Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
phish_alert_iocp_v1.4.48 (15).eml

Overview

General Information

Sample name:phish_alert_iocp_v1.4.48 (15).eml
Analysis ID:1526119
MD5:309f769231ed959f0b81b126b6a0f695
SHA1:c45d17358d2f1c5377263972b1f9fa4cc63aeac4
SHA256:8869a1f4341b483df37f9611580d623637302b623a1fcfae0fe6c4579fa72893
Infos:

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

AI detected landing page (webpage, office document or email)
Detected non-DNS traffic on DNS port
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6816 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\phish_alert_iocp_v1.4.48 (15).eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 6992 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "7C905047-9AE0-4B41-8154-5B30D5F80251" "DD69CB2A-1CB7-4F04-BA2F-F680CDDB5651" "6816" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 6416 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://federalreservebanks.na2.adobesign.com/public/esign%3Ftsid%3DCBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R%26&E=jherron%40firstfedweb.com&X=XID208CJDqWo6587Xd1&T=FF1001&HV=U,E,X,T&H=af11579e943013f5cf298f6c57ae8197f64d22a9 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
      • chrome.exe (PID: 4204 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=1776,i,4487565642348165134,14204979835652097579,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6816, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: https://federalreservebanks.na2.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R&HTTP Parser: No <meta name="author".. found
Source: https://federalreservebanks.na2.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R&HTTP Parser: No <meta name="author".. found
Source: https://federalreservebanks.na2.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R&HTTP Parser: No <meta name="author".. found
Source: https://federalreservebanks.na2.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R&HTTP Parser: No <meta name="copyright".. found
Source: https://federalreservebanks.na2.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R&HTTP Parser: No <meta name="copyright".. found
Source: https://federalreservebanks.na2.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R&HTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 40.126.32.72:443 -> 192.168.2.17:49710 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.17:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.17:49775 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.32.72:443 -> 192.168.2.17:49817 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49818 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.209.182:443 -> 192.168.2.17:49819 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 1MB later: 28MB
Source: global trafficTCP traffic: 192.168.2.17:58715 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.17:58715 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.17:58715 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.17:58715 -> 1.1.1.1:53
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.72
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.72
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.72
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.72
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.72
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.72
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.72
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.72
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.72
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.72
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.72
Source: unknownTCP traffic detected without corresponding DNS query: 40.126.32.72
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 172.202.163.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.13
Source: global trafficDNS traffic detected: DNS query: clicktime.cloud.postoffice.net
Source: global trafficDNS traffic detected: DNS query: federalreservebanks.na2.adobesign.com
Source: global trafficDNS traffic detected: DNS query: secure.na2.echocdn.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: use.typekit.net
Source: global trafficDNS traffic detected: DNS query: p.typekit.net
Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 40.126.32.72:443 -> 192.168.2.17:49710 version: TLS 1.2
Source: unknownHTTPS traffic detected: 172.202.163.200:443 -> 192.168.2.17:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.109.210.53:443 -> 192.168.2.17:49775 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.126.32.72:443 -> 192.168.2.17:49817 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49818 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.209.182:443 -> 192.168.2.17:49819 version: TLS 1.2
Source: classification engineClassification label: sus22.winEML@23/46@20/188
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241004T1326540480-6816.etl
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\phish_alert_iocp_v1.4.48 (15).eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "7C905047-9AE0-4B41-8154-5B30D5F80251" "DD69CB2A-1CB7-4F04-BA2F-F680CDDB5651" "6816" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "7C905047-9AE0-4B41-8154-5B30D5F80251" "DD69CB2A-1CB7-4F04-BA2F-F680CDDB5651" "6816" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://federalreservebanks.na2.adobesign.com/public/esign%3Ftsid%3DCBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R%26&E=jherron%40firstfedweb.com&X=XID208CJDqWo6587Xd1&T=FF1001&HV=U,E,X,T&H=af11579e943013f5cf298f6c57ae8197f64d22a9
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=1776,i,4487565642348165134,14204979835652097579,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://clicktime.cloud.postoffice.net/clicktime.php?U=https://federalreservebanks.na2.adobesign.com/public/esign%3Ftsid%3DCBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R%26&E=jherron%40firstfedweb.com&X=XID208CJDqWo6587Xd1&T=FF1001&HV=U,E,X,T&H=af11579e943013f5cf298f6c57ae8197f64d22a9
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=1776,i,4487565642348165134,14204979835652097579,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common

Persistence and Installation Behavior

barindex
Source: EmailLLM: Page contains button: 'Click here to review and sign Security and Resiliency Assurance Program materials for FIRST FEDERAL SAVINGS & LOAN (OR): 323270313.' Source: 'Email'
Source: EmailLLM: Email contains prominent button: 'click here to review and sign security and resiliency assurance program materials for first federal savings & loan (or): 323270313.'
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Extra Window Memory Injection
1
Extra Window Memory Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
clicktime.cloud.postoffice.net
165.212.65.140
truefalse
    unknown
    secure.na2dc2.echosign.com
    44.234.124.143
    truefalse
      unknown
      www.google.com
      142.250.186.68
      truefalse
        unknown
        federalreservebanks.na2.adobesign.com
        44.234.124.143
        truefalse
          unknown
          use.typekit.net
          unknown
          unknownfalse
            unknown
            p.typekit.net
            unknown
            unknownfalse
              unknown
              secure.na2.echocdn.com
              unknown
              unknownfalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                142.250.186.68
                www.google.comUnited States
                15169GOOGLEUSfalse
                52.113.194.132
                unknownUnited States
                8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                142.250.184.195
                unknownUnited States
                15169GOOGLEUSfalse
                1.1.1.1
                unknownAustralia
                13335CLOUDFLARENETUSfalse
                34.104.35.123
                unknownUnited States
                15169GOOGLEUSfalse
                2.19.126.219
                unknownEuropean Union
                16625AKAMAI-ASUSfalse
                2.19.126.206
                unknownEuropean Union
                16625AKAMAI-ASUSfalse
                142.250.185.227
                unknownUnited States
                15169GOOGLEUSfalse
                216.58.206.46
                unknownUnited States
                15169GOOGLEUSfalse
                165.212.65.140
                clicktime.cloud.postoffice.netUnited States
                14454PERIMETER-ESECURITYUSfalse
                74.125.206.84
                unknownUnited States
                15169GOOGLEUSfalse
                142.250.181.238
                unknownUnited States
                15169GOOGLEUSfalse
                2.19.126.211
                unknownEuropean Union
                16625AKAMAI-ASUSfalse
                95.101.54.218
                unknownEuropean Union
                34164AKAMAI-LONGBfalse
                20.189.173.25
                unknownUnited States
                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                239.255.255.250
                unknownReserved
                unknownunknownfalse
                52.109.28.46
                unknownUnited States
                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                44.234.124.143
                secure.na2dc2.echosign.comUnited States
                16509AMAZON-02USfalse
                142.250.184.234
                unknownUnited States
                15169GOOGLEUSfalse
                IP
                192.168.2.17
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1526119
                Start date and time:2024-10-04 19:26:19 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsinteractivecookbook.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:20
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • EGA enabled
                Analysis Mode:stream
                Analysis stop reason:Timeout
                Sample name:phish_alert_iocp_v1.4.48 (15).eml
                Detection:SUS
                Classification:sus22.winEML@23/46@20/188
                Cookbook Comments:
                • Found application associated with file extension: .eml
                • Exclude process from analysis (whitelisted): dllhost.exe
                • Excluded IPs from analysis (whitelisted): 52.109.28.46, 52.113.194.132, 192.229.221.95, 20.189.173.25, 142.250.184.195, 142.250.181.238, 74.125.206.84, 34.104.35.123, 95.101.54.218, 2.16.202.98, 184.28.90.27
                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, clientservices.googleapis.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, mobile.events.data.microsoft.com, ecs-office.s-0005.s-msedge.net, clients2.google.com, ocsp.digicert.com, e16604.g.akamaiedge.net, officeclient.microsoft.com, prod.fs.microsoft.com.akadns.net, ecs.office.com, fs.microsoft.com, accounts.google.com, stls.adobe.com-cn.edgesuite.net.globalredir.akadns.net, prod.configsvc1.live.com.akadns.net, s-0005-office.config.skype.com, stls.adobe.com-cn.edgesuite.net, fe3cr.delivery.mp.microsoft.com, edgedl.me.gvt1.com, s-0005.s-msedge.net, config.officeapps.live.com, a1815.dscr.akamai.net, onedscolprdwus20.westus.cloudapp.azure.com, ecs.office.trafficmanager.net, clients.l.google.com, europe.configsvc1.live.com.akadns.net, mobile.events.data.trafficmanager.net, www.adobe.com, uks-azsc-config.officeapps.live.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtQueryAttributesFile calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • VT rate limit hit for: phish_alert_iocp_v1.4.48 (15).eml
                InputOutput
                URL: Email Model: jbxai
                {
                "brand":["Adobe Acrobat Sign Logo"],
                "contains_trigger_text":true,
                "trigger_text":"Click here to review and sign Security and Resiliency Assurance Program materials for FIRST FEDERAL SAVINGS & LOAN (OR): 323270313.",
                "prominent_button_name":"Click here to review and sign Security and Resiliency Assurance Program materials for FIRST FEDERAL SAVINGS & LOAN (OR): 323270313.",
                "text_input_field_labels":["If you have questions,
                 call the Customer Contact Center (CCC) at (888) 333-7010."],
                "pdf_icon_visible":true,
                "has_visible_captcha":false,
                "has_urgent_text":true,
                "has_visible_qrcode":false}
                URL: https://federalreservebanks.na2.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R& Model: jbxai
                {
                "brand":[],
                "contains_trigger_text":false,
                "trigger_text":"",
                "prominent_button_name":"unknown",
                "text_input_field_labels":"unknown",
                "pdf_icon_visible":false,
                "has_visible_captcha":false,
                "has_urgent_text":false,
                "has_visible_qrcode":false}
                URL: https://federalreservebanks.na2.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R& Model: jbxai
                {
                "brand":["THE FEDERAL RESERVE",
                "Adobe Acrobat Sign"],
                "contains_trigger_text":true,
                "trigger_text":"View message from Assurance Program",
                "prominent_button_name":"Next required field",
                "text_input_field_labels":"unknown",
                "pdf_icon_visible":false,
                "has_visible_captcha":false,
                "has_urgent_text":false,
                "has_visible_qrcode":false}
                URL: https://federalreservebanks.na2.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R& Model: jbxai
                {
                "brand":["THE FEDERAL RESERVE"],
                "contains_trigger_text":true,
                "trigger_text":"Plan and Prepare",
                "prominent_button_name":"Get Started",
                "text_input_field_labels":["Language",
                "English: US"],
                "pdf_icon_visible":false,
                "has_visible_captcha":false,
                "has_urgent_text":false,
                "has_visible_qrcode":false}
                URL: https://federalreservebanks.na2.adobesign.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R& Model: jbxai
                {
                "brand":["Adobe",
                "Acrobat Sign"],
                "contains_trigger_text":true,
                "trigger_text":"The Federal Reserve Banks' FedLine@ Solutions are a critical component of the U.S. electronic payments system and provide access to FedACH@ Services,
                 Fedwire@ Services,
                 FedCash@ Services and other electronic payment and information solutions.",
                "prominent_button_name":"Next required field",
                "text_input_field_labels":["Language"],
                "pdf_icon_visible":false,
                "has_visible_captcha":false,
                "has_urgent_text":false,
                "has_visible_qrcode":false}
                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                File Type:data
                Category:dropped
                Size (bytes):231348
                Entropy (8bit):4.383724560333241
                Encrypted:false
                SSDEEP:
                MD5:78C9C3C887AD1207FD01F191A3889C04
                SHA1:259BF92D72A60ED3C7CE31BEEF37D697187AE54E
                SHA-256:EE3E3A32EC3EB11FC875ADC4C54A5937D94CB6BC73020AB6C2F76ACC3421673F
                SHA-512:6C137B4F817885CFC76CB259AE1C890BABD7B0E77F0C3CDB536D79123137870C4479B35D5D857DBEC2B1E494EDEDA605AAAA0F8A2260D5A558758933F119E9BF
                Malicious:false
                Reputation:unknown
                Preview:TH02...... .@z..........SM01X...,...pg..............IPM.Activity...........h...............h............H..h..o............h............H..h\tor ...AppD...h...0.....o....hw.............h........_`.k...h...@...I.+w...h....H...8..k...0....T...............d.........2h...............k.........%.D..!h.............. h........ .o...#h....8.........$h........8....."h0......P....'h..~...........1hw..<.........0h....4.....k../h....h......kH..hXC..p.....o...-h .......L.o...+h........o.......#h........ ..............F7..............FIPM.Activity....Form....Standard....Journal Entry...IPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000....Microsoft.ffThis form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:modified
                Size (bytes):177810
                Entropy (8bit):5.287215940255337
                Encrypted:false
                SSDEEP:
                MD5:1D7D6DBE4E144A10DA7449C5AB67BD47
                SHA1:C6E2D13E5387DC5469F91BA52AF36DCB3ED9B8F8
                SHA-256:C96B8E724137D5A20034D09C36C717257EA6C8E47E3B4EB1D0B70A0F7812CAA2
                SHA-512:FA361D879EC35DD39279D364DA20137845ED9DF05A951A153D177012A8DD467F79DB58EC37B74B0C472FBD424B43CFF7F606C282577F59F54F96A04A14E36D7A
                Malicious:false
                Reputation:unknown
                Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2024-10-04T17:26:56">.. Build: 16.0.18124.40132-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://word-edit.officeapps.live.com/we/rrdiscovery.ashx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[
                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                File Type:data
                Category:dropped
                Size (bytes):32768
                Entropy (8bit):0.04591939678467531
                Encrypted:false
                SSDEEP:
                MD5:CA3050289732A317794B607B7A882DB8
                SHA1:55A9FF7F2178D63F10F60CE9BB48294D1DC32E9A
                SHA-256:8A1FD9699F83B2254D1CC668D6FCCEC5FF146D7B7534E1753A8CC185EFCFB34D
                SHA-512:2F5E5AD17381DE91B67D3BA1D449AE863D93886C40A1DA242F240040A45450DB888478DFF8439B8E7A5A3E4EAA737F5ECEB544F6C0F6CBCBB544AD0C37648140
                Malicious:false
                Reputation:unknown
                Preview:..-.....................Y.=~...iY+S.Pat..p.......-.....................Y.=~...iY+S.Pat..p.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                File Type:SQLite Write-Ahead Log, version 3007000
                Category:modified
                Size (bytes):49472
                Entropy (8bit):0.4829465730623076
                Encrypted:false
                SSDEEP:
                MD5:E2639749D676D2CDA24559402CEC7788
                SHA1:B71B13E1AD3295CB75847B249F069169A58E69F0
                SHA-256:A8AB7C7B94A96784B59CDDD4110948C1AC264D8977A6F1A0A98EA6FF56151285
                SHA-512:AE3B89F37095E9485DC4715E5E4CAEA21D4CA51FB45E613F2F8C497DADAAE8A95F01866E09B8AEAED7F071728BE972BC8EB8BBBA07A937236A6A05E1A026FB6B
                Malicious:false
                Reputation:unknown
                Preview:7....-..........Y+S.Pat..:.l..ga........Y+S.Pat.!...Y..SQLite format 3......@ .......................................................................... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                File Type:data
                Category:dropped
                Size (bytes):15256
                Entropy (8bit):4.577716285160388
                Encrypted:false
                SSDEEP:
                MD5:361EF6C977933B5624513EA3CB3A3564
                SHA1:AB5707CDE95D9DC4BBFAE7C6B0B07E472827C413
                SHA-256:EE11139E4B53DFF2D2E2808B0D810BD7BB7E0E1DBA75252EAFC59520D3C27E2A
                SHA-512:863A47A60BF2B33D8B00CC4DD86E012823132D3F782841684D2E98DE7A60B027AB9EE634D846422B9D7323D56E37EBF91B129A7087D1B0B1EF166AC16283A47F
                Malicious:false
                Reputation:unknown
                Preview:....[.E.X.T.E.R.N.A.L. .E.M.A.I.L.:. .T.a.k.e. .c.a.u.t.i.o.n. .w.i.t.h. .l.i.n.k.s. .a.n.d. .a.t.t.a.c.h.m.e.n.t.s... .]. .....................................................................................................................................................................................................................................................................................................................................................................................................................p...r...v...&%...,...,..N1..P1..R1..T1..V1.....................................................................................................................................................................................................&...$..$.If....!v..h.#v....:V...t.....6......5.......3........4........B.........$..$.If....:V.......t.....6......4........4........a.........$.a$......$..d....a$.*...$..$.If........!v..h.#v....:V.......t.....6......5.......4........
                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                File Type:ASCII text, with very long lines (28762), with CRLF line terminators
                Category:dropped
                Size (bytes):20971520
                Entropy (8bit):0.16079729555910494
                Encrypted:false
                SSDEEP:
                MD5:78A3D5B3FBBF3CBD50796B6D167F3714
                SHA1:CA4F394029726C4BFAE8CE0E7C59B8E0AA12D2AE
                SHA-256:F5DFB99E12EC4430D98588AA4368BE8A15B5D3F6C520443E39D1F0318F941349
                SHA-512:428CF769B88AA2CD8E2C6486E87630363E4DE61FDEC13BFE3ABD2D6D774324775D50F90D755A9190F66A163C7D7C664ECEE673A2A4CC20334DDB82AC4865ABA6
                Malicious:false
                Reputation:unknown
                Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..10/04/2024 17:26:54.718.OUTLOOK (0x1AA0).0x1AA4.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.GDIAssistant.HandleCallback","Flags":30962256044949761,"InternalSequenceNumber":22,"Time":"2024-10-04T17:26:54.718Z","Contract":"Office.System.Activity","Activity.CV":"gTIqfldhc0+m5FFUKchGkA.4.9","Activity.Duration":12,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.GdiFamilyName":"","Data.CloudFontStatus":6,"Data.CloudFontTypes":256}...10/04/2024 17:26:54.734.OUTLOOK (0x1AA0).0x1AA4.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.ResourceClient.Deserialize","Flags":30962256044949761,"InternalSequenceNumber":24,"Time":"2024-10-04T17:26:54.734Z","Contract":"Office.System.Activity","Activity.CV":"gTIqfldhc0+m5FFUKchGkA.4.10","Activity.Duration":11722,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.JsonFileMajorV
                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                File Type:data
                Category:dropped
                Size (bytes):20971520
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:
                MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                Malicious:false
                Reputation:unknown
                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                File Type:data
                Category:modified
                Size (bytes):102400
                Entropy (8bit):4.4844805002530785
                Encrypted:false
                SSDEEP:
                MD5:8A7011F4445747675E9CC5C6F843608C
                SHA1:A5A545918D079A1EE2EF8169E5A9CF02151DBAD0
                SHA-256:28D28D484BAC5E73DA49DE7CC40A5959BCF9938FEA2D597A823562E37DE09B5E
                SHA-512:17DC2F799E3A816380121C0CAB272C9C54357CF48E5EB90C5962F4EEC4ABACD71B22F434C87E77AF74503C81BC5F293AB08D1E728B6689DC848D967B42994882
                Malicious:false
                Reputation:unknown
                Preview:............................................................................d...........<.O.....................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1................................................................Y..........<.O.............v.2._.O.U.T.L.O.O.K.:.1.a.a.0.:.7.f.c.6.f.6.c.6.8.0.a.7.4.e.9.c.9.d.a.7.1.a.6.9.f.d.9.5.b.0.7.d...C.:.\.U.s.e.r.s.\.t.o.r.r.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.1.0.0.4.T.1.3.2.6.5.4.0.4.8.0.-.6.8.1.6...e.t.l...........P.P.........<.O.....................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                File Type:data
                Category:dropped
                Size (bytes):30
                Entropy (8bit):1.2389205950315936
                Encrypted:false
                SSDEEP:
                MD5:9B19D9D9CF18A03495F0DAFF9F59C7DF
                SHA1:76DE71C7538466326E522BDC81687D20B154D122
                SHA-256:DD2DCBECA72F0EFC15E08F8FF44D22104C9450CA3E2FD8B2178EF89FFBF36198
                SHA-512:AEB0CF278AE46FBAC0227AF854E741FE47BFAB54E3BA3550C431798B61096527C596BEC1B2AE0EC3E87EDD74F7090EBDFB78F4231D1E78D257DFCB19A8D3F858
                Malicious:false
                Reputation:unknown
                Preview:..............................
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 16:27:08 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2677
                Entropy (8bit):3.9876729459730638
                Encrypted:false
                SSDEEP:
                MD5:41EE235377E1C83035464DDC56C52C73
                SHA1:B2A0C5C444CF3189E614366CA292FEC48F28D407
                SHA-256:253441D0142CBC3C50B91E970F341BD437697C4EA7D9B396C0A485001B736F34
                SHA-512:DAB2DCF2F4A97369BE40BC42CC5FBB212F46A30A1B7569C95FBE20F06531A8E5FD9E7E6B5AFD61AE4C5412E00D2B3C883D5FB91FB3A95B1A8F397CB59900017E
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,......b.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IDYR.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDYc.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VDYc.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VDYc............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VDYd............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............}......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 16:27:07 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2679
                Entropy (8bit):4.002812808458637
                Encrypted:false
                SSDEEP:
                MD5:E58A60D93011EB2525035AFED6D9E6A5
                SHA1:DC9F1BC161A4E67B6DD1BE3926C9BDFCB8D6138A
                SHA-256:451DCBC3B495546067DF2D8FCB24E6D18449E52D3738AD896C5C2A5170F50571
                SHA-512:670650A30067F89B7F2A02ED15EFF868A89E15B3FD7185D8870594F1FBB18403D0E308197B1DE6ACA8306A6AB8941E159CA3095A7655651D10162A5B0AF58718
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.....lV.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IDYR.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDYc.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VDYc.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VDYc............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VDYd............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............}......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2693
                Entropy (8bit):4.014823403042512
                Encrypted:false
                SSDEEP:
                MD5:4BDA3BFF3B89CB0CD4730CE4C00B6F59
                SHA1:7FC84491EE13FC07FA6C11D9A5C39BF62091D3D3
                SHA-256:750CADD10E60C71B3C21E26798FC1B3D888F85BAE4CF8ABB310BCD11C5E7E213
                SHA-512:54FEF3C39FD7B3914A719F448773C7B332E2F83D06A14CABBA8EF503D702305C15C632D4FA35706A848FD28770F24DC1BD943A11E59463D232A149AE345479CA
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.....v. ;.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IDYR.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDYc.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VDYc.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VDYc............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.N...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............}......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 16:27:07 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2681
                Entropy (8bit):4.002793664434462
                Encrypted:false
                SSDEEP:
                MD5:5782147C4BBA6362270CD34FE98156C2
                SHA1:82E6821D71F7AB873A664859A4CA8000D43021C1
                SHA-256:FDF7228E3C9FCBEE9CDCC71D27AAA6CE070F651D726CEAA75C27B7E4DF5409A3
                SHA-512:CD34F9F748340EBDB770604749689C080E26DE6454C58D42C96A38B6E1FDF1F7E43B792A7717EE1F4258F82D6B47B023A58C52AE2B541F006EB2E82B57D1201E
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,....HVN.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IDYR.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDYc.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VDYc.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VDYc............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VDYd............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............}......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 16:27:07 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2681
                Entropy (8bit):3.993829857821286
                Encrypted:false
                SSDEEP:
                MD5:37228ED6004E5F38E5228F74DB6D3FBD
                SHA1:1037A1377497C6EDA03F206991ABED12EF5A3BAB
                SHA-256:3C53EDA9E6D65F87E55BE9A19909BDE614639AD0F7DF65B1C5DE6CD13220DA4D
                SHA-512:7B3333F1BCC2C81E67865E6E17B6615936DB21D07130495A16C1059BF36A705A21B29A5A39D8EE43982A2D9F246AA595C822C8E669C446CCFB716088DB0C6D24
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,.....J].........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IDYR.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDYc.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VDYc.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VDYc............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VDYd............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............}......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 4 16:27:07 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                Category:dropped
                Size (bytes):2683
                Entropy (8bit):4.000136555671317
                Encrypted:false
                SSDEEP:
                MD5:5D1F77CE99E8EC20C69F3AFB7F9A22AA
                SHA1:AB7CB61FF40CCC41E70EB87B8F0FA60DCAEEB64F
                SHA-256:42E188135DE1201C60A956A5FAED76FE223ABE6B2BBFE69FE62A9D494DDADDBB
                SHA-512:B454378218FAE67463089211BF4F34E5BBC2122B82C4BC8AC3CBC0FBC5E237A790B566A910617BA65F5B81384DFE96326791C6E4D9513B53D85FCA3C1D1B4839
                Malicious:false
                Reputation:unknown
                Preview:L..................F.@.. ...$+.,....1.D.........y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.IDYR.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDYc.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.VDYc.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.VDYc............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VDYd............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............}......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                File Type:Microsoft Outlook email folder (>=2003)
                Category:dropped
                Size (bytes):271360
                Entropy (8bit):2.92555890212917
                Encrypted:false
                SSDEEP:
                MD5:C96A91933D2AFE6F5301AE0CC17C143D
                SHA1:2AB9B0BC8AA52D61C124B1188647EF42C5B817C9
                SHA-256:7B834496809F2FF618899C12EBF8B635BA3A76BF3AAFF79CE9D67E1C3AE539AF
                SHA-512:DE08519861B2712CEC0A6870BBB315EB456A8226FBC1DF4FEA1578B09D9353CC2A08DB79ACB75B6285E78E1505B74204BA381A6E0616892942242EF86341DA6E
                Malicious:true
                Reputation:unknown
                Preview:!BDN...{SM......\.......................Y................@...........@...@...................................@...........................................................................$.......D.......c..........................................................................................................................................................................................................................................................................................................................X........U..|4}.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                File Type:data
                Category:dropped
                Size (bytes):131072
                Entropy (8bit):3.9521041876529663
                Encrypted:false
                SSDEEP:
                MD5:9363254D6B83C77E3E9CEC1ED4746BAD
                SHA1:8C5981EDAF1C03FC8BC84E963DB5D66ED79402A4
                SHA-256:005E3127A3E9BCBA85B64377991F88470E1AB8E3648EEB7239438B9DE03B6216
                SHA-512:CEAE06C28799122B1819775C6AD47002170AFDB0B0D396839F4A7270AA496EDDC3CB3F10F7DCD34480AD8134D401A0137C6479CE5A8A7FB999386CF18541053D
                Malicious:true
                Reputation:unknown
                Preview:...@C...l...........!M'.......................#.!BDN...{SM......\.......................Y................@...........@...@...................................@...........................................................................$.......D.......c..........................................................................................................................................................................................................................................................................................................................X........U..|4}.!M'..........B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):69374
                Entropy (8bit):4.940095405378546
                Encrypted:false
                SSDEEP:
                MD5:5D8073432A5C1C7106A3C848B9237D4C
                SHA1:E4A1423332EB4227C88A1B52E1E332B6F7E28CF3
                SHA-256:C21A6B8534FDC14F3686AF733FD1364127AED44DC88CA70152841A0E946E1E8D
                SHA-512:3433F7D6D944BD2BF38E542C39932682FF563275A25302F657B38604F500C1CFA429C14B04F5329F1D82FA4E16B19A62FB0C81B9203C1307CAADB3AC98E28BC0
                Malicious:false
                Reputation:unknown
                Preview:<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="800" height="381" viewBox="0 0 800 381">. <defs>. <clipPath id="clip-path">. <path id="path-1" d="M9.294,24v-.027a1.434,1.434,0,0,0,0-2.865,2.483,2.483,0,0,0-.315.028l-1.595.015c-2.394,0-4.731-2.863-4.731-5.4,0-2.275,1.293-4.81,3.355-5.169a4.081,4.081,0,0,1,.756-.072,4.184,4.184,0,0,1,2.365.817c.109.086.219-.043.192-.157a8.627,8.627,0,0,1-.234-2.249A7.251,7.251,0,0,1,9.282,7.61c.672-2.734,3.588-4.7,6.407-4.783,3.231-.1,6.517,2.235,7.2,5.184a7.369,7.369,0,0,1,.192,1.547,8.327,8.327,0,0,1-.3,1.976.147.147,0,0,0,.22.157,4,4,0,0,1,3.231-.788c2.063.359,3.521,2.822,3.521,5.055a5.71,5.71,0,0,1-4.84,5.169l-1.871-.015a1.434,1.434,0,0,0,0,2.865V24h1.939c4.154,0,7.356-3.881,7.356-8.262,0-4.122-2.627-7.416-6.435-7.817a.132.132,0,0,1-.11-.114A10.03,10.03,0,0,0,14.974.064,9.789,9.789,0,0,0,6.49,7.538c0,.029-.069.114-.111.114C2.571,8.054,0,11.62,0,15.715,0,20.123,3.3,24,7.481,24Z" transform="translate(0
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:PNG image data, 39 x 105, 8-bit colormap, non-interlaced
                Category:dropped
                Size (bytes):1229
                Entropy (8bit):6.982400317117547
                Encrypted:false
                SSDEEP:
                MD5:7D316DD586C855E2FD53147E06CB9679
                SHA1:96C500C1C6EFA703C3E06AFD405533A37445FEF6
                SHA-256:A207CB77946A064A765A2E5950398FDF19330F7B078BD5CCE3D1DBF1E2FCC19D
                SHA-512:F25BB00B3B1A8A7877667F502921D84927F40A9A42F1BBCD800ADE55F658CFE8E674E5F0C7A1894881F04C3B8DF0BE0EB6FD3E71080EA07DC8DAB5F99CDE3602
                Malicious:false
                Reputation:unknown
                Preview:.PNG........IHDR...'...i....../......sBIT.....O....>PLTE............................................................................................................................................................................................}.{y.xv.rp.pn.mk.jh.db.b`._].\Z.WU.TR.RP.OM.LJ.HF.EC.B@.@>.><.97.:8.75.33.20.0...,.-*.+(.&#.# . ..................................-P.....jtRNS.."3DUfw....................................................................................................o.....pHYs...........~.....tEXtCreation Time.12/19/14..e.....tEXtSoftware.Adobe Fireworks CS6.....fIDATX...ks.@.....\N..B...6..T...h.B.`m.R...........T.nv...3}.$0....@R(...b.W.....XS.K.~...\.....]..&4$.`.Zb.%,....v|.hF.w...8.....e.G...[.[.%....;b...8(..].j.N.T.>.r......'.[.n.+.&.{.....|.t.l..W.....,?.x.M......2.Y.V^....v....>T(..^....|>.......4Jo.`?|...h.Zx..(6v.;}l..+p'^......F...<P.v4........._..|[PN.+w....-o-9..>......B...&4,h.......?.f.....yo6."...5/.{e.^..|.A.`...5.9.1.~...n..
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):12155
                Entropy (8bit):4.605846476683318
                Encrypted:false
                SSDEEP:
                MD5:D0489EB5346EA1250203C8F4F24167C9
                SHA1:D441CED10523BB7F37D996ADE2D858C18A108C0D
                SHA-256:FA2631ACD9C9234C357BBF0FEA1C8E707D2DBA7A6C8D769C48725A63CFC57F65
                SHA-512:F472C61878266D0D63C36B01AC207232C44BE4C92E7D20A32D31A866BD7520867D78B1DDB63BF04A69A682EAA5D781B264BC65DE2D728687546B7D41D90FF614
                Malicious:false
                Reputation:unknown
                Preview:<svg version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" width="4080px" height="68px"... viewBox="0 0 4080 68" style="enable-background:new 0 0 4080 68;">..<style type="text/css">....st0{fill-opacity:0;stroke:#000000;stroke-width:4;stroke-opacity:0.1;}....st1{fill-opacity:0;stroke:#1473E6;stroke-width:4;}..</style>..<path class="st0" d="M34,4c16.6,0,30,13.4,30,30S50.6,64,34,64S4,50.6,4,34S17.4,4,34,4z"/>..<path class="st1" d="M34,4L34,4c16.6,0,30,13.4,30,30"/>..<path class="st0" d="M102,4c16.6,0,30,13.4,30,30s-13.4,30-30,30S72,50.6,72,34S85.4,4,102,4z"/>..<path class="st1" d="M102.8,4C119,4.4,132,17.7,132,34c0,3.4-0.6,6.7-1.6,9.8"/>..<path class="st0" d="M170,4c16.6,0,30,13.4,30,30s-13.4,30-30,30s-30-13.4-30-30S153.4,4,170,4z"/>..<path class="st1" d="M171.6,4C187.4,4.9,200,18,200,34c0,6.8-2.3,13.1-6.1,18.2"/>..<path class="st0" d="M238,4c16.6,0,30,13.4,30,30s-13.4,30-30,30s-30-13.4-30-30S221.4,4,238,4z"/>..<path class="st1" d="M24
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:GIF image data, version 89a, 1 x 1
                Category:downloaded
                Size (bytes):807
                Entropy (8bit):4.923430589348439
                Encrypted:false
                SSDEEP:
                MD5:B0086A45A9489BCD3ACF4769F37B52AA
                SHA1:8C9400C4A17DB8C47D609B9C7AC3D4EE2E70ADB1
                SHA-256:FF489AAD06B35701434AF93561E529DA4316811981798E0C3277FBBE62DF5EF9
                SHA-512:0E5359C741A80998CEF11B779E805AC24B8C932384BFAD006BCCCAFDF704C90B77BF35A783497AAB190CE306AB50FFC13AB0C2B756C7FD075CD60C5E530D243F
                Malicious:false
                Reputation:unknown
                URL:https://secure.na2.echocdn.com/images/transparent-spacer.gif
                Preview:GIF89a...............+..........ws.p.a.c.e.r...g.i.f....|@.......m..| ...@........6..x...........2..|$...H........s......@.........|8..|....2..|...|...|......@.8.H....|XM......Q..|x...m..|.M..`M..4...x...2%.|......|.$.|....x...h....L..E..|N..|`...$...D........A.|X..........|d..........|....0...Q..|....m..|4... ...............8.H.............O.....................|p..|....m..|b..|...|...|p..|.M..8...4...............(.....|x..|....p..|.......|4... .......h]..........t.......t.....|p..|....m..|[.|........g.|...w..@.................(... ...........D..............|p.|....g.|\WC. ......w$... .....q.=_..h.V!.g....q.=_......+..........w.....s..if..*..w ...0...............4.....|...|.......|..|.........|...w................D.D..t...E.. t....H......s....D..t..s.D..s..!.......,........@.......;
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (65536), with no line terminators
                Category:downloaded
                Size (bytes):135965
                Entropy (8bit):5.05194951038613
                Encrypted:false
                SSDEEP:
                MD5:DD46F90EEB5C95118967A23A814DFB6A
                SHA1:0BBAF01C810AAE6E4B5708C9251050CDB0AA34B6
                SHA-256:77991A2F72E7B3DDFDD547DBCF48CCFF086426A0DDA37922F3EE14148AB6F5C2
                SHA-512:A9FDF4D8B6075DD8D96DBD4F0B5EC342DED1BEBA7C8C9AF63C5EAA5E0CE461C8D7E2A94EE305268B05356595C4F4A91FCFC76F14EE622D6861CC49F61B46CAF8
                Malicious:false
                Reputation:unknown
                URL:https://secure.na2.echocdn.com/resource/819013074/bundles/esignJS.css
                Preview:.disabled-opacity{opacity:0.5;-ms-filter:"progid:DXImageTransform.Microsoft.Alpha(Opacity=50)";}.no-box-shadow{box-shadow:none;-webkit-box-shadow:none;}.wrapLongText{white-space:pre;white-space:pre-wrap;white-space:pre-line;white-space:-pre-wrap;white-space:-o-pre-wrap;white-space:-moz-pre-wrap;white-space:-hp-pre-wrap;word-wrap:break-word;}.has-error-color{color:#D83742;}.has-error-border{border:1px solid #D83742;}.has-error-background{background-color:#ffffff;}.has-error-common{border:1px solid #D83742;color:#D83742;box-shadow:inset 0 1px 1px rgba(0, 0, 0, 0.075);-o-box-shadow:inset 0 1px 1px rgba(0, 0, 0, 0.075);-moz-box-shadow:inset 0 1px 1px rgba(0, 0, 0, 0.075);-webkit-box-shadow:inset 0 1px 1px rgba(0, 0, 0, 0.075);}.has-error-font{font-size:16px;font-weight:normal;}.has-error-token-background{background-color:#ffffff;}.has-error-token-background:hover{background-color:#fae3e0;}.has-error-token-background:active, .has-error-token-background:focus{background-color:#fccdc7;}.disab
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (4938)
                Category:downloaded
                Size (bytes):77691
                Entropy (8bit):5.780601235637022
                Encrypted:false
                SSDEEP:
                MD5:57FF2B84FCED138B9A3D0E32922DAA61
                SHA1:1A3380633B6072CD6782172CDE87AAB036B4DCB6
                SHA-256:595ECE59C30E09C12140F42223257E320A8A388541B7A7CF92EEC1E0DA4CDA41
                SHA-512:278551ACF313D200267CFBA13C829CDF31E144F6F20B2121E17EB5F0416C15EA67FD9E2F1E77D41DF11424FAD0F98AF28FCD87CF2FE2D618DFA8DD50669A4C58
                Malicious:false
                Reputation:unknown
                URL:https://secure.na2.echocdn.com/resource/N9117456/bundles/esignResponsive.css
                Preview:.disabled-opacity {. opacity: 0.5;. -ms-filter: "progid:DXImageTransform.Microsoft.Alpha(Opacity=50)";.}..no-box-shadow {. box-shadow: none;. -webkit-box-shadow: none;.}./****** MODALS *******/.html.mobile #contentSubHeader .agreement-header .dark-mode {. background: #2d2d2d !important;.}.html.mobile #contentSubHeader .agreement-header .dark-mode .agreement-container {. align-items: center;. display: flex;. height: 56px;.}.html.mobile #contentSubHeader .agreement-header .dark-mode .agreement-container .lastsave .lastsave-info-icon {. margin: -11px 0 0 0;.}.html.mobile #contentSubHeader .agreement-header .dark-mode.agreement-band.navbar {. height: 56px;. border: 0;.}.html.mobile #contentSubHeader .agreement-header .dark-mode.agreement-band.navbar .agreement-req-info {. padding-top: 8px;. padding-left: 0;.}.html.mobile #contentSubHeader .agreement-header .dark-mode.agreement-band.navbar .agreement-req-info .completed-info {. margin-top: -6px;. float: right;. margin-right:
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Web Open Font Format (Version 2), CFF, length 41556, version 1.0
                Category:downloaded
                Size (bytes):41556
                Entropy (8bit):7.98872215025426
                Encrypted:false
                SSDEEP:
                MD5:5C74846199D1B1DB5480B24370AE24A4
                SHA1:24A0AECDB2964254F28E9B30BD3A05D2E3D333EF
                SHA-256:0835AC845EA08E0E2E91347843377D229AC72184F6593DAC81D3EA2557F6567D
                SHA-512:5BCACB0980EF39ACD34BC3C74EAA9F5919C0F56F37CD281188483DA3F76FB1F18C7E4DDC5C861D2E6B3B7928C6FB45CAE00C7EBA411D6252DBCBDA9C38E24F8C
                Malicious:false
                Reputation:unknown
                URL:https://use.typekit.net/af/e301c6/0000000000000000000149e7/27/l?primer=7cdcb44be4a7db8877ffa5c0007b8dd865b3bbc383831fe2ea177f62257a9191&fvd=n4&v=3
                Preview:wOF2OTTO...T....................................:...c?DYNA..?GDYNa.R.`..2...6.$..D....{. ...5...~.8....<.....M.../....?......K.u2..}H.....o._.....-<.P.........q.=.l.T...L...@..>b.<....W...:..XT..7...L.....p..xF...1.....}y...J...IHH.......|.........^.Nb....A..?pITgTr..HF.OK....j.y.Nw..J..E..!..,...]..~a...e;vx..v.q..C..rf........8&.L.I.`.}..}..S..r..x...\.....Tb.:..-iWd..9$H.....|.N..N...hW...YDh]...X.E/.i...W.+.O1......(e...DL.hR}...N.v...QEK%..F...t......1..y......3}.r....`....`,..Y..$06k..xK...^.B.2........!...l.....!9 Z..P^..z..#.~...G...1..3.......W.%...._2@.m..zIH..F.......|0.V..UY.%Y.\...'..).(...J.D..E..T."....2.ZB.......:\.E.FZKAY-.U?!C.H"z. ..DQW.....PEY%....K.Z$....-.8.I.%,..........3.1U.$X..;._8.9?.ox~z~.6..8.y+.Y...;....K...J:.. eq...?.xFy...J..3.dn..y3.Uv......r..v.Ui5....h1.D.....K.....}.*.Zl([.6.-l.....#....n.;.%{.>.........h...L.ldX..`........6...`..~.8...J..........7n....).....Z.%o...B^..>...c.X>...........^...._..N..(u
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Unicode text, UTF-8 text, with very long lines (65533), with no line terminators
                Category:downloaded
                Size (bytes):491346
                Entropy (8bit):5.10220826481251
                Encrypted:false
                SSDEEP:
                MD5:0D08C3B4A9BFE1CFE8C7E18D01C59D30
                SHA1:54CE0E7E40474F6C87C6E941F71A489EA611CE53
                SHA-256:0618F2CEB459DF1568722103C6A08A77D6179B301FE2AD6EE8E5623A71549296
                SHA-512:53C3168EC96A873851C6D9F08A9084F250693AFFF6D304997A75FEA7194931C946388824A8EE45D3356BEE5DE1B7105875FC6A642DAEE84DC3902F5033BDB385
                Malicious:false
                Reputation:unknown
                URL:https://secure.na2.echocdn.com/resource/1284397208.en_US/bundles/translations.js
                Preview:(function(){function a(e,d){for(var c=0;c<d.length;c++){e=e.replace("{"+c+"}",d[c])}return e}function b(){var f=arguments[0];var e;if(f.indexOf("{0}")!=-1){e=function(){return a(f,arguments)}}else{e=function(){return f}}for(var c=1;c<arguments.length;c++){for(var d in arguments[c]){e[d]=arguments[c][d]}}return e}window.i18n=({country:{PS:b("Palestinian Territory"),PT:b("Portugal"),PY:b("Paraguay"),QA:b("Qatar"),AD:b("Andorra"),AE:b("United Arab Emirates"),AF:b("Afghanistan"),AG:b("Antigua and Barbuda"),AI:b("Anguilla"),AL:b("Albania"),AM:b("Armenia"),AN:b("Netherlands Antilles"),AO:b("Angola"),AQ:b("Antarctica"),AR:b("Argentina"),RE:b("R.union"),AT:b("Austria"),AU:b("Australia"),AW:b("Aruba"),AZ:b("Azerbaijan"),RO:b("Romania"),BA:b("Bosnia and Herzegovina"),BB:b("Barbados"),RS:b("Serbia"),BD:b("Bangladesh"),RU:b("Russia"),BE:b("Belgium"),BF:b("Burkina Faso"),RW:b("Rwanda"),BG:b("Bulgaria"),BH:b("Bahrain"),BI:b("Burundi"),BJ:b("Benin"),BM:b("Bermuda"),BN:b("Brunei"),BO:b("Bolivia"),SA:
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:PNG image data, 1020 x 1320, 8-bit/color RGB, non-interlaced
                Category:downloaded
                Size (bytes):12753
                Entropy (8bit):6.693580355979805
                Encrypted:false
                SSDEEP:
                MD5:508C3E36E670753056AFD5AB15074D47
                SHA1:3DD3F11AF694F46A1DDC59517101D1B111103D7A
                SHA-256:00A00CE53D8803B8B832B481816674FE0D8C1687E0D9D98ED9B1C565686E09B1
                SHA-512:13DE984C7A9846578AB03340BA3FEBF7B350E4ADD3011D678F4E2575C7CD5A6C85BFCF361D9E939A86047C47597595319375BEB6D0B0C36E24CBB4B4C3B7CF8E
                Malicious:false
                Reputation:unknown
                URL:https://federalreservebanks.na2.adobesign.com/images/thumbnails/default_image_z125.png
                Preview:.PNG........IHDR.......(.......I.....gAMA......a....IiCCPsRGB IEC61966-2.1..H..SwX...>..e.VB..l.."#....Y....a...@...V....HU...H...(.gA..Z.U\8....}z...........y.....&..j.9R.<:...OH.....H.. ....g......yx~t.?...o...p..$......P&W. ...".....R...T.......S.d.....ly|B"......I>................(G$.@..`U.R,......@"......Y.2G.....v.X..@`...B,.. 8..C.... L..0.._p..H.....K.3.....w....!..l.Ba.).f.."...#.H..L.........8?......f.l....k.o">!.........N..._....p...u.k.[..V.h..]3...Z..z..y8.@...P.<......%b..0.>.3.o..~..@...z..q.@......qanv.R....B1n..#.....)..4.\,...X..P"M.y.R.D!.....2......w....O.N....l.~.....X.v.@~.-......g42y.......@+..........\...L....D..*.A..............a.D@.$.<.B.......A.T.:.............18....\..p..`........A...a!:..b.."......"aH4... ..Q"..r...Bj.]H#.-r.9.\@.... 2....G1...Q...u@......s.t4.]...k....=.....K.ut.}..c..1.f..a\..E`.X.&..c.X5V.5c.X7v....a..$......^...l...GXLXC.%.#....W...1.'"..O.%z...xb:..XF.&.!.!.%^'.._.H$...N.!%.2I.IkH.H-.S.>..i.L&.m....... ......O.
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Web Open Font Format (Version 2), CFF, length 29752, version 1.0
                Category:downloaded
                Size (bytes):29752
                Entropy (8bit):7.991259791890674
                Encrypted:true
                SSDEEP:
                MD5:B45F7B0B58EA5CD543323A5E4BA4724B
                SHA1:03E815A2FA7461F31FC8ECC18A7063930FC87475
                SHA-256:9ABA873D54C84D8D56CFE572AB802BB34322DE6FD945C286D278FABE29A9F3F0
                SHA-512:0726643B1B961B3A2E67380A6CED69030E5E97E99C938EBA29830638CC0CA7CF0C42E22DFC6AC77553B21B4E71FF8E3C6BDB8004168449C182A88C9A380D3422
                Malicious:false
                Reputation:unknown
                URL:https://use.typekit.net/af/40207f/0000000000000000000176ff/27/l?subset_id=2&fvd=n3&v=3
                Preview:wOF2OTTO..t8..........s..........................F...]?DYNA.i?GDYN.y..r.`..N...6.$..H....7. ............y..h.0....UUU.&.w... .._..w..._..........s..;.L.xJ.%..4w....{I>le-.pU....[Y.B......_v.....a|.%8Jj"4...I..O.O..d}.A.8P......a.f..S.Oh[...{w....M"...[.,`.B2...`.K=Ql.S...&;....M.C...Z*)..P..S..[;........7.K....h...%..jIC....-.N...n....P....%9.Le.....pT..Z..vk..........:..hvP.Q..h;.....i^__.N.@9.O...G...d...i.D_.6...3..<c..Hw.=...m.. .i...:..m0.H....\......<........4... ..'"<qQ....C.S..A.J.,2.... .2_.....s......[......|.@.6);.O....w6.&[x..7.z.|....if..XDE..].Mp.).I.i.'..H....PW..[c..oUOe...5....^.sJB.(^b.... fL.[..>.J.4.y.....0{QN...4.....E..Qdf....5b....d,.3.^.Z.UD.!..y.....i77.$.S........F.2.8.:.h....az.........:....`x........S_. ..$.q{J..Z2..iWqG`[f.M...p&...3..w....{......:h.....i.qg.%...x...a(...0...2...>...^.w..\.w..e.....]..S;..b..d....+...ld..w....r.k.1QJ...y.a_..\+.g^Vp....v.3[r..+...B>$w....}....u...+8...x..U..6..1Ln!zS..w..h
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Web Open Font Format (Version 2), CFF, length 29980, version 1.0
                Category:downloaded
                Size (bytes):29980
                Entropy (8bit):7.991242817341188
                Encrypted:true
                SSDEEP:
                MD5:864FC6D95444FD085441968A712F6C9F
                SHA1:7E54F060DF28A16E146AB1EB15AB3A59D3D9BE06
                SHA-256:371F06319FA71DE555AEBEFCFFBE3C1F755E5761D90AACD9BBA0C64C6CF40090
                SHA-512:7CADDDDCD35910BC04D80EB10F0776BBF7C770AFCF960FBBDFCC8E8DB1BACD694883A3E9A1540552B544AE639FA42C9B79690ADB81F7D5210467B6494BA25880
                Malicious:false
                Reputation:unknown
                URL:https://use.typekit.net/af/eaf09c/000000000000000000017703/27/l?subset_id=2&fvd=n7&v=3
                Preview:wOF2OTTO..u........0..t..........................F...D?DYNA.i?GDYN.y..H.`..N...6.$..H...... .5...H..V.CDE....}........W.?@..................o.9.%r.xtl%V.H9I....{..;.3..._..Km...LL..5...$..d.-*0.b(...;I $..Vc3.d..|....9..=f..,....4../*......-..J..z...r...C.%....U.V,....T.l......q%...A..]I....E..$.......s...N...p.(4Is.K.r.C.v.L.a...(.e..{............m!...\&p.T2S.O..e...?....#...ylj..!....d....W..E...Q....y..z...!X..^QY..W_9..x...?...M.*..!.......,+`YV.e]........?V.{.jd..+krf.3K?.9...,.8....CREr...YLf..?.3.dqv..\...pU...H`!..*+...l}..)....J.....M.P.;.......;w.....Zw...(.....lM..zj....`X.:.CqL.L..?.....d./...l.y9..xy;. ...P.X .I.l....Y......5'.0S'..L../...p.....+.B.. ....eb..:3.ns..B..a........~L.....R.w..!E.9{.}..dB%.zxq.5.F. ..q0.f.|X..|.o.m..+w.....<&...k9{..&......+...s..."..d2.u.UC..q.K..8....VC'qr.....j[.qb2NZ!.N.O.:._...e..*.C.u..5.8....t.h+...:..!Lv>8......<J......R......A:B.Gg...:.6K.J.N... ......uIl.V.C....{....X..uS.2.)..=..s
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (60557)
                Category:downloaded
                Size (bytes):937938
                Entropy (8bit):5.51889339083234
                Encrypted:false
                SSDEEP:
                MD5:0D918CA1E1236B6DFCC7203881BD6BCA
                SHA1:ECCBB383811CD4890F19211C6978B95847475FCA
                SHA-256:C38EC85816E428ACD87E861AEEFA325D3B4B8E84BCE6EB8C74510B7992211D48
                SHA-512:38F5909AD9CFB0CBE2AEF67E2285D688E7E3A97D37E2A6E2E1A9F538B2A8AFAA62207A2F2AD32CB06F2F467070360C31B831151210DABC81BB2C2EC355162AC5
                Malicious:false
                Reputation:unknown
                URL:https://secure.na2.echocdn.com/resource/N399895326.en_US/bundles/app-main.js
                Preview:/*!. * jQuery JavaScript Library v3.5.1. * https://jquery.com/. *. * Includes Sizzle.js. * https://sizzlejs.com/. *. * Copyright JS Foundation and other contributors. * Released under the MIT license. * https://jquery.org/license. *. * Date: 2020-05-04T22:49Z. */.(function(b,a){if(typeof module==="object"&&typeof module.exports==="object"){module.exports=b.document?a(b,true):function(c){if(!c.document){throw new Error("jQuery requires a window with a document")}return a(c)}}else{a(b)}})(typeof window!=="undefined"?window:this,function(a1,ay){var m=[];var aP=Object.getPrototypeOf;var aa=m.slice;var bV=m.flat?function(b1){return m.flat.call(b1)}:function(b1){return m.concat.apply([],b1)};var x=m.push;var bR=m.indexOf;var aj={};var z=aj.toString;var U=aj.hasOwnProperty;var aB=U.toString;var bk=aB.call(Object);var J={};var y=function y(b1){return typeof b1==="function"&&typeof b1.nodeType!=="number"};var aE=function aE(b1){return b1!=null&&b1===b1.window};var l=a1.document;var be={type:tru
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (5632)
                Category:downloaded
                Size (bytes):5633
                Entropy (8bit):5.321851327578031
                Encrypted:false
                SSDEEP:
                MD5:47ABD389245817A0D1CCCDFD635987DA
                SHA1:66B03EEDC907A2FE86222E8350CF32AF0B236F0D
                SHA-256:44A61F3D32524D8EA20D06249621C69673F76FBD13D6201F6F4A107923FDE580
                SHA-512:800F125614E63EFA04A0421B4FE161B4B998B7A2563A192C9578D7E6EB7F21C3FDAA97EBB18D5DF65529820CD1126637CE7D4179146D99D5DC2AAF19EE942035
                Malicious:false
                Reputation:unknown
                URL:https://secure.na2.echocdn.com/resource/1730650309/bundles/toast-message.css
                Preview:#toast-container{display:flex;position:fixed;right:0;z-index:100050;-ms-flex-direction:column;flex-direction:column;-ms-flex-align:center;align-items:flex-end;}#toast-main-view{display:none;-webkit-animation:fadein 0.3s, fadeout 1s 6.5s;animation:fadein 0.5s, fadeout 1s 6.5s;}.toast{box-sizing:border-box;line-height:1.5;display:inline-flex;-ms-flex-direction:row;flex-direction:row;-ms-flex-align:stretch;align-items:stretch;border-radius:4px;padding:8px 8px 8px 16px;font-size:14px;font-weight:700;-webkit-font-smoothing:antialiased;margin:8px;}.toast--success{background-color:rgb(18, 128, 92);color:rgb(18, 128, 92);}.toast--error{background-color:rgb(232, 9, 28);color:rgb(232, 9, 28);}.toast--info{background-color:rgb(9, 90, 186);color:rgb(9, 90, 186);max-width:415px;}.toast--top-right{right:0;}.toast--top-middle{right:40% !important;top:66px;}.toast--button-secondary{border-color:white !important;}.toast--button-primary{}.toast--button-secondary-center{border-color:white !important;floa
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Unicode text, UTF-8 text, with very long lines (2258)
                Category:dropped
                Size (bytes):17476
                Entropy (8bit):5.5562021281521154
                Encrypted:false
                SSDEEP:
                MD5:80AA1425E8422CAEF6A4DEFFDA2F5A38
                SHA1:BCADA77A87D8F10F1CA4ADE8D393B2AD9988AD13
                SHA-256:1B3329DED46F847B991CE76CBD6252FC0322BED2ADA2535143B58543109E271D
                SHA-512:9DD29547A084858ACD7ADA9E451185983F8BD1B5C1D35DDA15A6BB52CA7D3B65DD8A604BDAE580B000748481DC71A224A0EAE7006C576F50F5EE8087C3B1DF2D
                Malicious:false
                Reputation:unknown
                Preview:/*. * The Typekit service used to deliver this font or fonts for use on websites. * is provided by Adobe and is subject to these Terms of Use. * http://www.adobe.com/products/eulas/tou_typekit. For font license. * information, see the list below.. *. * adobe-clean:. * - http://typekit.com/eulas/000000000000000000017701. * - http://typekit.com/eulas/000000000000000000017703. * - http://typekit.com/eulas/0000000000000000000176ff. * adobe-hand-b:. * - http://typekit.com/eulas/0000000000000000000149e7. *. * . 2009-2024 Adobe Systems Incorporated. All Rights Reserved.. */.if(!window.Typekit)window.Typekit={};window.Typekit.config={"a":"717200","c":[".tk-adobe-clean","\"adobe-clean\",sans-serif",".tk-adobe-hand-b","\"adobe-hand-b\",sans-serif"],"fi":[7180,7182,7184,22766],"fc":[{"id":7180,"family":"adobe-clean","src":"https://use.typekit.net/af/cb695f/000000000000000000017701/27/{format}{?primer,subset_id,fvd,v}","descriptors":{"weight":"400","style":"normal","stretch":"normal","dis
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:PNG image data, 13 x 13, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):329
                Entropy (8bit):6.7539656689897365
                Encrypted:false
                SSDEEP:
                MD5:1DE6CDACF8963C2A0AF02507130C9543
                SHA1:C7B728B5B5C654431482F8D829A71984C238807F
                SHA-256:5821F8705F72BA79BA155B84DD84A59F7D9B7CBC8D8CB1D25179F75B9E50F17C
                SHA-512:F27464C2BCD7A01961ABCADD98F03A7EA21D41925D8FE0A177EC9A5081BAE23EFD09BD0E564AF92BC3FB2730576B6E26317401996EFB3D49DC289C0B0FBC0F2C
                Malicious:false
                Reputation:unknown
                Preview:.PNG........IHDR.............r..|....sBIT....|.d.....pHYs...........~.....tEXtCreation Time.11/5/13......tEXtSoftware.Adobe Fireworks CS6......IDAT(......1.E."9.`.ZB..=.%X.`.k.z....A.@!.\.eV..]..`H.?...@%)%V.!`>.....C.[/4|....t.@.i-p..r..&m....M..(L.\...p..3....<`..T+.R......d....^..w.B...>|O...?b.7^.'..9......IEND.B`.
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with very long lines (1215)
                Category:downloaded
                Size (bytes):162116
                Entropy (8bit):4.992534661953849
                Encrypted:false
                SSDEEP:
                MD5:55B3DE8C965B36683CCAF792FDB6F2EC
                SHA1:FEB8F996B75D12552BE4D622C01E0AABAC868ABF
                SHA-256:EBEFA0049242869709CA78F3769F0D017EF7978792E74A041E319A477AEE5318
                SHA-512:9D9D3D3DA1815235E6452B73F53CDC30CD4C9E72F2458CC00CAE468FD9A0E1241DF88EAD446CDE4E9CCDBA159529B76B67885D1CB17FC7A4E6FCDC6C1D1BF164
                Malicious:false
                Reputation:unknown
                URL:https://secure.na2.echocdn.com/resource/N764981603/bundles/dcSignPanel.css
                Preview:/*!. * ADOBE CONFIDENTIAL. * ___________________. * . * Copyright 2017 Adobe Systems Incorporated. * All Rights Reserved.. * . * NOTICE: All information contained herein is, and remains. * the property of Adobe Systems Incorporated and its suppliers,. * if any. The intellectual and technical concepts contained. * herein are proprietary to Adobe Systems Incorporated and its. * suppliers and are protected by all applicable intellectual property. * laws, including trade secret and copyright laws.. * Dissemination of this information or reproduction of this material. * is strictly forbidden unless prior written permission is obtained. * from Adobe Systems Incorporated.. */./*!. * */ /**. * _________________________________. * < DO NOT UPDATE THIS FILE DIRECTLY. >. * ---------------------------------. * \ ^__^. * \ (oo)\_______. * (__)\ )\/\. * ||----w |. * || ||. * . * . * INSTEAD USE https://git.corp.adob
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:ASCII text, with no line terminators
                Category:downloaded
                Size (bytes):172
                Entropy (8bit):4.833302570242348
                Encrypted:false
                SSDEEP:
                MD5:E39F7A7F8F9CED342DEDEBF78A3CBF06
                SHA1:FD2FC2ED9008230D51C9A63EA8AED3C8C12BBF29
                SHA-256:5BD14A9A869610F9D303D56B44B254A830B4B658E30AB17BF6D92F334B0F184A
                SHA-512:B72A522D228CB3605583C78ED96DDC30749C481947A48BD56C99D1ED14E970659CA51FF67FB9122A8D0DE894F1425F6A85B20C3816B2239281F1E3161B1AC4E1
                Malicious:false
                Reputation:unknown
                URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xNDkSawmM7gesvqWr2RIFDSvNz-sSBQ1gncD-EgUNMkq4iBIFDZfjj24SBQ3xTPBBEgUNzlsuARIFDVUXNrASBQ3Izp18EgUNo00hDRIFDU5Zd5MSBQ0kC4iXEgUNkWGVThIFDaCi8-ASBQ2Yfh69?alt=proto
                Preview:Cn4KBw0rzc/rGgAKBw1gncD+GgAKBw0ySriIGgAKBw2X449uGgAKBw3xTPBBGgAKBw3OWy4BGgAKBw1VFzawGgAKBw3Izp18GgAKBw2jTSENGgAKBw1OWXeTGgAKBw0kC4iXGgAKBw2RYZVOGgAKBw2govPgGgAKBw2Yfh69GgA=
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Unicode text, UTF-8 text, with very long lines (52838)
                Category:downloaded
                Size (bytes):85569
                Entropy (8bit):5.476687934706804
                Encrypted:false
                SSDEEP:
                MD5:23A212CCF2F478148E48DA00D8344C0D
                SHA1:85778F6949B487D29FCF2BDB7B7B5903F4EA7C84
                SHA-256:17F1B12A7B2ACAE123E896F54CA7A12A42A36B966D4134F669BD298443BC8327
                SHA-512:D63967C19D54EDC80054E9BD390BB8D02B72A40336A4A53303A7CF7243C4C907F73F39C559FA9B2C907A633811FD642817D3F521C3095A4CB9F48247CE35E082
                Malicious:false
                Reputation:unknown
                URL:https://secure.na2.echocdn.com/resource/1679050799.en_US/bundles/dcsignpanel.js
                Preview:/*!. * ADOBE CONFIDENTIAL. * ___________________. * . * Copyright 2017 Adobe Systems Incorporated. * All Rights Reserved.. * . * NOTICE: All information contained herein is, and remains. * the property of Adobe Systems Incorporated and its suppliers,. * if any. The intellectual and technical concepts contained. * herein are proprietary to Adobe Systems Incorporated and its. * suppliers and are protected by all applicable intellectual property. * laws, including trade secret and copyright laws.. * Dissemination of this information or reproduction of this material. * is strictly forbidden unless prior written permission is obtained. * from Adobe Systems Incorporated.. */.;./*!. * */.(function webpackUniversalModuleDefinition(a,b){if(typeof exports==="object"&&typeof module==="object"){module.exports=b()}else{if(typeof define==="function"&&define.amd){define([],b)}else{if(typeof exports==="object"){exports.DCSignaturePanel=b()}else{a.DCSignaturePanel=b()}}}})(typeof self!=="undefined"?s
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:PNG image data, 700 x 300, 8-bit colormap, non-interlaced
                Category:dropped
                Size (bytes):10404
                Entropy (8bit):7.889246476508816
                Encrypted:false
                SSDEEP:
                MD5:A6BC96F13C6B20295AE34A23C3E7BE40
                SHA1:8FF8CF318D33E270F1421CDACABEB370D83C67EF
                SHA-256:C145C0E997837FED4A0792BEDE157B121C64F4CE61AAC96F93FA8D20055B5E2C
                SHA-512:6A2D1007A743D40CCD364A9E6864B825099D643B5E080569F68DCA979891CB8F7DBD452211ADF43155AA8795D44C32F9EF0AF4CA62DC538CC9107BE65FC64E48
                Malicious:false
                Reputation:unknown
                Preview:.PNG........IHDR.......,...........sBIT.....O.....PLTE..............~~~|||..Gvuv.J@!v. u..t.fff.s..p..v..w..q..o..u.OOODDDCDD@@@>>>......~~~vuv!v..t. p..q..u.OOODDDCDD...........~~~|||..Gvuv.J@!v..t. r.fff.q..u.OOODDD........~~~..Gvuv!v..t.fff.u..q.OOODDD..........~~~|||..Gvuvppp.J@!v..t..q.OOODDD.........~~~vuv.J@!v..t..t.fff.t..q.DDDCDD............~~~..Gvuv!v..t..q.OOODDD........~~~..Gvuv!v. t..t.fff.q.OOODDD.............~~~|||..Gvuv.J@.y.!v. t..t.fff.w..q.OOODDD..........~~~|||..Gvuv.J@!v. t..t.fff.q.OOODDDCDD......~~~|||vuv.J@!v. t..t.fff.q..u.OOODDD...............~~~|||..Gvuv.J@!v. t..t.fff.w..v..q.OOODDDCDD...............~~~..Gvuv.J@!v. t..t.fff.q.OOODDDCDD...........~~~|||..Gvuv.J@!v. t..t.fff.v..q.OOODDD......................~~~|||..Gvuv.J@!v. t..t.fff.w..v..q.OOODDDCDD..D.....tRNS.........................."""""""""""""33333333333333333DDDDDDDDDDDDUUUUUUUUUUUUUUUffffffffffffffwwwwwwwwwwww......................................................................
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Unicode text, UTF-8 text, with very long lines (65533), with no line terminators
                Category:downloaded
                Size (bytes):370415
                Entropy (8bit):5.443656762458118
                Encrypted:false
                SSDEEP:
                MD5:B11EC90A4DE52987D268B1CD9FD11311
                SHA1:FBA165EA5737DBA22B8C71E7AA0FE013B4851BBC
                SHA-256:F826430E91AB162A5E66F077188267A982DDE9925EE0B56DB36604B8429FFC03
                SHA-512:D71B730656AD4AB78989A967CB90BACE00B8906D8D82113270BA97359F3F3FB47B450B072DDCCD428B24D4B3423554446AF39D2F4437E33BF5B0B346D27537F4
                Malicious:false
                Reputation:unknown
                URL:https://secure.na2.echocdn.com/resource/N1154224597/bundles/app-theme.css
                Preview:.slider{display:inline-block;vertical-align:middle;position:relative;}.slider.slider-horizontal{width:210px;height:20px;}.slider.slider-horizontal .slider-track{height:10px;width:100%;margin-top:-5px;top:50%;left:0;}.slider.slider-horizontal .slider-selection{height:100%;top:0;bottom:0;}.slider.slider-horizontal .slider-handle{margin-left:-10px;margin-top:-5px;}.slider.slider-horizontal .slider-handle.triangle{border-width:0 10px 10px 10px;width:0;height:0;border-bottom-color:#0480be;margin-top:0;}.slider.slider-vertical{height:210px;width:20px;}.slider.slider-vertical .slider-track{width:10px;height:100%;margin-left:-5px;left:50%;top:0;}.slider.slider-vertical .slider-selection{width:100%;left:0;top:0;bottom:0;}.slider.slider-vertical .slider-handle{margin-left:-5px;margin-top:-10px;}.slider.slider-vertical .slider-handle.triangle{border-width:10px 0 10px 10px;width:1px;height:1px;border-left-color:#0480be;margin-left:0;}.slider input{display:none;}.slider .tooltip-inner{white-space:n
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:SVG Scalable Vector Graphics image
                Category:dropped
                Size (bytes):4112
                Entropy (8bit):4.951266360531354
                Encrypted:false
                SSDEEP:
                MD5:5F0B516146F975EDDE992B6FEB2861F6
                SHA1:38675BEF0695B8331DCAC0E7A800F895AF75010F
                SHA-256:7209E0294356022B18D4754BB85B77802436BD7FBBE9B1425B7F9BBE102FA8B2
                SHA-512:2306C17D7D7202867F94A8359237E8AD33CCB1F9A4F2D854FC4661A5824F3F579E59F281612E66C8E9E285698B1E1B527888545ED51B0FC01A1C10FB45B5DAA4
                Malicious:false
                Reputation:unknown
                Preview:<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 600 100" width="600" height="100">. <g id="es_icons.1">. <path id="s_page_down_hud_18" fill="#ffffff" d="M8.29,16.8a1.026,1.026,0,0,0,1.412,0l8.051-7.712A.941.941,0,0,0,17.7,7.72a1.037,1.037,0,0,0-1.364,0L10,13.792V1.179a1.007,1.007,0,0,0-2.013,0V13.792L1.661,7.728a1.033,1.033,0,0,0-1.415.156.936.936,0,0,0,0,1.2Z" transform="translate(15.972 16.788)"/>. <path id="s_page_up_hud18" fill="#ffffff" d="M8.29.5A1.026,1.026,0,0,1,9.7.492L17.754,8.2A.941.941,0,0,1,17.7,9.571a1.037,1.037,0,0,1-1.364,0L10,3.5V16.112a1.007,1.007,0,0,1-2.013,0V3.5L1.661,9.563A1.034,1.034,0,0,1,.247,9.407a.936.936,0,0,1,0-1.2Z" transform="translate(65.972 16.788)"/>. <path id="s_page_down_hud_18-2" data-name="s_page_down_hud_18" fill="#707070" d="M8.29,16.8a1.026,1.026,0,0,0,1.412,0l8.051-7.712A.941.941,0,0,0,17.7,7.72a1.037,1.037,0,0,0-1.364,0L10,13.792V1.179a1.007,1.007,0,0,0-2.013,0V13.792L1.661,7.728a1.033,
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:PNG image data, 21 x 21, 4-bit colormap, non-interlaced
                Category:downloaded
                Size (bytes):464
                Entropy (8bit):6.527515766093433
                Encrypted:false
                SSDEEP:
                MD5:1D52501B76AB47E1F5CC292B7BE5A180
                SHA1:09344A38FC2D1F62D1EE7183D92BCAF94255E522
                SHA-256:FC327614AC13390740045897584DF4D985C35B1478884F94336A65E0CF79AC47
                SHA-512:5F42BB987DA011F51DE7198652470371F6161ABBC2935F21528B37CC49E306F489B0F7EEDD1585A02EC52324A5F08D40F9314BB601BB8A11F998F9700D520D7E
                Malicious:false
                Reputation:unknown
                URL:https://secure.na2.echocdn.com/images/doc-cloud/A12_help.png
                Preview:.PNG........IHDR.............[9......sBIT.....O....0PLTE...fffffffffffffffffffffffffffffffffffffffffffff.l......tRNS.."3DUfw........v.......pHYs...........~.....tEXtCreation Time.1/29/15.......tEXtSoftware.Adobe Fireworks CS6......IDAT..c```............./.....5....O@... R.............<...3Z...~20._`.................@.. .......@..O``.?........;......`...<P=.A ;~.C...U..........`......l?.....&.........N..."Y...V....l... x.5Ml...@....Ew.FS.....IEND.B`.
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                Category:dropped
                Size (bytes):5238
                Entropy (8bit):2.8892430767283317
                Encrypted:false
                SSDEEP:
                MD5:81822B8989D79BF953BFFCF6E33A2F5C
                SHA1:37A2CD5435845717982A1F1CB7C1EC1A9C50C881
                SHA-256:9927F1F6E0A5E225CF5063D553A8A915509E9D3C953C5E40BF907800188E742D
                SHA-512:102FAD12F2FEC63E1806969B465BD3B628D7ADDDCCE40B8BECAD173D70101FCF3FD096F13E6C53669D0525FC1A12598F6342F08D7B104916ED35BB5E31C67A09
                Malicious:false
                Reputation:unknown
                Preview:............ .(...&... .... .(...N...(....... ..... ..........................................................................................LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..............Wb..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX......Wb..........Wb..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..bm...............LX..LX..LX.............nw..LX..LX..LX..LX..LX..LX..bm.........................LX.........LX..LX..LX..LX..LX..LX..LX..bm......Wb.....................Wb..LX..LX..LX..LX..LX..LX..LX..LX..............nw..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX...........LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX............LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX.............LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX......bm......LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX.........nw..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..LX..L
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Web Open Font Format (Version 2), CFF, length 29924, version 1.0
                Category:downloaded
                Size (bytes):29924
                Entropy (8bit):7.990737514218301
                Encrypted:true
                SSDEEP:
                MD5:FCFE600FE9BF0239A8C3CD48738EC2DA
                SHA1:C735EDEB5AC056F41E063A46B2F508057C9DBDAB
                SHA-256:62517736E6872FB13CE951C67D689DEF5F6AC4AC222299BFE1E37AC5F05C37AD
                SHA-512:2829D0BE5E38771D56D92371DD9A4131ECDEC577C50481043914A525DE1F0EB9197C731E549F67625EB954EE611377C771126A2A764F0E68B5928476DE05543A
                Malicious:false
                Reputation:unknown
                URL:https://use.typekit.net/af/cb695f/000000000000000000017701/27/l?subset_id=2&fvd=n4&v=3
                Preview:wOF2OTTO..t........(..t..........................F...s?DYNA.i?GDYN.y..r.`..N...6.$..H...... .)...H........Q..aDA.........U...~..?../.....?B...w..{....:`v...9?/y'I..9@I...@..3V@....%WX{'...T@...`./Q...V.Tz....g( .... .....sFO...2..j.n..R....HBI.!.r[n.VR ...JhM.Aj.HI.~....o.&...q..\Gr..8T7..I!(1.0.t..B...Mq....)c....7..Mk)!..]....1k;.d....6..y..N4z...L.B).....'.*.T...Q..?......N>.|...+...V....K..e...I.#..b.j.................BN....B.#.T.._|.....V.:...E.\v./y...$.h....H.Y...;.L*..h..Y.}I.C..U!tR%.pS...i......STU|..).y...P.Y..4`...c.].w..E.>.[.u.R.._..2 )....}.R......... ..Cc!S......)*.$....4#hC...5O....``....0......O....&W..`....d..."...a(....4CP..d..(|.wY.n.I......a*..x....0..xO...~..}.._E.i.3....0k..i@....p.F. ...a....0..a._....w...Z.s...c..&.3.h.wY.W../_~.6.J...H...+......k...D.NKi_..}....K(q^;o}.v..&.>.+...b...m......x..R....B.....|I)Mn1..'.R/..t..Yb4..~.M.C.L.+.....[.......W.A..jc.n...........T3.qyow*..1....+7..K.p.v.^.LU'Z.|....
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:PNG image data, 353 x 60, 8-bit/color RGB, non-interlaced
                Category:dropped
                Size (bytes):8743
                Entropy (8bit):7.962543779903042
                Encrypted:false
                SSDEEP:
                MD5:C3D70E8CF5CEB848EA34F4FE8B9F3DD1
                SHA1:11F107956EAFE83A8934DEF95034ACACB9D779B8
                SHA-256:35A6C4887D87BF27F4C039A2A4C6D9698CF07B98971B87D73A6F780BFE7EBBD3
                SHA-512:469F1FC48902FB13956323ECA01B8A8D24F44CC5586D24AE4A225ADD37090E91FF3A24DC1E5B7929170133247C701D5E4623DE36E693F91A3BA3FE55842D0E77
                Malicious:false
                Reputation:unknown
                Preview:.PNG........IHDR...a...<.....8.....!.IDATx^.].X.G./n.o.....Dc4..jv.9....Y.h..{......D...+...@..0.}.D......x%..@9g.......m......_}|U.^U...~.^uU..<x....@\...<x........Q.sU\)._.<G..u.....=.....s..^../.!"<.+............ged.W. ......?88.\....p..."s....#x.:..#V.\...o..3f.q".(//..q.q..U..\....... s....#x.:..#F..Ml.....\......#.%....R.4.>@.9.G.C.9..7....gOcc#<.!occc4..*11Q"..s...t......T*.....,H'.....V...7.={.e..].baa!.UWW.?~......p...............O.1...KT..9..W_..,_......0Z........7..d2.7.%.9.G.......D...LLL.m......]].....$.o............5..............K.M.d2s.+..BG..a.y-..+/.."..@.. ...h.........r.}.n.....!. t.o....G...........C,...Ol5//....2k.))).L`` (........&.s....8t..../^..|.(......2NNN........;v.. ...^.7.|3o.<.7.cC.Q.].P/.F..8.O|....F..=..'...(++KKK..D.D.....W.......@ ......T..8w..( ..{.'.|...9.)..9s&......c.....#6.x..w!..Bt ?j.(.' ..$E...t:.A. .A.......z.x...U..F...r....*D.... \.v-....Kt.....n........~..r.|.a...5....&....`.K.,..........
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:PNG image data, 9 x 5, 8-bit/color RGBA, non-interlaced
                Category:dropped
                Size (bytes):2974
                Entropy (8bit):7.693993149573583
                Encrypted:false
                SSDEEP:
                MD5:D7CAB8E0AA532CFCDF4364740851AB2A
                SHA1:2F792D69E6BA9984E2F5BA8109D6721CF09260A2
                SHA-256:B81AA9879A9520E7B5BAC125B156A29901026E30B91460DAE07A46F628902958
                SHA-512:2D551AA4DA1FFC2602C6688F13441F4C5C0B13BAD91E853ADEBF45E7B1F233EFA3F134B0122172E3511EA01CBF4DB1D4CD1031943F06952906230E6E3CFC2913
                Malicious:false
                Reputation:unknown
                Preview:.PNG........IHDR..............S.k....pHYs................OiCCPPhotoshop ICC profile..x.SgTS..=...BK...KoR.. RB....&*!..J.!...Q..EE..........Q,......!.........{.k.......>........H3Q5...B..........@..$p....d!s.#...~<<+".....x.....M..0.....B.\.....t.8K....@z.B..@F....&S....`.cb..P-.`'........{..[.!..... .e.D.h;...V.E.X0..fK.9..-.0IWfH.............0Q..)..{.`.##x.....F.W<.+...*..x..<.$9E.[.-q.WW..(.I.+.6a.a.@..y..2.4..............x.....6..._-..."bb....p@...t~..,/...;..m..%..h^..u..f..@.....W.p.~<<E.........J.B[a.W}.g._.W.l.~<.....$.2].G......L.....b..G.......".Ib.X*..Q.q.D...2.".B.).%..d..,..>.5..j>.{.-.]c..K'.Xt......o..(...h...w..?.G.%..fI.q..^D$.T.?....D..*.A....,.........`6.B$..B.B.d..r`)..B(...*`/.@.4.Qh..p...U..=p..a...(....A...a!..b.X#......!.H...$ ..Q"K.5H1R.T UH..=r.9.\F..;..2....G1...Q=...C..7..F...dt1......r..=.6...h..>C.0....3.l0...B.8,..c."......V.....c.w...E..6.wB a.AHXLXN.H. .$4...7...Q.'"..K.&.....b21.XH,#..../.{.C.7$..C2'...I..T...F.nR#.,..4H.#...dk..9.,
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Unicode text, UTF-8 text, with very long lines (39523)
                Category:dropped
                Size (bytes):313484
                Entropy (8bit):5.276616339075505
                Encrypted:false
                SSDEEP:
                MD5:913024B7EA091ED6989587BCF107D086
                SHA1:21854517D18F899027604897A4B69DE219560615
                SHA-256:61560D4F3699C8F07CC9530B61D584E539B915A57E18A4ADDDAC84F4C857FA87
                SHA-512:855F63EA96E09714711BC7D4EC3F53651069B4C4DC93EF97EDBEEC571A39CB515D65B2187C9E6FC85A30491EEA02D60427C3E548F9C3944DF55365F664B43F21
                Malicious:false
                Reputation:unknown
                Preview:(function(){var b=Backbone.PageableCollection,a=b.extend({mode:"client",useDWR:true,hasResults:false,serverErrorText:null,initialServerResponse:null,hideLoadingText:false,state:{pageSize:15},initialize:function(){this.service=this.getDWRService();this.model=this.getModelClass()},getDWRService:function(){return undefined},getModelClass:function(){return undefined},sync:function(i,e,d){switch(i){case"read":var g=this,h=function(j){g.hasResults=true;g.loadingData=false;if(d.success){d.success(j)}},c=function(j){g.serverErrorText=j;g.loadingData=false;if(!g.initialServerResponse){g.initialServerResponse=j}if(d.error){d.error(j)}if(g.callbackGrid){g.callbackGrid.collection.fullCollection.reset();g.callbackGrid.body.refresh()}},f=this.useDWR?App.Service.getDWRHandler(e,{CRUD:true,success:h,error:c}):undefined;this.serverErrorText=null;if(f){this.hasResults=false;this.loadingData=true;if(this.callbackGrid){this.callbackGrid.body.refresh()}this.doSyncCollection(f,d);return}this.hasResults=true
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:Unicode text, UTF-8 text, with very long lines (39221)
                Category:downloaded
                Size (bytes):1239437
                Entropy (8bit):5.434932283225132
                Encrypted:false
                SSDEEP:
                MD5:08A20B08D9C8887F9B901AC2212ACA27
                SHA1:B01A69A0AC74CF2621D39D9A42FD7EA938E278D2
                SHA-256:D9D115A5011B877DB817DBA782F3E719A04B7BDF0C121124D35FC2DE6002B506
                SHA-512:DE2B52EDD2596FCF27963DF2AE5BAC7D3FCBBFA2F016020D2C98CA698148A7E2A7A11485D8229E5CFE452E508F7DF46DA52536DE73A339B112CA2D7DD6137FF9
                Malicious:false
                Reputation:unknown
                URL:https://secure.na2.echocdn.com/resource/N1891595517.en_US/bundles/app-esign.js
                Preview:/*!. backgrid. http://github.com/wyuenho/backgrid.. Copyright (c) 2014 Jimmy Yuen Ho Wong and contributors <wyuenho@gmail.com>. Licensed under the MIT license..*/.(function(a){if(typeof exports=="object"){module.exports=a(module.exports,require("underscore"),require("backbone"))}else{a(this,this._,this.Backbone)}}(function(v,Q,E){var P="\x09\x0A\x0B\x0C\x0D\x20\xA0\u1680\u180E\u2000\u2001\u2002\u2003\u2004\u2005\u2006\u2007\u2008\u2009\u200A\u202F\u205F\u3000\u2028\u2029\uFEFF";if(!String.prototype.trim||P.trim()){P="["+P+"]";var x=new RegExp("^"+P+P+"*"),p=new RegExp(P+P+"*$");String.prototype.trim=function a(){if(this===undefined||this===null){throw new TypeError("can't convert "+this+" to object")}return String(this).replace(x,"").replace(p,"")}}function F(X,U,T){var W=U-(X+"").length;W=W<0?0:W;var V="";for(var S=0;S<W;S++){V=V+T}return V+X}var C=E.$;var R=v.Backgrid={Extension:{},resolveNameToClass:function(T,V){if(Q.isString(T)){var U=Q.map(T.split("-"),function(W){return W.sl
                Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                File Type:GIF image data, version 89a, 1 x 1
                Category:downloaded
                Size (bytes):35
                Entropy (8bit):2.9302005337813077
                Encrypted:false
                SSDEEP:
                MD5:81144D75B3E69E9AA2FA3E9D83A64D03
                SHA1:F0FBC60B50EDF5B2A0B76E0AA0537B76BF346FFC
                SHA-256:9B9265C69A5CC295D1AB0D04E0273B3677DB1A6216CE2CCF4EFC8C277ED84B39
                SHA-512:2D073E10AE40FDE434EB31CBEDD581A35CD763E51FB7048B88CAA5F949B1E6105E37A228C235BC8976E8DB58ED22149CFCCF83B40CE93A28390566A28975744A
                Malicious:false
                Reputation:unknown
                URL:https://p.typekit.net/p.gif?s=1&k=fqg8osp&ht=tk&h=federalreservebanks.na2.adobesign.com&f=7180.7182.7184.22766&a=717200&js=1.21.0&app=typekit&e=js&_=1728062853414
                Preview:GIF89a.............,..............;
                File type:RFC 822 mail, ASCII text, with very long lines (347), with CRLF line terminators
                Entropy (8bit):5.949536179641154
                TrID:
                • E-Mail message (Var. 5) (54515/1) 100.00%
                File name:phish_alert_iocp_v1.4.48 (15).eml
                File size:27'317 bytes
                MD5:309f769231ed959f0b81b126b6a0f695
                SHA1:c45d17358d2f1c5377263972b1f9fa4cc63aeac4
                SHA256:8869a1f4341b483df37f9611580d623637302b623a1fcfae0fe6c4579fa72893
                SHA512:95954963af9fe149bd92fa40454e121908b6f546aecc0a2a134fe695b4477d334f0eb1b19595a55d6f3c229d6b01ec68c27894e43341ff829548fc9e417d2c14
                SSDEEP:384:XDV/Dx7hIMlfWkEEZuHFkx9jZBRNRwfz1ztqJA83rMNo1Vv6TsMJBJJHIfb11y0A:XJ/N7hIMtWBEZx9jZLNRwb10L6GY
                TLSH:DBC25D934610182BEDB601DC97417D09E361394F9EF3D8E0B6D5600B5F8B96FA3297C9
                File Content Preview:Received: from SA1PR22MB4415.namprd22.prod.outlook.com.. (2603:10b6:806:38a::14) by CH2PR22MB2022.namprd22.prod.outlook.com with.. HTTPS; Fri, 4 Oct 2024 16:48:26 +0000..ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;.. b=bGKSy/
                Subject:Reminder: Waiting for you to sign Security and Resiliency Assurance Program materials for FIRST FEDERAL SAVINGS & LOAN (OR): 323270313
                From:Assurance Program via Adobe Acrobat Sign <adobesign@adobesign.com>
                To:Jordan Herron <JHerron@FirstFedWeb.com>
                Cc:
                BCC:
                Date:Fri, 04 Oct 2024 09:47:02 -0700
                Communications:
                • [EXTERNAL EMAIL: Take caution with links and attachments. ] <https://federalreservebanks.na2.adobesign.com/cobrand_logo/CBNCJCAABACAABAAVq-jF9CZvYh_trqdbADdeIoXDsJZdzV_qWK4iWTD7CLi8KVYW_eUIu7NA2kcsm0oVKkVKhpiwT85pCM02thW0Iw26PH2flXRPtzwxhFkCk_0M6rpLO_vDrTSVDAvxXIv43m4s9tiV4ZhYo7DJtBWaDPzEvjDcANsyZtlm474uAlPgQDziEDXcUOedIPikiZSIAE83W0aNiCxxlYlHPLvCcuRIBYUHsG0EHM77ehpLJiKQOuouWxqa-K22OvBfd78X6qjDsoZviWsaD-DYDE5jx3nKTXgfyiwj8_LP0ky188qWqa8VFBOpIdV2-SCMVZm> <https://federalreservebanks.na2.adobesign.com/track/CBFCIBAA3AAABLblqZhAhIt5J1LST9BCUKrFF4aWhd5PXxwKPE49U02Qeb1gn1mqO07AxHrsrwMmMmM9bVGo*/blank.gif> <https://federalreservebanks.na2.adobesign.com/document/ci/CBSCTBABDUAAABACAABAAhPJIRu82Qp4S_1vO49-zEZAcuRKDTN6A4JNm0xFBsgzer5-5uieUWqntkYenk8hpcdy5EbBdZNGc39Z12BAwLH57qbh_ABYsFM8NQvqmXdw*/small.png> <https://federalreservebanks.na2.adobesign.com/images/email-multipage-stack-right.gif> <https://federalreservebanks.na2.adobesign.com/images/email-multipage-stack-bottom.gif> Please sign Security and Resiliency Assurance Program materials for FIRST FEDERAL SAVINGS & LOAN (OR): 323270313 This is a friendly reminder that your organization's 2024 Assurance Program assessment and attestation is due by end of year; please ensure completion by the deadline. Click here to review and sign Security and Resiliency Assurance Program materials for FIRST FEDERAL SAVINGS & LOAN (OR): 323270313. <https://clicktime.cloud.postoffice.net/clicktime.php?U=https://federalreservebanks.na2.adobesign.com/public/esign%3Ftsid%3DCBFCIBAACBSCTBABDUAAABACAABAAGt69JyuRA5Fss-Bvn1ZI0QQj7cuwfxPKCE_0BucD_stmG5iRWIim3LC1BPGRd37iZ06HQXx7LRM8mkjBtzBiwYjqBa7FfiDLuI1MlO8or6b_ajUHTj3rQd-RWKb4dC9R%26&E=jherron%40firstfedweb.com&X=XID208CJDqWo6587Xd1&T=FF1001&HV=U,E,X,T&H=af11579e943013f5cf298f6c57ae8197f64d22a9> After you sign Security and Resiliency Assurance Program materials for FIRST FEDERAL SAVINGS & LOAN (OR): 323270313, all parties will receive a final PDF copy. Assurance Program has requested that this reminder be sent. This document is available for signing until December 31, 2024 and will expire thereafter. If you have questions, call the Customer Contact Center (CCC) at (888) 333-7010. FedLine is a registered service mark of the Federal Reserve Banks. A list of marks related to financial services products that are offered to financial institutions by the Federal Reserve Banks is available at FRBservices. org. To ensure that you continue receiving our emails, please add adobesign@adobesign.com to your address book or safe list.
                Attachments:
                  Key Value
                  ReceivedFri, 4 Oct 2024 09:48:26 -0700
                  ARC-Seali=1; a=rsa-sha256; d=silversky.com; s=silversky-20150623192408; t=1728060500; cv=none; b=NVHom7UTtEQJ/hcbCTdBEbkKjaj60A3/3HHJRRjOUUtuITNli6KAtWrK+fCiilFeIdNF8begG3bLQOE5rNzagArhFpiiTYbj3YXo5+tg+ZThiTbweSVhheS+LTH0H4EaA/BBzTVWUJpDXsfX8GEPstn4WlObpJyslS8bnxFi4Ko=
                  ARC-Message-Signaturei=1; a=rsa-sha256; d=silversky.com; s=silversky-20150623192408; t=1728060500; c=relaxed/simple; bh=bitjUAg6NZhqMJHQW0sRp7N7nK7jLUjjBLCF8UEuTCY=; h=Date:From:Reply-To:To:Subject; b=Pjl9lVW4jgxu2slvBWgBnG3cNwK+wKOZfmOSeog/uMVNVA07n5LymEqM58sF/s/OltrXoEHf52SGTcKJsRAE26bopgP8w7RSBv8UG71DaifzcE7rwRBSZBjTFXSkfDkK6Jlf+nwCKuvQFF/Y/p78f14fKWS3Rh7oJUfBJpZ/hbo=
                  ARC-Authentication-Resultsi=1; gwsin.silversky.com; dmarc=pass policy.dmarc=none header.from=adobesign.com; dkim=pass header.d=adobesign.com; spf=pass smtp.mailfrom=mail.na2.adobesign.com; arc=none smtp.remote-ip=52.41.255.238
                  authentication-resultsspf=fail (sender IP is 165.212.64.87) smtp.mailfrom=mail.na2.adobesign.com; dkim=fail (body hash did not verify) header.d=adobesign.com;dmarc=fail action=oreject header.from=adobesign.com;compauth=none reason=451
                  received-spfFail (protection.outlook.com: domain of mail.na2.adobesign.com does not designate 165.212.64.87 as permitted sender) receiver=protection.outlook.com; client-ip=165.212.64.87; helo=postin03.mbox.net;
                  X-USANET-Receivedfrom emd1.mbox.net [165.212.64.8] by gws7.mbox.net via mtad (GIT.BUILD.5.0.3133) with ESMTP id 403CJDqWo1920Ms7; Fri, 04 Oct 2024 16:48:14 -0000
                  X-USANET-TAP-Score1
                  Authentication-Results-Originalgwsin.silversky.com; dmarc=pass policy.dmarc=none header.from=adobesign.com; dkim=pass header.d=adobesign.com; spf=pass smtp.mailfrom=mail.na2.adobesign.com; arc=none smtp.remote-ip=52.41.255.238
                  X-USANET-Routed100 IN-RELAY R:gwsin-int:625
                  X-USANET-GWS2-Servicegwsdin-tap preclick-never
                  X-USANET-GWS2-Tenantfirstfedweb.com
                  X-USANET-GWS2-TagidFF1001
                  X-USANET-GWS2-MailFromDnsResultDnsFound
                  X-USANET-GWS2-SecurityTLSv1.2;ECDHE-RSA-AES256-GCM-SHA384
                  X-USANET-Source52.41.255.238 IN bounces@mail.na2.adobesign.com relay.uswest2.utility.echosign.com TLS
                  X-USANET-MsgIdXID208CJDqWo6587Xd1
                  X-BAEAI-Trust-Score93
                  X-BAEAI-Trust-ReasonsSNDRAUTH; SNDRFRG,adobesign@adobesign.com,,sys.assurance.program@frb.org; DOMFRQ,adobesign.com; RCPTVIP;
                  dkim-signaturev=1; a=rsa-sha256; c=relaxed/simple; d=adobesign.com; s=mailv2; t=1728060493; bh=LkBknHmGzg92PTmlbTWzsl0hpKAGN4NQG0KMna7hFhY=; h=Date:From:Reply-To:To:Subject; b=QeA73chR7dvWacvYwctPfKcoPXWomJ0TSy2+tzNKnaPCnlK+8YN+L9NZJji5BIGK4 UmjbETgEgP3wdQPWzhi9rCp5mSKCNlXVeXvqEDJX0gwd1wIeYUabCZu7wse5bQl1HX K+09L57Sliaa87xSMNCy6yUgFAmbNwEgamnKJrUsT2pq+a5SemjBS4/6ffH0bhKsdx hpojVY9e2XvKi5ObirbNHlwuMLDqLa1x44Ln3Bd3+fTnNIxo+6W2zzFtR6kUEvgM8k oTQgEWyZ/ANnlH24wA0FOiNrPmeaAPh5Pi48+ml5gg/DsQ2rfbL90aNx23KrKoiPV6 y+AVuz0ZndEDg==
                  X-EchoSign-BounceCBJCHBCAABAAAKedidrtq8Bftu7mtweZV__BzjM56iiI
                  X-EchoSign-Template reminder/reminderNextToESign.vm:en_US:40000015103469886
                  X-Cloudmark-Trackerv=2.4 cv=bpaHB1ai c=1 sm=1 tr=0 ts=67001c50 b=1 cx=a_idp_d a=vJByWGGFcaNgGtBuHXKwyQ==:117 a=vJByWGGFcaNgGtBuHXKwyQ==:17 a=MPnNMkKPenitHNjb:21 a=DAUX931o1VcA:10 a=JNcNm-BlylYA:10 a=SSmOFEACAAAA:8 a=0JOdXx76AAAA:8 a=LiKuy9J89cNmgSgdBDoA:9 a=s7EmJUqGDgciYXyB:21 a=frz4AuCg-hUA:10 a=_W_S_7VecoQA:10 a=QEXdDO2ut3YA:10 a=QW4Nquze9pOMQ_30Avnz:22 a=9edjaMZQKPUJtIpeB-Tj:22 awl=host:3127
                  X-LASED-VersionAntispam-Engine: 5.1.4, AntispamData: 2024.10.4.161216
                  X-LASED-SpamProbability0.085099
                  X-LASED-SpamNonSpam
                  X-LASED-HitsBODYTEXTH_SIZE_10000_LESS 0.000000, BODYTEXTH_SIZE_3000_MORE 0.000000, BODY_SIZE_8000_8999 0.000000, DATE_TZ_NA 0.000000, DKIM_ALIGNS 0.000000, DKIM_SIGNATURE 0.000000, FROM_NAME_PHRASE 0.000000, HREF_LABEL_TEXT_NO_URI 0.000000, HREF_LABEL_TEXT_ONLY 0.000000, HTML_70_90 0.100000, KNOWN_MTA_TFX 0.000000, LINK_TO_IMAGE 0.000000, MIME_HTML_ONLY_MP_MIXED 0.050000, OBFUSCATION 0.000000, OEM_SOFTWARE_X1 0.000000, REPLYTO_FROM_DIFF_ADDY 0.100000, SENDER_NO_AUTH 0.000000, SINGLE_HREF_URI_IN_BODY 0.000000, SINGLE_URI_IN_BODY 0.000000, SXL_IP_TFX_WM 0.000000, URI_WITH_PATH_ONLY 0.000000, __ANY_URI 0.000000, __ATTACH_CTE_QUOTED_PRINTABLE 0.000000, __BODY_NO_MAILTO 0.000000, __BODY_TEXT_X4 0.000000, __CLICK_HERE 0.000000, __CP_MEDIA_BODY 0.000000, __CP_URI_IN_BODY 0.000000, __CT 0.000000, __CTYPE_HAS_BOUNDARY 0.000000, __CTYPE_MULTIPART 0.000000, __CTYPE_MULTIPART_MIXED 0.000000, __DKIM_ALIGNS_1 0.000000, __DKIM_ALIGNS_2 0.000000, __FRAUD_CONTACT_ADDY 0.000000, __FROM_3RD_PARTY 0.000000, __FROM_NAME_NOT_IN_BODY 0.000000, __FUR_HEADER 0.000000, __HAS_FROM 0.000000, __HAS_HTML 0.000000, __HAS_MSGID 0.000000, __HAS_REPLYTO 0.000000, __HIDDEN_HTML_CONTENT 0.000000, __HREF_LABEL_TEXT 0.000000, __HTML_AHREF_TAG 0.000000, __HTML_BOLD 0.000000, __HTML_FONT_RED 0.000000, __HTML_TAG_CENTER 0.000000, __HTML_TAG_DIV 0.000000, __HTML_TAG_IMG_X2 0.000000, __HTML_TAG_IMG_X5 0.000000, __HTML_TAG_TABLE 0.000000, __HTTPS_URI 0.000000, __HTTP_IMAGE_TAG 0.000000, __IMG_THEN_TEXT 0.000000, __IMP_FROM_IN_EXCLUSION_LIST 0.000000, __MIME_HTML 0.000000, __MIME_HTML_ONLY 0.000000, __MIME_TEXT_H 0.000000, __MIME_TEXT_H1 0.000000, __MIME_TEXT_H2 0.000000, __MIME_VERSION 0.000000, __MSGID_DOMAIN_NOT_IN_HDRS 0.000000, __MSGID_HOMEUSER 0.000000, __MULTIPLE_URI_TEXT 0.000000, __OEM_SOFTWARE_2 0.000000, __PART_TYPE_HTML 0.000000, __PHISH_SPEAR_SUBJECT 0.000000, __PHISH_SPEAR_SUBJ_PREDICATE 0.000000, __PHISH_SPEAR_SUBJ_SUBJECT 0.000000, __SANE_MSGID 0.000000, __SINGLE_URI_MPART_HTML 0.000000, __STOCK_PHRASE_7 0.000000, __STYLE_RATWARE_NEG 0.000000, __STYLE_TAG 0.000000, __TAG_EXISTS_BODY 0.000000, __TAG_EXISTS_HEAD 0.000000, __TAG_EXISTS_HTML 0.000000, __TOLL_FREE_PHONE_US 0.000000, __TO_MALFORMED_2 0.000000, __TO_NAME 0.000000, __TO_NAME_DIFF_FROM_ACC 0.000000, __TO_REAL_NAMES 0.000000, __URI_HAS_HYPHEN_USC 0.000000, __URI_IN_BODY 0.000000, __URI_MAILTO 0.000000, __URI_NOT_IMG 0.000000, __URI_NO_WWW 0.000000, __URI_NS 0.000000, __URI_WITH_PATH 0.000000
                  X-LASED-ImpersonationFalse
                  X-Sophos-Tracker0.085099 bfb0ee3c8852d78c874a4cf0dae76c4778ec8c5d
                  X-BAEAI-Source-GeoIP"US" "Oregon" "Boardman"
                  X-BAEAI-SPFPASS
                  X-BAEAI-DKIMPASS
                  X-BAEAI-DMARCpass
                  X-SilverSky-ARCnone
                  X-BAEAI-Authentication-Ratingstrong
                  X-BAEAI-Trust-Levelgreen
                  Return-Pathbounces@mail.na2.adobesign.com
                  X-MS-Exchange-Organization-ExpirationStartTime04 Oct 2024 16:48:21.8710 (UTC)
                  X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                  X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                  X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                  X-MS-Exchange-Organization-Network-Message-Id ec798870-fbb1-4baa-626d-08dce4945b5a
                  X-EOPAttributedMessage0
                  X-EOPTenantAttributedMessage3778f0b2-789a-4d43-b25e-d4fe25a4c3c0:0
                  X-MS-Exchange-Organization-MessageDirectionalityIncoming
                  x-ms-publictraffictypeEmail
                  X-MS-TrafficTypeDiagnostic CO1PEPF000044F4:EE_|SA1PR22MB4415:EE_|CH2PR22MB2022:EE_
                  x-ms-exchange-organization-authsource CO1PEPF000044F4.namprd05.prod.outlook.com
                  x-ms-exchange-organization-authasAnonymous
                  X-MS-Office365-Filtering-Correlation-Id ec798870-fbb1-4baa-626d-08dce4945b5a
                  X-MS-Exchange-AtpMessagePropertiesSA|SL
                  X-MS-Exchange-Organization-SCL-1
                  X-MS-Exchange-Organization-BypassClutter$true
                  X-Microsoft-Antispam BCL:0;ARA:13230040|3092899012|3072899012|82310400026|12012899012|2092899012|4092899012|5062899012|13012899012|13102899012|6062899009|5082899009|5073199012|69100299015|8142799012;
                  x-forefront-antispam-report CIP:165.212.64.87;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:NSPM;H:postin03.mbox.net;PTR:postin03.mbox.net;CAT:NONE;SFS:(13230040)(3092899012)(3072899012)(82310400026)(12012899012)(2092899012)(4092899012)(5062899012)(13012899012)(13102899012)(6062899009)(5082899009)(5073199012)(69100299015)(8142799012);DIR:INB;
                  X-MS-Exchange-CrossTenant-OriginalArrivalTime04 Oct 2024 16:48:21.7148 (UTC)
                  X-MS-Exchange-CrossTenant-Network-Message-Id ec798870-fbb1-4baa-626d-08dce4945b5a
                  X-MS-Exchange-CrossTenant-Id3778f0b2-789a-4d43-b25e-d4fe25a4c3c0
                  X-MS-Exchange-CrossTenant-AuthSource CO1PEPF000044F4.namprd05.prod.outlook.com
                  X-MS-Exchange-CrossTenant-AuthAsAnonymous
                  X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                  X-MS-Exchange-Transport-CrossTenantHeadersStampedSA1PR22MB4415
                  X-MS-Exchange-Transport-EndToEndLatency00:00:04.5696093
                  X-MS-Exchange-Processed-By-BccFoldering15.20.8026.019
                  X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
                  X-Microsoft-Antispam-Message-Info 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
                  x-ms-exchange-organization-originalclientipaddress165.212.64.87
                  x-ms-exchange-organization-originalserveripaddress10.167.241.74
                  X-Priority3
                  X-MSMail-PriorityNormal
                  Thread-IndexAQHbFn07nnfdNOXRhEq0Wx+QMBx+bg==
                  Message-ID <1156113907.1119594.1728060422918@webapp-prod-a-34.webapp-prod-a.ns-team-sign-core-prod.svc.cluster.local>
                  FromAssurance Program via Adobe Acrobat Sign <adobesign@adobesign.com>
                  ToJordan Herron <JHerron@FirstFedWeb.com>
                  SubjectReminder: Waiting for you to sign Security and Resiliency Assurance Program materials for FIRST FEDERAL SAVINGS & LOAN (OR): 323270313
                  DateFri, 04 Oct 2024 09:47:02 -0700
                  Reply-ToAssurance Program <sys.assurance.program@frb.org>
                  MIME-Version1.0
                  Content-typeMultipart/alternative; charset="utf-8"; boundary="00B0FEED_message_boundary"
                  Content-DescriptionMultipart message

                  Icon Hash:46070c0a8e0c67d6