.Xz.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X7.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X7.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X7............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X9............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:Microsoft Outlook email folder (>=2003)
                                Category:dropped
                                Size (bytes):271360
                                Entropy (8bit):1.2422950105672002
                                Encrypted:false
                                SSDEEP:
                                MD5:9702DB37DC18F0D5789B88E8C6519F58
                                SHA1:C4EACB7AC1B5D378A4883B368D462759CEFAA01B
                                SHA-256:4773A77A5A09C276D97A1EB67849618C0D2BE4693C9B26F6C1691E5E0D80D8EF
                                SHA-512:110FE1243007F21D9C858DAD59F9869830B23AB8F215EA5DD0444F819934F24ACCA183E50F8BF471C707F20A1FA0278A24C48909049CB7A35AB8AAEF25D246F5
                                Malicious:false
                                Reputation:unknown
                                Preview:!BDN..MSM......\...............>.......T................@...........@...@...................................@...........................................................................$.......D......@Q..............:...............=....................................................................................................................................................................................................................................................................................................y.T.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):131072
                                Entropy (8bit):0.9439500621065762
                                Encrypted:false
                                SSDEEP:
                                MD5:609F6FEB38C77D2944361BE64FCAC998
                                SHA1:27B0EA7C0F97FA53AD1CCEB8546150E139DB4A58
                                SHA-256:4785657EDB580A4A6777C792FC5DCE65B709187D82798607DA7C63B355D03F9D
                                SHA-512:356FCC5DC2DA00C0FB729C49597C63F9133951265467AF6A721C50701599DF4CE35D52C2E342CC3518E68B27257C5FFA1A0F830BC28202C9DF2EFA1AC40F0E26
                                Malicious:false
                                Reputation:unknown
                                Preview:0v..C...G....... ......p......................#.!BDN..MSM......\...............>.......T................@...........@...@...................................@...........................................................................$.......D......@Q..............:...............=....................................................................................................................................................................................................................................................................................................y.T......p.........B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:JSON data
                                Category:downloaded
                                Size (bytes):318651
                                Entropy (8bit):4.91285766486163
                                Encrypted:false
                                SSDEEP:
                                MD5:FB71025BD9F8B5DD8EFAEBC3A23F3466
                                SHA1:CC101C17DE59F12D9579409CD8393C58C0DD0D10
                                SHA-256:7C7044446383F6FBB4C920A81521223E88D38D665A004140D10AD99CC7D41A56
                                SHA-512:292BE44F49854928CA0E3CFB73B54CD7E98E35A2B0160C0CB2CDADF43E213540444B729495B63517A53E64AF465C6FB96ED4E6338DE9D9261B13BBBE40677DDE
                                Malicious:false
                                Reputation:unknown
                                URL:https://secure.zervant.com/rest-invoice/api/v1/recipient-portal/document?accessToken=z5YY1SAZlE9ODNw4Ec%2FHXLTwpvEg1Bkp%2BBzy%2BqYzP7jv7qsKrjqjCEE7sClXZPwhDtT9x9IrjRrFzBtcRZ5Hb%2BmiLgQDNu2NFopbyYe2AQ7MdzoDr8RXBuK3W9ZuNOBbCfbjsiXNOaeKBnyzLe4zFCg%2FYmJ%2BIAMDy8YNQyXVS%2FGeMlrd5znKWRXmIqRnIe3zlnpDzVayuVk8k1N%2FnOlrQgsuLatQoETDGD6BmLyZSlwwYXDP84erK7dpVTk01QYp
                                Preview:{"companyId":1950334,"locale":"en_GB","revisionId":0,"title":"INVOICE","customer":{"address":{"city":"userfornia","pobox":"94403","country":"US","streetAddress1":"2700 Coast Ave Mountain View Ca","streetAddress2":""},"email":"sandersjoseph723@yahoo.com","vatPct":0,"phoneNumberHome":"","displayName":"Quick Books","isPublicEntity":false,"firstName":"Quick","title":"","customerType":"p","externalContactId":"","customerId":10090403,"language":"en","lastName":"Books","businessId":"","eInvoiceAddress":{"scheme":"VAT","address":"","networkType":null,"networkOperatorId":null},"customerNumber":0,"companyName":"","shippingAddress":{"city":"","pobox":"","country":"","streetAddress1":"","streetAddress2":""},"paymentTerm":30,"vatNumber":"","phoneNumberWork":""},"summary":{"localSubTotal":399.00,"netTotal":399.00,"localTaxTotal":0.00,"foreignCurrency":"USD","foreignReductionTotal":0.00,"discountTotal":0.00,"exchangeRate":1,"localNetTotal":399.00,"grossTotal":399.00,"foreignTaxSummary":[{"amount":0.0
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):652524
                                Entropy (8bit):4.907486187477889
                                Encrypted:false
                                SSDEEP:
                                MD5:E231980E3480CD0B81F7F239CB951080
                                SHA1:AECC3B30827E32EA39705D8DCAB167D341C7A776
                                SHA-256:D91EDCF04481076912A2469405A1979B47F775657D2477DA1F28B90728051310
                                SHA-512:8020D14DAF9364DFB319A65CC09C9C95AE1479803A00A137143BAF303A80DA215758100E3A38FF6FA9B1ECB7B90AD5B5421EABAF119925BEBC84E2B4E83E9035
                                Malicious:false
                                Reputation:unknown
                                Preview:{"cancel":"Cancel","":"","svea-invoice-financing.box.footer.desc":"Zervant is continuously improving its service based on customer feedback, and you have asked for solutions to secure your cashflow. Zervant and Svea are now joining forces to offer this service to selected Zervant customers. Since this is a pilot project, all feedback is very welcome. <a href=\"https://support.zervant.com/hc/en-gb/requests/new?utm_source=product&utm_medium=link&utm_campaign=sveatab\" target=\"_blank\">[Give feedback here]</a>","acct.fi.retainedearnings":"Retained earnings / loss","BankingInfo.initialBottomPart.secondInfo.body":"See incoming payments and outstanding invoices in the same window when you connect your bank to Zervant - no more switching between apps! ","CloseWindow":"Close window","mobile.estimates.list.sortInfo":"Sort by","reports.download.label.zip":"Download pdf invoices","InvoiceInfo.final.refTo.downpayment":"With reference to advance invoice","agerasAccountingTab.info.item1.desc":"We b
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                Category:downloaded
                                Size (bytes):66580
                                Entropy (8bit):6.093295223335156
                                Encrypted:false
                                SSDEEP:
                                MD5:16EF892BEF02B03D4647E4BE72A82779
                                SHA1:352AA4E816A18D1CF93D2E11543AA9F1BD2FDF19
                                SHA-256:8EDC8BAEF386E6B0B74633547F0325456AC8109B5B7E78DACE4D65825A538BC9
                                SHA-512:B670A24B9792483075A560B8D58DAD8124ED9CE115288D3282ED12EC94CE34814E76AD935334E789D156075D019A63201489ADB382AE002CF236889A5DF46FBB
                                Malicious:false
                                Reputation:unknown
                                URL:https://secure.zervant.com/recipient-portal/static/css/main.50451c92.chunk.css
                                Preview:.PayNowModal{width:600px}@media (max-width:960px){.PayNowModal{width:100%}}.PayNowModal-summary{padding:30px 56px;display:flex;justify-content:center;align-items:center;flex-direction:column;font-size:14px;border-bottom:1px solid #e0e0e0}.PayNowModal-summary__invoice-number{font-weight:700;margin-bottom:3px}.PayNowModal-summary__company{font-weight:400;color:#3b3c3c;margin-bottom:16px}.PayNowModal-summary__amount{font-weight:700;font-size:24px;margin-bottom:5px}.PayNowModal-summary__total-due{color:#3b3c3c}.PayNowModal-payment-methods{display:flex;flex-direction:column;align-items:center;margin-top:30px;padding-left:56px;padding-right:56px}.PayNowModal-payment-methods__label{color:#3b3c3c;font-size:14px}.PayNowModal-payment-methods__pic{margin-top:9px;width:70px;height:14px;background-image:url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAANAAAAAqCAMAAAD1cyU5AAABNVBMVEVHcEwYUYkDVaJBaapEcLdCcLcDVaM2SmA3SGIDVqKyxeFZdaA2SmBEcLc2SmFEcLc2SmBEcLfC0OjV4O+ftdm2yOQ3S2EEVqNFcLf////twS/wVkfR3O2i
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:ASCII text, with very long lines (526), with no line terminators
                                Category:dropped
                                Size (bytes):526
                                Entropy (8bit):4.844995662196588
                                Encrypted:false
                                SSDEEP:
                                MD5:D96C709017743C0759CF3853D1806BA5
                                SHA1:72E21587610C49C8305A55E71F73FA88ED618205
                                SHA-256:BA2338AA6670580269C762F51C4291DAEF913201AA8F4D4FD166C1A878262652
                                SHA-512:974E260ED8BD1D99628FC3248F07179F6EA228E37A6B9D3EF906DBA57571F2DF54D73F93D1F3460902D28A90BD4793BCA35477B2EF8FBF424B9112147F04BCCF
                                Malicious:false
                                Reputation:unknown
                                Preview:!function(){"use strict";var e="https://m.stripe.network",n=window.location.hash,t=/preview=true/.test(n)?"inner-preview.html":"inner.html",o=document.createElement("iframe");o.src="".concat(e,"/").concat(t).concat(n);var i=function(n){if(n.origin===e){var t=window.opener||window.parent||window;if(!t)return;t.postMessage(n.data,"*")}else o.contentWindow.postMessage(n.data,"*")};window.addEventListener?window.addEventListener("message",i,!1):window.attachEvent("onMessage",i),document.body&&document.body.appendChild(o)}();
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):30
                                Entropy (8bit):4.281727678869736
                                Encrypted:false
                                SSDEEP:
                                MD5:12E6585FFC501538E8F6FFDF441EB6CE
                                SHA1:754BF5DF5308A668DE033428BC1D3964105AD050
                                SHA-256:7B370D15EB06AEBE988D9E73CEAD8880F66A69B1294D5C925B8E07BD6C4E91F8
                                SHA-512:90FE18ABD73697CD732D76771C2FE3C06B6CA6D6D5203DE08EA6C175DEFA8588A5485D3584D21E5111448C849CC629EB44BD8A70EC0B6AD21BC149229A4CDF01
                                Malicious:false
                                Reputation:unknown
                                Preview:{"isTinkPaymentBlocked":false}
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:HTML document, ASCII text, with no line terminators
                                Category:downloaded
                                Size (bytes):200
                                Entropy (8bit):4.942373347667344
                                Encrypted:false
                                SSDEEP:
                                MD5:3437AADDCDF6922D623E172C2D6F9278
                                SHA1:F69066CF20141AC93418102D3EEE7C0225B8A623
                                SHA-256:35DCC382EB69D00369D708708CDC545F3968B68FA5BBE3E728D11FEDD04F93BB
                                SHA-512:2DAE5C5C30C6A0E763D8128F2CE1D467EAD432E582AB4EBB68E23991DB08F57490ABC0EED805FD33FAB5503C1737D9D47D4CC1090AE15D7391593FBB295D66E7
                                Malicious:false
                                Reputation:unknown
                                URL:https://js.stripe.com/v3/m-outer-3437aaddcdf6922d623e172c2d6f9278.html
                                Preview:<!doctype html><html><head><meta charset="utf-8"/><script defer="defer" src="https://js.stripe.com/v3/fingerprinted/js/m-outer-15a2b40a058ddff1cffdb63779fe3de1.js"></script></head><body></body></html>
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:HTML document, ASCII text, with very long lines (8099)
                                Category:dropped
                                Size (bytes):2226788
                                Entropy (8bit):5.1214164260458315
                                Encrypted:false
                                SSDEEP:
                                MD5:71150343271DE080D748B527355828EB
                                SHA1:88A5FDAF4A38EFBC7E2567CFAD3F856A657A3152
                                SHA-256:54527393882FEE059D5B98A0F086650C20D0667E24A8517D940CD7F005FB0C0B
                                SHA-512:BEC1B5AE5D322F2C156A4A2DDFF075009FB95B92C6E3DF96F9FCCE1412C00477E81ACBB71133E59F9172C565F922DAA57788000F81D99889CE127D8E745A3CA6
                                Malicious:false
                                Reputation:unknown
                                Preview:<!DOCTYPE html>.<html. class="MktRoot". lang="en-US". data-js-controller="Page". data-page-id="Home". data-page-title="Stripe | Financial Infrastructure to Grow Your Revenue". data-loading.>. <head>. <script>window.__capturedErrors = [];.window.onerror = function (message, url, line, column, error) { __capturedErrors.push(error); };.window.onunhandledrejection = function(evt) { __capturedErrors.push(evt.reason); }.</script>.<meta. name="sentry-config". data-js-dsn="https://7cd38b0eb2b348b39a6002cc768f91c7@errors.stripe.com/376". data-js-release="d1f510234bb73663879276ce9bdd6f917fad6ec0". data-js-environment="production". data-js-project="mkt".>.. <meta name="experiment-treatments" content="acquisition_top_cta_change.control.ursula.45ed596f-180e-44c3-926b-5eaad38019c3.a,wpp_homepage_title_copy.control.ursula.8e9f6b56-2972-431f-805c-e0fbc68199e7.a,acquisition_sticky_nav.control.ursula.99a3bbdc-55b3-4a65-a684-013d8b7b8814.m,acquisition_home_email_input.control.ursula.dd4
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:JSON data
                                Category:downloaded
                                Size (bytes):289
                                Entropy (8bit):4.522217389805571
                                Encrypted:false
                                SSDEEP:
                                MD5:4B5D3A7A5727D6EB7341EE8D7CC43B9E
                                SHA1:8FA9F3F5FA9E569F4047D4279C267CD3815BCC74
                                SHA-256:1C6CF69CF698922229EABCE6BD5D84CFDBF53DD0E945D7F5114885D78F046625
                                SHA-512:B2B6DFE1B02C80077E98CBC322D9AF84DE0A507C0C255904B44FA59936347C66613606CD1D4A692D207CCDE313EE331C5E65C70704D3E47F13679A4D0FE5A7C6
                                Malicious:false
                                Reputation:unknown
                                URL:https://secure.zervant.com/recipient-portal/manifest.json
                                Preview:{. "short_name": "Zervant",. "name": "Zervant recipient portal",. "icons": [. {. "src": "favicon.ico",. "sizes": "192x192",. "type": "image/x-icon". }. ],. "start_url": ".",. "display": "standalone",. "theme_color": "#000000",. "background_color": "#ffffff".}.
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:Web Open Font Format (Version 2), TrueType, length 22548, version 1.0
                                Category:downloaded
                                Size (bytes):22548
                                Entropy (8bit):7.992369769095068
                                Encrypted:true
                                SSDEEP:
                                MD5:0A3EEFB4ED1F0667DEFE6F54FDA26AD7
                                SHA1:3541BC529C6F982ED8EB7C74E9A8910B59B909D0
                                SHA-256:7C4956F42048068D8363BC2A449D26F605B79357350F6E94DF3DE02A2075ED38
                                SHA-512:42CCFF9DB627D67F19932206AD0CBD494595D152AA079B6F5AB62566D66C43CA830AE0116A1FB048FDE8AADE2EA4FB28F1FCD3A2A1A203A6BFB1B7CB5EB9A672
                                Malicious:false
                                Reputation:unknown
                                URL:https://use.typekit.net/af/a28b50/00000000000000000000e803/27/l?subset_id=1&fvd=n5&v=3
                                Preview:wOF2......X...........W.........................?DYNA..?FFTM..0?GDYNE.....b.`..f....s.....x.....x..6.$..T. ..S..?.e.....v.=$...W........pS.?...o.......W...!.q=......y1....i.BS.LL...jcB3..0..'......_+....\.JOru..u....7........y"...@R...!....?I.{9Q...~#U..l......;..`U..+...,..<=.f...8u..*.G.o...".....Sl.#7zo.......-X.b0.."0".800.Jc..6.E..o.`^.Uwg..:..........1.d.KD.A.l.!fkJ.5..c%YI...].......u.>I.,..%...d%....&...S.N...Sgt.=.w"(..........IX.L.....X ..u...g. .D.h..4Ir...q....e>y...Z.L-.].......r>...s8........}.hD,y,.<@..4.u$...W.y2...I..d..5.qIz.})..D2>S.D.R)S.).ud.2U.H..o..9.F.0.VW..U.nV.w.5.>...5=.!.Z..2.........d...D.Dv.4c..2.+.?......1f._.zEB.....|.v...f.-.UE.......4.yx.L.I.}.m.M..AHx.1T...{J....cQ......Yzw...i.+2.y.)..9g_t.]p...g"M..VNz...o2..Y.C..e...Gd.^.......b...]aW.+.#l...tN......e.S..e.3..~...;\>..KN>.............;s...j9...&.....^p.iS....K..k......?..\0 ......{.H..]x6....?P...3N:.l.d..p..r.........X>.......(;.....l...[.~{......V.
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:HTML document, ASCII text, with very long lines (930), with no line terminators
                                Category:downloaded
                                Size (bytes):930
                                Entropy (8bit):5.12292712843304
                                Encrypted:false
                                SSDEEP:
                                MD5:06BFCD88AF438673A8BF9B845A11AA6E
                                SHA1:D024A745032CBE115526ABE648D9FA0F0A10A681
                                SHA-256:947AC0903521F5ECEEFC90637C066306A8CA67466CCC188BB0107FB7CFB532D1
                                SHA-512:6A37EA27F3AD16DE6BCB4C386D9F09962902AE2F2FDF76B6723CFF8155CD0B9D4504D1EA6ED3C4D5C9D49BE9C636EB9386BB13C9A787A71F02640A8EC939D180
                                Malicious:false
                                Reputation:unknown
                                URL:https://m.stripe.network/inner.html
                                Preview:<!doctype html><html><head><meta charset="utf-8"><title>StripeM-Inner</title></head><body><script>!function(){var e=document.createElement("script");e.defer=!0,e.src="out-4.5.43.js",e.onload=function(){var e;window.StripeM&&(e=window.location.hash,/ping=false/.test(e)||(e=(e=e.match(/version=(4|6)/))?e[1]:"4",window.StripeM.p({t:!0,v:e})),e=function(e){if(window.opener||window.parent||window)try{var i=((t=JSON.parse(e.data)).message||t).action,t=t.message?t.message.payload:t;switch(i){case"ping":window.StripeM.p({t:!0,o:{muid:t.muid,sid:t.sid,referrer:t.referrer,url:t.url,title:t.title,v2:t.v2},v:t.version||"4"});break;case"track":if(!t.source||!t.data)return;window.StripeM.b({muid:t.muid,sid:t.sid,url:t.url,source:t.source,data:t.data},t.version||"4")}}catch(e){}},window.addEventListener?window.addEventListener("message",e,!1):window.attachEvent("onMessage",e))},document.body.appendChild(e)}()</script></body></html>
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:ASCII text
                                Category:downloaded
                                Size (bytes):5
                                Entropy (8bit):1.5219280948873621
                                Encrypted:false
                                SSDEEP:
                                MD5:83D24D4B43CC7EEF2B61E66C95F3D158
                                SHA1:F0CAFC285EE23BB6C28C5166F305493C4331C84D
                                SHA-256:1C0FF118A4290C99F39C90ABB38703A866E47251B23CCA20266C69C812CCAFEB
                                SHA-512:E6E84563D3A55767F8E5F36C4E217A0768120D6E15CE4D01AA63D36AF7EC8D20B600CE96DCC56DE91EC7E55E83A8267BADDD68B61447069B82ABDB2E92C6ACB6
                                Malicious:false
                                Reputation:unknown
                                URL:https://p.typekit.net/p.css?s=1&k=ngm0uky&ht=tk&f=2003.2005.2007.2009.2011.17400.17406&a=1007786&app=typekit&e=css
                                Preview:/**/.
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:ASCII text, with very long lines (44566)
                                Category:dropped
                                Size (bytes):44614
                                Entropy (8bit):5.230628933046943
                                Encrypted:false
                                SSDEEP:
                                MD5:86B5F46F7BE0D0E24E9E36A3802DECEF
                                SHA1:2AF96A6B8C00513F08404DD321E26D202CBC903A
                                SHA-256:11397630646C144588EFD0FA386D91D9C28D3F7B7DC553D1CBDFF4BC82A7D3A4
                                SHA-512:FA95CAA3F533B60319F1918D78094209161E25E04BCD1DC1AD3293A07309E650116080BB7C36605D31E6F42B2087A41AEC1987AA36CECC89E0669C55F55748AD
                                Malicious:false
                                Reputation:unknown
                                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[0],{100:function(e,t,n){},103:function(e,t,n){"use strict";n.r(t);var a=n(1),r=n.n(a),c=n(2),o=n(0),i=n.n(o),s=n(15),l=n(3),u=n(4),m=n(6),p=n(5),d=n(7),_=n(11),f={local:{stripeApiKey:"pk_test_GqHTv9RHuCscUubjKxDXxZwW",gtmId:"NOT_IN_USE",translationRootUrl:"https://test-translations.zerv.me"},test:{stripeApiKey:"pk_test_GqHTv9RHuCscUubjKxDXxZwW",gtmId:"NOT_IN_USE",translationRootUrl:"https://test-translations.zerv.me"},stage:{stripeApiKey:"pk_test_GqHTv9RHuCscUubjKxDXxZwW",gtmId:"NOT_IN_USE",translationRootUrl:"https://stage-translations.zerv.me"},acceptance:{stripeApiKey:"pk_test_GqHTv9RHuCscUubjKxDXxZwW",gtmId:"NOT_IN_USE",translationRootUrl:"https://stage-translations.zerv.me"},testprod:{stripeApiKey:"pk_test_GqHTv9RHuCscUubjKxDXxZwW",gtmId:"NOT_IN_USE",translationRootUrl:"https://testprod-translations.zerv.me"},prod:{stripeApiKey:"pk_live_KkQuCvw9KJae5mIxoqoddMZx",gtmId:"GTM-TBKNQ5X",translationRootUrl:"https://translations.zervan
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:Web Open Font Format (Version 2), TrueType, length 22748, version 1.0
                                Category:downloaded
                                Size (bytes):22748
                                Entropy (8bit):7.990010201445278
                                Encrypted:true
                                SSDEEP:
                                MD5:A78BAF52372804691C879A3A53F1D72E
                                SHA1:2BB68B88FAB5998D25DEA7FBA1DA14E3499C4953
                                SHA-256:3EBDD41D3BDA29CD4CA1B173B91BD49139C14F3152F708839FF4EAF43DCEEDC7
                                SHA-512:B4AE25AB0273C7EA7FB38C6C56EFFC635B3E041546F7DF36125E7A3AF9E192D93636E6C09B39EBD84669408B87C599131F1CCF20204C99A0300E9880793FC840
                                Malicious:false
                                Reputation:unknown
                                URL:https://use.typekit.net/af/e3ca36/00000000000000000000e805/27/l?subset_id=1&fvd=n7&v=3
                                Preview:wOF2......X...........Xh........................?DYNA..?FFTM..0?GDYNE..F..b.`..f....s.....D.....z..6.$..V. ..S..@....;........>\Eb>......MU..../....?..._...X..|.....}..Q...1]..sQ.u.....]Tb4X.}x....s.W.. .....e...TXq.xV.a.r|..W..U..$.3.n7.jO.Xq..7.....#.5..3P...'..a.........].k..'&...._.$..F.SE....X)...F..AP.PR...?*...\+..w1b.INs.S..]m......5b4h#F."HK..8.U.......6.H...Q.w......-YnI..$....?c.......[...H..O.v..E...Bb...m.....Q...O.k.[Z..d....=...QaU..?.~.:.d..\...BS.X.G.$.w4.v.@.'..Y.rO......].w..s%:..... ..vQ...]h......X.9P..x.@.B.v.....p.......R..)W!....E.B..].Q..*w...M.>...oi%...:.S.I...60r....UZ..U^m.&9e].U_.3..4.rH($.r`!3?.}.....%f.B...C.....l7G...D<.c..S....uk:.r...f.`F./%*..,..J.."...g}+'.....:..g.........o... ...{..e:*uY......|.......o..F..^.......[c).m/<.j....p{......[...r..A.jd.7u..}...f.t..WN.<.`.;._y.%c.....K./.v..EW.c^.K....%+o...........M.4..n\u...`..1L.>w).W...5dRP..@....\y...`..B..,$ .....o...@....,.{.1yF^.w.3.F~.
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:HTML document, ASCII text, with very long lines (45257)
                                Category:downloaded
                                Size (bytes):103517
                                Entropy (8bit):6.128975313931577
                                Encrypted:false
                                SSDEEP:
                                MD5:233BCB2565766180775CD799AE2133FF
                                SHA1:669FEF39D899C3D21E2AA054967647EC03138CD7
                                SHA-256:F8057ED5E858715DE914410D3C7A83076BC41B999725FB6AF831CB673019FDAC
                                SHA-512:9C53ADFE6F85430FDE0048AFB8D817B1EA95682EEF53C69973F44E2A7B75782E560550E3D87901DF3681AEB87F66AAAC2207387A34662442AF7FE07918B6450C
                                Malicious:false
                                Reputation:unknown
                                URL:https://secure.zervant.com/rest-invoice/api/v1/recipient-portal/document/html?accessToken=z5YY1SAZlE9ODNw4Ec%2FHXLTwpvEg1Bkp%2BBzy%2BqYzP7jv7qsKrjqjCEE7sClXZPwhDtT9x9IrjRrFzBtcRZ5Hb%2BmiLgQDNu2NFopbyYe2AQ7MdzoDr8RXBuK3W9ZuNOBbCfbjsiXNOaeKBnyzLe4zFCg%2FYmJ%2BIAMDy8YNQyXVS%2FGeMlrd5znKWRXmIqRnIe3zlnpDzVayuVk8k1N%2FnOlrQgsuLatQoETDGD6BmLyZSlwwYXDP84erK7dpVTk01QYp
                                Preview:<!DOCTYPE html>.<html lang="en">.<head>. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/>. <link href=https://fonts.googleapis.com/css?family&#x3D;Open+Sans:800,700italic,700,600italic,600,400italic,400,300italic,300,800italic rel='stylesheet' type='text/css'>. <link rel="stylesheet" data-href="/src/styles/invoice_default_default.css"/>. <title>INVOICE</title>. <style>. . . </style>.<style>html{box-sizing:border-box}*,:after,:before{box-sizing:inherit}body,footer,header{background-color:#fff!important;color:#333!important;font-family:Open Sans,sans-serif;margin:0!important;padding:0!important}pre{font-family:inherit;white-space:pre-line}a,b,details,div,footer,h1,h2,h3,h4,h5,h6,header,hr,i,img,li,ol,p,section,small,span,strong,summary,table,tbody,td,tfoot,th,thead,tr,ul{margin:0;padding:0}h1{font-size:16pt;line-height:16pt;margin-bottom:8pt}h1,h2{font-weight:700}h2{font-size:14pt;line-height:18pt}h3{font-weight:700}h3,h4{font-size:10pt;line-height:14p
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:Unicode text, UTF-8 text, with very long lines (336)
                                Category:downloaded
                                Size (bytes):4261
                                Entropy (8bit):5.058138855660549
                                Encrypted:false
                                SSDEEP:
                                MD5:76C93DD9D45FF7BD1E06CA68BD892DAD
                                SHA1:FE920BFCED34EB9AF31A774469D543E5F29377FC
                                SHA-256:D4C11E10DC5AB0DEBFF8B453B0B967BD5170744FFA2FEF81DAFF13F859A99463
                                SHA-512:2D2206C3F08BF9BD0923061134A3EBD7022E34ED2909D18B54C565F5AE29253DECCB03D5632859C8CCB637482180864662F8D18DA3F8DE942D8532BB45E1733A
                                Malicious:false
                                Reputation:unknown
                                URL:https://use.typekit.net/ngm0uky.css
                                Preview:/*. * The Typekit service used to deliver this font or fonts for use on websites. * is provided by Adobe and is subject to these Terms of Use. * http://www.adobe.com/products/eulas/tou_typekit. For font license. * information, see the list below.. *. * museo-sans:. * - http://typekit.com/eulas/00000000000000000000e800. * - http://typekit.com/eulas/00000000000000000000e7fe. * - http://typekit.com/eulas/00000000000000000000e803. * - http://typekit.com/eulas/00000000000000000000e805. * - http://typekit.com/eulas/00000000000000000000e807. * museo-sans-condensed:. * - http://typekit.com/eulas/000000000000000000012caa. * - http://typekit.com/eulas/000000000000000000012cac. *. * . 2009-2024 Adobe Systems Incorporated. All Rights Reserved.. */./*{"last_published":"2017-08-09 06:13:02 UTC"}*/..@import url("https://p.typekit.net/p.css?s=1&k=ngm0uky&ht=tk&f=2003.2005.2007.2009.2011.17400.17406&a=1007786&app=typekit&e=css");..@font-face {.font-family:"museo-sans";.src:url("https://u
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:Web Open Font Format (Version 2), TrueType, length 48236, version 1.0
                                Category:downloaded
                                Size (bytes):48236
                                Entropy (8bit):7.994912604882335
                                Encrypted:true
                                SSDEEP:
                                MD5:015C126A3520C9A8F6A27979D0266E96
                                SHA1:2ACF956561D44434A6D84204670CF849D3215D5F
                                SHA-256:3C4D6A1421C7DDB7E404521FE8C4CD5BE5AF446D7689CD880BE26612EAAD3CFA
                                SHA-512:02A20F2788BB1C3B2C7D3142C664CDEC306B6BA5366E57E33C008EDB3EB78638B98DC03CDF932A9DC440DED7827956F99117E7A3A4D55ACADD29B006032D9C5C
                                Malicious:false
                                Reputation:unknown
                                URL:https://fonts.gstatic.com/s/opensans/v40/memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
                                Preview:wOF2.......l......D...............................O..B..h?HVAR.x.`?STAT.$'...0+...|.../V........+..2.0..6.6.$..`. ..~......[B4q.....t..P.M_.z...1..R.S*...u.#..R....fR.1.N.v.N.P...;.2........!Z......Qs...5f.G.K.an2&....2...*......C.H.t..N!.....nh.<(.vN.....j.._.L.P.t..Ai.%.............._I.i,..o,C.].H.X9.....a.=N....k.....n.L..k.f.u..{...:.}^\[..~5...Z`...........`!...%4..,...K0..&.a/....P....S....m.Z......u...D.j.F...f.0`I.`.`.h#..)(FQ.F!o$........S.).MV8%Rh...r...x...T]$.=......Y...!.3.&U..."....Q....{.l/0..d..4iJ/..}...3....i[Z..NG.WD...>.[U..Q.h..@m.=..S...1C2...d...<..v.?.q.f..n...OUz.....&Z......Z."..N.....n...9.B..C..W....}...W..6Zs.i.+Z........jB.n..x.8M.....q..@I....-.%..,C,..K..#.2...4)/.v_..x.<....t.....%[.4?.=j.V..jj''..W.u..q....I.L.=......E...\.M.7{.>......W........C.`...,9$......\..o........y...4A..m.P.,X..=?.:................wF`..+.P..........M!.4.......l.>M..t.ff5r..^..Z.g...!fA,hIIQ...e.R>B.AH.VuX..>..\.=.ky...1>C....>C.c.;...6D.
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:Web Open Font Format (Version 2), TrueType, length 50296, version 1.0
                                Category:downloaded
                                Size (bytes):50296
                                Entropy (8bit):7.996029729235154
                                Encrypted:true
                                SSDEEP:
                                MD5:B02AB8B0D683A0457568340DBA20309E
                                SHA1:E18C3B8737970D37BE1BB85B0F588303A89E63BB
                                SHA-256:0D8601A776B7DC777CD23BC42392D05A43DF0D6402328E8913B58811083B513D
                                SHA-512:509792D83FE043CC84C560548A6AF42E43C7D94EEC0CE7B9C4B6C28FCA70C49EC77E65320D063A91209EEE7D363E03C7526CB2C2AA807766C5D213D3FC3174F3
                                Malicious:false
                                Reputation:unknown
                                URL:https://fonts.gstatic.com/s/opensans/v40/memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWuU6F.woff2
                                Preview:wOF2.......x......U(..............................B..z..n?HVAR.!.`?STAT. '...@+...8.../V.....h.....>.0....6.$..x. .....c...[.EqET..v..F.&.....r...(.]p..,..[p......d.S.}....'&.1..xo....U.. ...Q...CVU.X5}$..bK........l~...-1I..nu.Vb..ZJ.u..Z.Nk'.e..?.....&.........N...$...........:..]..x]T...n.L....`...!JT.3x-....xq]..EEH.S..q....7.t....t...J.].A.*y...h..].,..{i....P.Z.\.5....6}9....?......Z.e..e..Q...k....K..=....hn..n..1........5`.#.c...%..%.bRm.&.M......#......73.....q.....{...3.%.....Q"Q..b....nTy.....,.lG..b'....V=.....g..DNO#%.C6.K..Q]P.GfU...q.0..Brw.P-.|....s...0....Z..1..n@B.....k.w..O..'.D!....J....M..._.Y....X.0.s..H...5...2S..S......e.....0..X=...n....HG.1.#N[J........$h..PA.;.^.?{."...)W.twu.N...h:......9....Q.R.L..KO.&E...6ky":.b!*.2.(J..BR@LPDE.#.b..v..p...v....wU......Nw'.<...S;.....'y/..b3..].v{.].N\.^...n.O\.vk........ ........Vd8?.n..$h[Z.}.._w_..N.O.O\..ne..@Bl2.Q[W...;...Z?...<.T.X".@.*..AZ......\.*.%..h...[....3..4,[.3HK_..8.v...s.)v.
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                Category:downloaded
                                Size (bytes):279570
                                Entropy (8bit):5.3561096165647495
                                Encrypted:false
                                SSDEEP:
                                MD5:33B85A2C0E601A2AA7F15A60D0658261
                                SHA1:378FCCB6B74136C706124E12B11B9F8BB7A901A7
                                SHA-256:9EBE242696F71B654B7BAB3A7F965808004B78BB81CD5EF3E090D3AAD0BCF3E6
                                SHA-512:993A02A9FB3EB5CD490283DE49373E0BE07096F93817B07A7C386F4E92F1B539438906C645876BEFBEE4979C51477D94A64EF56CC8E3DD3B7CD3792A2157B951
                                Malicious:false
                                Reputation:unknown
                                URL:https://secure.zervant.com/recipient-portal/static/js/2.78a22ecc.chunk.js
                                Preview:(window.webpackJsonp=window.webpackJsonp||[]).push([[2],[function(e,t,n){"use strict";e.exports=n(46)},function(e,t,n){e.exports=n(45)},function(e,t,n){"use strict";function r(e,t,n,r,o,i,a){try{var s=e[i](a),l=s.value}catch(u){return void n(u)}s.done?t(l):Promise.resolve(l).then(r,o)}function o(e){return function(){var t=this,n=arguments;return new Promise(function(o,i){var a=e.apply(t,n);function s(e){r(a,o,i,s,l,"next",e)}function l(e){r(a,o,i,s,l,"throw",e)}s(void 0)})}}n.d(t,"a",function(){return o})},function(e,t,n){"use strict";function r(e,t){if(!(e instanceof t))throw new TypeError("Cannot call a class as a function")}n.d(t,"a",function(){return r})},function(e,t,n){"use strict";function r(e,t){for(var n=0;n<t.length;n++){var r=t[n];r.enumerable=r.enumerable||!1,r.configurable=!0,"value"in r&&(r.writable=!0),Object.defineProperty(e,r.key,r)}}function o(e,t,n){return t&&r(e.prototype,t),n&&r(e,n),e}n.d(t,"a",function(){return o})},function(e,t,n){"use strict";function r(e){retu
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:ASCII text, with very long lines (1572)
                                Category:downloaded
                                Size (bytes):56115
                                Entropy (8bit):5.347323537885137
                                Encrypted:false
                                SSDEEP:
                                MD5:3C89B4E5563F4BA0410A1D7D4F3AD23E
                                SHA1:6455000459BF2AD68625B8B554A652CC84145261
                                SHA-256:B17609553B24140FC01409B78FA834FE878DE6410FE9E8996B0A5F6A984DDD6D
                                SHA-512:F85D5BA57633E85A9A3DC826A33DE76FF22725DE7398FC0049E1395CD46603F0B1F2E1BB47422BCF0D2D71FC2BA497322CFC40EF5101A3FF25E89757E4F6CA56
                                Malicious:false
                                Reputation:unknown
                                URL:"https://fonts.googleapis.com/css?family=Open+Sans:800,700italic,700,600italic,600,400italic,400,300italic,300,800italic"
                                Preview:/* cyrillic-ext */.@font-face {. font-family: 'Open Sans';. font-style: italic;. font-weight: 300;. font-stretch: 100%;. src: url(https://fonts.gstatic.com/s/opensans/v40/memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWtE6F15M.woff2) format('woff2');. unicode-range: U+0460-052F, U+1C80-1C88, U+20B4, U+2DE0-2DFF, U+A640-A69F, U+FE2E-FE2F;.}./* cyrillic */.@font-face {. font-family: 'Open Sans';. font-style: italic;. font-weight: 300;. font-stretch: 100%;. src: url(https://fonts.gstatic.com/s/opensans/v40/memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWvU6F15M.woff2) format('woff2');. unicode-range: U+0301, U+0400-045F, U+0490-0491, U+04B0-04B1, U+2116;.}./* greek-ext */.@font-face {. font-family: 'Open Sans';. font-style: italic;. font-weight: 300;. font-stretch: 100%;. src: url(https://fonts.gstatic.com/s/opensans/v40/memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWtU6F15M.woff2) format('woff2');. unicode-range: U+1F00-1FFF;.}./* greek */.@font-face {. font-family: 'Open Sans';. font-style
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:Unicode text, UTF-8 text, with very long lines (65530), with no line terminators
                                Category:dropped
                                Size (bytes):648030
                                Entropy (8bit):5.360461977214888
                                Encrypted:false
                                SSDEEP:
                                MD5:927CFD3A34ABCBFEC2F3A7FB22667ED5
                                SHA1:71D749BA3EFA626701252ED9E8092A443EE9515B
                                SHA-256:96BE664461D3BF79B3BBDDF7FF9AB6CCACCAD31FAD305EC80DAD1C6CBD1FA80B
                                SHA-512:29FD1B7D15760368453BC399AEFDC866C80207DB412899B32DC8D2E381AEA7A8A8835D2E35A958EBD2641603599851DAA2D257BE05C6D3F11A6206FE2146B071
                                Malicious:false
                                Reputation:unknown
                                Preview:!function(){function e(t){var n=o[t];if(void 0!==n)return n.exports;var i=o[t]={id:t,loaded:!1,exports:{}};return r[t](i,i.exports,e),i.loaded=!0,i.exports}var t,n,r={723:function(e,t,n){"use strict";function r(e){l.length||(a(),!0),l[l.length]=e}function o(){for(;d<l.length;){var e=d;if(d+=1,l[e].call(),d>1024){for(var t=0,n=l.length-d;t<n;t++)l[t]=l[t+d];l.length-=d,d=0}}l.length=0,d=0,!1}function i(e){return function(){function t(){clearTimeout(n),clearInterval(r),e()}var n=setTimeout(t,0),r=setInterval(t,50)}}e.exports=r;var a,c,s,u,l=[],d=0,p=void 0!==n.g?n.g:self,m=p.MutationObserver||p.WebKitMutationObserver;"function"==typeof m?(c=1,s=new m(o),u=document.createTextNode(""),s.observe(u,{characterData:!0}),a=function(){c=-c,u.data=c}):a=i(o),r.requestFlush=a,r.makeRequestCallFromTimer=i},5937:function(e,t,n){e.exports=n.p+"fingerprinted/img/abnamro-4445e65420800f96f68cfc67a273f66b.svg"},1520:function(e,t,n){e.exports=n.p+"fingerprinted/img/asn-3d9b1bbff2f8f12105510992dbb37ae8.svg
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:Unicode text, UTF-8 text, with very long lines (65529), with no line terminators
                                Category:downloaded
                                Size (bytes):88751
                                Entropy (8bit):5.414296471740167
                                Encrypted:false
                                SSDEEP:
                                MD5:69CB7809B5011312E716F29B3D19DCE6
                                SHA1:833DABFB546D57065AEBA7190B5EE5A2428DFA47
                                SHA-256:E039E607C78306C7E029A7FD0ECDB14F86456F16E1A5CE65AA26B4FDF1D38A3C
                                SHA-512:4259C8F940CFE4B7EC384E5ABD855713DA7792A955A7B737B75E45E6559A90292ADE59D7CCAB381EA4C2D0FA5109B4ABD9BFA0887C05C9FB1A27469D5E198A69
                                Malicious:false
                                Reputation:unknown
                                URL:https://m.stripe.network/out-4.5.43.js
                                Preview:var StripeM=function(e){var t={};function n(r){if(t[r])return t[r].exports;var _=t[r]={i:r,l:!1,exports:{}};return e[r].call(_.exports,_,_.exports,n),_.l=!0,_.exports}return n.m=e,n.c=t,n.d=function(e,t,r){n.o(e,t)||Object.defineProperty(e,t,{enumerable:!0,get:r})},n.r=function(e){"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},n.t=function(e,t){if(1&t&&(e=n(e)),8&t)return e;if(4&t&&"object"==typeof e&&e&&e.__esModule)return e;var r=Object.create(null);if(n.r(r),Object.defineProperty(r,"default",{enumerable:!0,value:e}),2&t&&"string"!=typeof e)for(var _ in e)n.d(r,_,function(t){return e[t]}.bind(null,_));return r},n.n=function(e){var t=e&&e.__esModule?function(){return e.default}:function(){return e};return n.d(t,"a",t),t},n.o=function(e,t){return Object.prototype.hasOwnProperty.call(e,t)},n.p="",n(n.s=30)}([function(e,t,n){"use strict";(function(e){n.d(t,"a",(function(){retur
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:MS Windows icon resource - 1 icon, 16x16, 24 bits/pixel
                                Category:dropped
                                Size (bytes):894
                                Entropy (8bit):2.5292234637093394
                                Encrypted:false
                                SSDEEP:
                                MD5:17E1EB6D7D43411A8A037FA197177287
                                SHA1:C536612C90360FFD73D0B06264C2BC79428221FA
                                SHA-256:C2F7FF59E2A3070CFC7C3787F8239E5E00F01732E35DCF1404FBFBCE919B6D65
                                SHA-512:740FDCB172E9E349A0513DFA2FB924A702156A51FE1CAD32AF9E18BF119CED309E0A5F35F3ECE18CB002C34D51690FB492E55763B01875FD0EE023713B74CA71
                                Malicious:false
                                Reputation:unknown
                                Preview:..............h.......(....... ...........................................................................................................................................................................................................`..........`............................................................P....................O.................................................................P..............................................................................................................................................................................................................................................................................
                                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                File Type:HTML document, ASCII text, with very long lines (2252), with no line terminators
                                Category:downloaded
                                Size (bytes):2252
                                Entropy (8bit):5.232154617965286
                                Encrypted:false
                                SSDEEP:
                                MD5:97DCC66FF5F5429CBDF8090D82A54654
                                SHA1:B8A02CF715B0088CFF0B89C38C05FFE504858E7D
                                SHA-256:F8F115BAE4CDBEB48795E548ECD0DAE20401F4D3EF5291BD98495B9CB988462E
                                SHA-512:319190ADA7E6B7BB959B4ECFC13207D8F1AB4641CE3C9F73C97321683CCCE58477402E8E62C0C714C8BCEEB94C6EB9AC77CA6D0AEA579BE86D329956B781AEAA
                                Malicious:false
                                Reputation:unknown
                                URL:https://secure.zervant.com/recipient-portal/?accessToken=z5YY1SAZlE9ODNw4Ec%2FHXLTwpvEg1Bkp%2BBzy%2BqYzP7jv7qsKrjqjCEE7sClXZPwhDtT9x9IrjRrFzBtcRZ5Hb%2BmiLgQDNu2NFopbyYe2AQ7MdzoDr8RXBuK3W9ZuNOBbCfbjsiXNOaeKBnyzLe4zFCg%2FYmJ%2BIAMDy8YNQyXVS%2FGeMlrd5znKWRXmIqRnIe3zlnpDzVayuVk8k1N%2FnOlrQgsuLatQoETDGD6BmLyZSlwwYXDP84erK7dpVTk01QYp
                                Preview:<!doctype html><html lang="en"><head><meta charset="utf-8"/><link rel="shortcut icon" href="/recipient-portal/favicon.ico"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><link rel="manifest" href="/recipient-portal/manifest.json"/><link rel="stylesheet" href="https://use.typekit.net/ngm0uky.css"><title></title><link href="/recipient-portal/static/css/main.50451c92.chunk.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div><script src="https://js.stripe.com/v3/"></script><script>!function(f){function e(e){for(var r,t,n=e[0],o=e[1],u=e[2],i=0,l=[];i<n.length;i++)t=n[i],p[t]&&l.push(p[t][0]),p[t]=0;for(r in o)Object.prototype.hasOwnProperty.call(o,r)&&(f[r]=o[r]);for(s&&s(e);l.length;)l.shift()();return c.push.apply(c,u||[]),a()}function a(){for(var e,r=0;r<c.length;r++){for(var t=c[r],n=!0,o=1;o<t.length;o++){var u=t[o];0!==p[u]&&(n=!1)}n&&(c.splice(r--,
                                File type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                Entropy (8bit):7.995216399549904
                                TrID:
                                • ZIP compressed archive (8000/1) 100.00%
                                File name:Fw INVOICE TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.zip
                                File size:135'434 bytes
                                MD5:ae7cfab4b1dd7bd43c954abf9c202ee0
                                SHA1:b996b9c0de51017f56118d42e7b3b793fc648ea3
                                SHA256:4d6a89ed07b16b0345d2ec78fe9c8f3a59416cb4d942e03194726891007ca574
                                SHA512:05cbc16528cc13a4feb6c5d061efaf4917f30add46de315c191c966768d7456e3b45413347f03b454c9bc01a17654f98206e5d85442252de0803d1a1394c1733
                                SSDEEP:3072:PMWsTInVQRwo7HGCG84hg7l8lb0MksM3w8+l5U:U5OVQRwU684e7AQMksM3FYU
                                TLSH:95D3125159A76682A31D0FB1E8B23ED4BD302F2A3C3BFC26D14835D745CCA4C552EA66
                                File Content Preview:PK........Xo.X....<.......6...Fw INVOICE TEST-4 - INTUIT QUICKBOOKS - 399.00 USD.msg....e.U.wz..fdI#K.-,..-.Rw....iM....U.W....1n...}...d'$80.......8.e..e.......f....&.v......'.P......uuW.[.3.l...v.........Y.K......'..9;..........kk.{......0{..y...../|...
                                Icon Hash:1c1c1e4e4ececedc