Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
John Garby.eml

Overview

General Information

Sample name:John Garby.eml
Analysis ID:1540227
MD5:4089c8345685b82eca6a96828e6a9f77
SHA1:5264f43ae46f9867d0d87e744e32742d5cbfe8fc
SHA256:2e3f747cf12a29db06f0e9883fdb512185078c0088eed21370325678e19ac57c
Infos:

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

AI detected potential phishing Email
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Stores large binary data to the registry

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 4880 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\John Garby.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 6580 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "71E62F43-4037-4074-8577-B1B23D5E6097" "34F605BC-11FC-4DA2-BEDD-E779C32D2686" "4880" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • Acrobat.exe (PID: 428 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\162Z7WQ3\JohnGarby.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 6912 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 5712 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2260 --field-trial-handle=1556,i,17499574801468197080,10624922083168603172,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 4880, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
Source: Registry Key setAuthor: frack113: Data: Details: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\162Z7WQ3\, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 4880, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Security\OutlookSecureTempFolder
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: x1.i.lencr.org
Source: 77EC63BDA74BD0D0E0426DC8F80085060.10.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: 2D85F72862B55C4EADD9E66E06947F3D0.10.drString found in binary or memory: http://x1.i.lencr.org/
Source: e1016917-5c58-40b2-8e56-cb83e1723b39.tmp.11.dr, 229e5e5f-5af4-436a-918f-f8cd2f15ec81.tmp.11.drString found in binary or memory: https://chrome.cloudflare-dns.com
Source: OUTLOOK_16_0_16827_20130-20241023T0926170653-4880.etl.4.drString found in binary or memory: https://login.windows.localnull
Source: classification engineClassification label: sus22.winEML@19/48@1/0
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmpJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241023T0926170653-4880.etlJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\John Garby.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "71E62F43-4037-4074-8577-B1B23D5E6097" "34F605BC-11FC-4DA2-BEDD-E779C32D2686" "4880" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\162Z7WQ3\JohnGarby.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2260 --field-trial-handle=1556,i,17499574801468197080,10624922083168603172,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "71E62F43-4037-4074-8577-B1B23D5E6097" "34F605BC-11FC-4DA2-BEDD-E779C32D2686" "4880" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\162Z7WQ3\JohnGarby.pdf"Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2260 --field-trial-handle=1556,i,17499574801468197080,10624922083168603172,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior

Persistence and Installation Behavior

barindex
Source: EmailLLM: Detected potential phishing email: The email contains minimal content and lacks a clear purpose or message
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ExperimentConfigs\Ecs\outlook\ConfigContextData 1Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformationJump to behavior
Source: John Garby.emlBinary or memory string: IC9BZG9iZS1JZGVudGl0eS1VQ1MgZGVmCi9DTWFwVHlwZSAyIGRlZgoxIGJlZ2luY29kZXNwYWNl
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Modify Registry
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS14
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1540227 Sample: John Garby.eml Startdate: 23/10/2024 Architecture: WINDOWS Score: 22 26 x1.i.lencr.org 2->26 28 AI detected potential phishing Email 2->28 9 OUTLOOK.EXE 508 131 2->9         started        signatures3 process4 file5 20 C:\...\~Outlook Data File - NoEmail.pst.tmp, data 9->20 dropped 22 C:\Users\...\Outlook Data File - NoEmail.pst, Microsoft 9->22 dropped 24 C:\Users\user\AppData\Roaming\...24oEmail.srs, Composite 9->24 dropped 12 Acrobat.exe 60 9->12         started        14 ai.exe 9->14         started        process6 process7 16 AcroCEF.exe 108 12->16         started        process8 18 AcroCEF.exe 16->18         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://chrome.cloudflare-dns.com0%URL Reputationsafe
http://x1.i.lencr.org/0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
x1.i.lencr.org
unknown
unknownfalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://chrome.cloudflare-dns.come1016917-5c58-40b2-8e56-cb83e1723b39.tmp.11.dr, 229e5e5f-5af4-436a-918f-f8cd2f15ec81.tmp.11.drfalse
    • URL Reputation: safe
    unknown
    https://login.windows.localnullOUTLOOK_16_0_16827_20130-20241023T0926170653-4880.etl.4.drfalse
      unknown
      http://x1.i.lencr.org/2D85F72862B55C4EADD9E66E06947F3D0.10.drfalse
      • URL Reputation: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1540227
      Start date and time:2024-10-23 15:25:42 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 20s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsinteractivecookbook.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:17
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:John Garby.eml
      Detection:SUS
      Classification:sus22.winEML@19/48@1/0
      Cookbook Comments:
      • Found application associated with file extension: .eml
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 93.184.221.240, 184.28.90.27, 52.113.194.132, 52.109.68.129, 2.19.126.151, 2.19.126.160, 52.182.143.213, 52.109.28.48, 184.28.88.176, 52.202.204.11, 54.227.187.23, 52.5.13.197, 23.22.254.206, 162.159.61.3, 172.64.41.3, 2.23.197.184, 88.221.168.141, 2.19.126.149, 2.19.126.143, 2.19.126.137, 2.19.126.163
      • Excluded domains from analysis (whitelisted): osiprod-uks-bronze-azsc-000.uksouth.cloudapp.azure.com, odc.officeapps.live.com, slscr.update.microsoft.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, acroipm2.adobe.com, onedscolprdcus16.centralus.cloudapp.azure.com, login.live.com, ssl-delivery.adobe.com.edgekey.net, e16604.g.akamaiedge.net, a122.dscd.akamai.net, hlb.apr-52dd2-0.edgecastdns.net, frc-azsc-000.roaming.officeapps.live.com, wu-b-net.trafficmanager.net, a1864.dscd.akamai.net, ecs.office.com, fs.microsoft.com, acroipm2.adobe.com.edgesuite.net, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, ssl.adobe.com.edgekey.net, uks-azsc-000.odc.officeapps.live.com, s-0005.s-msedge.net, ecs.office.trafficmanager.net, geo2.adobe.com, omex.cdn.office.net, e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, e8652.dscx.akamaiedge.net, europe.odcsm1.live.com.akadns.net, e4578.dscb.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, eur.roaming1.live.c
      • Not all processes where analyzed, report is missing behavior information
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size getting too big, too many NtQueryAttributesFile calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtSetValueKey calls found.
      • VT rate limit hit for: John Garby.eml
      TimeTypeDescription
      09:26:56API Interceptor2x Sleep call for process: AcroCEF.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:ASCII text
      Category:dropped
      Size (bytes):287
      Entropy (8bit):5.235208415638447
      Encrypted:false
      SSDEEP:6:SFd9+q2PRN2nKuAl9OmbnIFUt85F0VZmw+5F05VkwORN2nKuAl9OmbjLJ:44vaHAahFUt8kV/+kH5JHAaSJ
      MD5:4732B928F2B0B87D56A619C119EBC74A
      SHA1:1E447BE15BECFDD4196B9A1948CB571FF4BB73E5
      SHA-256:EF52AB778F33BC885142DC8C8563BDCFEB6080D2D0C45A76BD66B3BC4908115A
      SHA-512:07C626652E5859528E2C77E5573666F90EBF3ADB781980398D6E5B0242A1C01651365EE34B186D287EC80A48810FA782A3ABF81B28844511965D4D041E895D4B
      Malicious:false
      Reputation:low
      Preview:2024/10/23-09:26:43.516 628 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/10/23-09:26:43.519 628 Recovering log #3.2024/10/23-09:26:43.519 628 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:ASCII text
      Category:dropped
      Size (bytes):287
      Entropy (8bit):5.235208415638447
      Encrypted:false
      SSDEEP:6:SFd9+q2PRN2nKuAl9OmbnIFUt85F0VZmw+5F05VkwORN2nKuAl9OmbjLJ:44vaHAahFUt8kV/+kH5JHAaSJ
      MD5:4732B928F2B0B87D56A619C119EBC74A
      SHA1:1E447BE15BECFDD4196B9A1948CB571FF4BB73E5
      SHA-256:EF52AB778F33BC885142DC8C8563BDCFEB6080D2D0C45A76BD66B3BC4908115A
      SHA-512:07C626652E5859528E2C77E5573666F90EBF3ADB781980398D6E5B0242A1C01651365EE34B186D287EC80A48810FA782A3ABF81B28844511965D4D041E895D4B
      Malicious:false
      Reputation:low
      Preview:2024/10/23-09:26:43.516 628 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/10/23-09:26:43.519 628 Recovering log #3.2024/10/23-09:26:43.519 628 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:ASCII text
      Category:dropped
      Size (bytes):334
      Entropy (8bit):5.174189740658573
      Encrypted:false
      SSDEEP:6:S5dKVq2PRN2nKuAl9Ombzo2jMGIFUt850gZmw+50IkwORN2nKuAl9Ombzo2jMmLJ:zvaHAa8uFUt83/+l5JHAa8RJ
      MD5:EF787EB21BAE08B7A9002CB02EAE22D5
      SHA1:6B655BC9E4E6CDB21EE2DC4ED3F00EEF7DFFDFB5
      SHA-256:834E2285612E5DD00552A07D348B6AFAF75B7B4EBC7FC281CDF7837521EA0B8D
      SHA-512:B17CE31087CEE6A5E405242776A2D228779038ED1183B4579034C135E73C0D11C9E138C3E475FAF6BA310DA3EB6F3E6720448470693976F82FCF5FB4B726DCAB
      Malicious:false
      Reputation:low
      Preview:2024/10/23-09:26:43.378 14c4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/10/23-09:26:43.383 14c4 Recovering log #3.2024/10/23-09:26:43.383 14c4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:ASCII text
      Category:dropped
      Size (bytes):334
      Entropy (8bit):5.174189740658573
      Encrypted:false
      SSDEEP:6:S5dKVq2PRN2nKuAl9Ombzo2jMGIFUt850gZmw+50IkwORN2nKuAl9Ombzo2jMmLJ:zvaHAa8uFUt83/+l5JHAa8RJ
      MD5:EF787EB21BAE08B7A9002CB02EAE22D5
      SHA1:6B655BC9E4E6CDB21EE2DC4ED3F00EEF7DFFDFB5
      SHA-256:834E2285612E5DD00552A07D348B6AFAF75B7B4EBC7FC281CDF7837521EA0B8D
      SHA-512:B17CE31087CEE6A5E405242776A2D228779038ED1183B4579034C135E73C0D11C9E138C3E475FAF6BA310DA3EB6F3E6720448470693976F82FCF5FB4B726DCAB
      Malicious:false
      Reputation:low
      Preview:2024/10/23-09:26:43.378 14c4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/10/23-09:26:43.383 14c4 Recovering log #3.2024/10/23-09:26:43.383 14c4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:JSON data
      Category:dropped
      Size (bytes):403
      Entropy (8bit):4.953858338552356
      Encrypted:false
      SSDEEP:12:YHO8sq/WLksBdOg2H9caq3QYiubrP7E4T3y:YXsRJdMHM3QYhbz7nby
      MD5:4C313FE514B5F4E7E89329630909F8DC
      SHA1:916EED77EC8C9DC90C64FF1E5CC9D04D4674EE56
      SHA-256:1EE7C151EF264F91FCDCCB6644F62DC33E27A4E829DAAB748DA1DE4426400873
      SHA-512:1726CAFCBA0121691DFA87A7298E6610BC4C7FD900867FD1B1710811E764918585E56788E08B7CA2CEE001F5DFD110E1BE6F6BBD7C2A7B7E2FC87D3DED210205
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341145152835463","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":144284},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:JSON data
      Category:dropped
      Size (bytes):403
      Entropy (8bit):4.953858338552356
      Encrypted:false
      SSDEEP:12:YHO8sq/WLksBdOg2H9caq3QYiubrP7E4T3y:YXsRJdMHM3QYhbz7nby
      MD5:4C313FE514B5F4E7E89329630909F8DC
      SHA1:916EED77EC8C9DC90C64FF1E5CC9D04D4674EE56
      SHA-256:1EE7C151EF264F91FCDCCB6644F62DC33E27A4E829DAAB748DA1DE4426400873
      SHA-512:1726CAFCBA0121691DFA87A7298E6610BC4C7FD900867FD1B1710811E764918585E56788E08B7CA2CEE001F5DFD110E1BE6F6BBD7C2A7B7E2FC87D3DED210205
      Malicious:false
      Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341145152835463","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":144284},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:JSON data
      Category:dropped
      Size (bytes):403
      Entropy (8bit):4.953858338552356
      Encrypted:false
      SSDEEP:12:YHO8sq/WLksBdOg2H9caq3QYiubrP7E4T3y:YXsRJdMHM3QYhbz7nby
      MD5:4C313FE514B5F4E7E89329630909F8DC
      SHA1:916EED77EC8C9DC90C64FF1E5CC9D04D4674EE56
      SHA-256:1EE7C151EF264F91FCDCCB6644F62DC33E27A4E829DAAB748DA1DE4426400873
      SHA-512:1726CAFCBA0121691DFA87A7298E6610BC4C7FD900867FD1B1710811E764918585E56788E08B7CA2CEE001F5DFD110E1BE6F6BBD7C2A7B7E2FC87D3DED210205
      Malicious:false
      Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341145152835463","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":144284},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:JSON data
      Category:modified
      Size (bytes):403
      Entropy (8bit):4.989006718295236
      Encrypted:false
      SSDEEP:12:YHO8sq7UxsBdOg2HtOtcaq3QYiubrP7E4T3y:YXswdMHl3QYhbz7nby
      MD5:E5E017D1D0E1E4B524919C863E74609D
      SHA1:197D55C9A4DCC2607BF053ACB69205715BCAB640
      SHA-256:D5C76B61D4B14EA719CCBF4F3E43889CEB9C05085065639B5C46DD6DE2619938
      SHA-512:26593FA847C7914F00C85F77A013E148E22ACF16F82CD5161D3F2475D00DAF53FE1787BF1B2750B54B8E8582C50DB45954550FDF31063CBC2415283FA5C3D44E
      Malicious:false
      Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13374250009179711","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":271233},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:data
      Category:dropped
      Size (bytes):4099
      Entropy (8bit):5.233415390247413
      Encrypted:false
      SSDEEP:96:OLSw0bSwIAnrRqLX2rSq1OUxu/0OZ0xRBTxekN8xeHM/Wr9m:OLT0bTIeYa51Ogu/0OZARBT8kN88s/Qs
      MD5:7BDDEA1CEA094CCDDDA9A03C812BE9B8
      SHA1:C4FB64B01B4984958A06A459618DD81096967B00
      SHA-256:5BEE8E266E87AAF5B9F8D1367C579D95D9C835D0DD17D494886BB2A342821381
      SHA-512:F5C599FCAAFBF93ADAAF0AA012011756B18DE1B08D691F071383C6B00C40E575CE5B428B039013FA86CCE5AC8FE22132D5FB4BE63D9E3D71ABBA1E308CEAEDA9
      Malicious:false
      Preview:*...#................version.1..namespace-e...o................next-map-id.1.Pnamespace-1d95df23_a38f_44a8_b732_4e62dd896a16-https://rna-resource.acrobat.com/.0y.S_r................next-map-id.2.Snamespace-2a884c18_b39c_4e3d_942f_252e530ca4bd-https://rna-v2-resource.acrobat.com/.16.X:r................next-map-id.3.Snamespace-2e78bfda_7188_4688_a4aa_1ff81b6e5eaa-https://rna-v2-resource.acrobat.com/.2.P.@o................next-map-id.4.Pnamespace-09c119c2_97bc_4467_8f67_f92472c9e5dc-https://rna-resource.acrobat.com/.346.+^...............Pnamespace-1d95df23_a38f_44a8_b732_4e62dd896a16-https://rna-resource.acrobat.com/....^...............Pnamespace-09c119c2_97bc_4467_8f67_f92472c9e5dc-https://rna-resource.acrobat.com/..?&a...............Snamespace-2a884c18_b39c_4e3d_942f_252e530ca4bd-https://rna-v2-resource.acrobat.com/_...a...............Snamespace-2e78bfda_7188_4688_a4aa_1ff81b6e5eaa-https://rna-v2-resource.acrobat.com/...o................next-map-id.5.Pnamespace-07af9ee9_2076_4f12_94b5_
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:ASCII text
      Category:dropped
      Size (bytes):322
      Entropy (8bit):5.203524384678868
      Encrypted:false
      SSDEEP:6:Sy0Vq2PRN2nKuAl9OmbzNMxIFUt85TuXgZmw+5RepIkwORN2nKuAl9OmbzNMFLJ:+vaHAa8jFUt8lv/+95JHAa84J
      MD5:8025F7D839906B784976613D418DE638
      SHA1:D176A456703C05F8787C6D6700E3A5131831A375
      SHA-256:90D3B5BD1F5A072675AD4303FCD7C312C98533D6EDE385EB4E69F9E1FC462D25
      SHA-512:9CD315F2ED9FA87B8B64F428830258493DCFD28D20407F388623FAC4180ECF402436083FFC99E4FF27EF5299B6AEB1A4192D6EA59B66F6433A01A8E84C2772B8
      Malicious:false
      Preview:2024/10/23-09:26:43.562 14c4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/10/23-09:26:43.565 14c4 Recovering log #3.2024/10/23-09:26:43.567 14c4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:ASCII text
      Category:dropped
      Size (bytes):322
      Entropy (8bit):5.203524384678868
      Encrypted:false
      SSDEEP:6:Sy0Vq2PRN2nKuAl9OmbzNMxIFUt85TuXgZmw+5RepIkwORN2nKuAl9OmbzNMFLJ:+vaHAa8jFUt8lv/+95JHAa84J
      MD5:8025F7D839906B784976613D418DE638
      SHA1:D176A456703C05F8787C6D6700E3A5131831A375
      SHA-256:90D3B5BD1F5A072675AD4303FCD7C312C98533D6EDE385EB4E69F9E1FC462D25
      SHA-512:9CD315F2ED9FA87B8B64F428830258493DCFD28D20407F388623FAC4180ECF402436083FFC99E4FF27EF5299B6AEB1A4192D6EA59B66F6433A01A8E84C2772B8
      Malicious:false
      Preview:2024/10/23-09:26:43.562 14c4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/10/23-09:26:43.565 14c4 Recovering log #3.2024/10/23-09:26:43.567 14c4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
      File Type:PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
      Category:dropped
      Size (bytes):65110
      Entropy (8bit):2.4850795201206743
      Encrypted:false
      SSDEEP:384:WRvfez1LNN9KgeE1qKyaaZ0MLeIFVzzHMUwrPBWn6/I:CXe9cRE1hHaZ0MLeydDMr5WneI
      MD5:6B3C6E0080656AFF405717A8D76CA98B
      SHA1:72AA34F23DB11F913F44FB4B6D0B74701F3A9017
      SHA-256:7D83BA669A81842C6DE26C35277C37EFC423CBA4AAB10209655B8EC09D0C2A80
      SHA-512:7776360488A660C6D87BC053C3B2F489149102B701B7B2884DD11DFA99549FE41159FD0FC73779708697BEABF4FA9FB8DB146A1BA41233485E520212C1B1C158
      Malicious:false
      Preview:BMV.......6...(...k...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
      File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 2, database pages 14, cookie 0x5, schema 4, UTF-8, version-valid-for 2
      Category:dropped
      Size (bytes):57344
      Entropy (8bit):3.291927920232006
      Encrypted:false
      SSDEEP:192:vedRBvVui5V4R4dcQ5V4R4RtYWtEV2UUTTchqGp8F/7/z+FP:veBci5H5FY+EUUUTTcHqFzqFP
      MD5:A4D5FECEFE05F21D6F81ACF4D9A788CF
      SHA1:1A9AC236C80F2A2809F7DE374072E2FCCA5A775C
      SHA-256:83BE4623D80FFB402FBDEC4125671DF532845A3828A1B378D99BD243A4FD8FF2
      SHA-512:FF106C6B9E1EA4B1F3E3AB01FAEA21BA24A885E63DDF0C36EB0A8C3C89A9430FE676039C076C50D7C46DC4E809F6A7E35A4BFED64D9033FEBD6121AC547AA5E9
      Malicious:false
      Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
      File Type:SQLite Rollback Journal
      Category:dropped
      Size (bytes):16928
      Entropy (8bit):1.2157987320354984
      Encrypted:false
      SSDEEP:48:7MxaRqLmFTIF3XmHjBoGGR+jMz+LhPkzn:7zRf9IVXEBodRBkJkzn
      MD5:A00239533F04FCE7638CD3FB815A03D7
      SHA1:AC80ED62FAB8896E339D24D4271A455646B5976B
      SHA-256:37D176204ED0BA11635E5710411BFBCE4BAFE979FAF8E1BA7BB9E0CAB41D569C
      SHA-512:19F971E9EB22568CA2BAD8869DFA21FB6B7CA311F7814C93EA10DC0E752A11D4325A4BA8F9DF054B0F35DEF7837706B39958F129D146563C3E2806014C41C879
      Malicious:false
      Preview:.... .c................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:Certificate, Version=3
      Category:dropped
      Size (bytes):1391
      Entropy (8bit):7.705940075877404
      Encrypted:false
      SSDEEP:24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
      MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
      SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
      SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
      SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
      Malicious:false
      Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
      Category:dropped
      Size (bytes):71954
      Entropy (8bit):7.996617769952133
      Encrypted:true
      SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
      MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
      SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
      SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
      SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
      Malicious:false
      Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:data
      Category:dropped
      Size (bytes):192
      Entropy (8bit):2.756901573172974
      Encrypted:false
      SSDEEP:3:kkFklMye7+kXfllXlE/HT8kWvNNX8RolJuRdxLlGB9lQRYwpDdt:kKVyK6T8PVNMa8RdWBwRd
      MD5:ECB940678B60D39E5C6BB2171DBFCA4D
      SHA1:54FF23A8594D6B83498168743231EFB00CCE094F
      SHA-256:A98036E6A81FAAF0C1B33E8A58228E6A4F22668C515CE9CF0A8DB5ED373F0789
      SHA-512:1FACED71372D4103A1351F52D650DC6829AFBF12BCB3029EF78A1A1CFB0C951C324774766E8E5AF9BE0ACE2CE2A4ABED40060B8FDA49F871887D206F3B33C85E
      Malicious:false
      Preview:p...... .........Y.;O%..(....................................................... ..........W....-...............o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:data
      Category:modified
      Size (bytes):328
      Entropy (8bit):3.150184159866505
      Encrypted:false
      SSDEEP:6:kKr6kT9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:2DnLNkPlE99SNxAhUe/3
      MD5:00A8202CCB63CE268072B0BB22DD2E4F
      SHA1:73D5A54FC08B46BBAEBBA1EC03C37C06447A7F24
      SHA-256:165B6BA86815696454DD1F7477C80E77746F51A1B9EB11A01A414912CBA3A0E6
      SHA-512:C2CF23F584EBE8B2B30ECFAFC007F830B692502D6AE89009758AD25624590DC158CD10731B34EAF0AC1E4DB6AF88C95129657819753AF80895A1907A2035FA94
      Malicious:false
      Preview:p...... ...........MO%..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
      File Type:data
      Category:dropped
      Size (bytes):4
      Entropy (8bit):0.8112781244591328
      Encrypted:false
      SSDEEP:3:e:e
      MD5:DC84B0D741E5BEAE8070013ADDCC8C28
      SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
      SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
      SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
      Malicious:false
      Preview:....
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
      File Type:JSON data
      Category:dropped
      Size (bytes):2145
      Entropy (8bit):5.0809801947415885
      Encrypted:false
      SSDEEP:48:YwAiESAuYCjWbj2CjxjZ4oijxi+0jPjrVbjBgajF:lDWP2ERaTx3y7BPBgMF
      MD5:65E3D94A8ADA7EF3776AB2E7786F59EF
      SHA1:7BBE21085879F57893068404ADC8DA3FBE258A61
      SHA-256:6261A48163D4754A658ECBFEACC11AB315F3894F4E141CEC060EFFA440BE61D8
      SHA-512:8543ADD5614750D74F1A92D94F23AD705BAE02E99AAD4DBA8D4DFCD09E30D799A44A58B9B5A1DF1CCFE30A12806A5358CFE9A70FA88A04F332CD16D2B4D9CC76
      Malicious:false
      Preview:{"all":[{"id":"TESTING","info":{"dg":"DG","sid":"TESTING"},"mimeType":"file","size":4,"ts":1729690005000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"f44756c6e08822e64c0e471a2499e34d","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1696585148000},{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"e8f53b6740aba22a83a1a569cebedbcc","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":1250,"ts":1696585148000},{"id":"DC_FirstMile_Right_Sec_Surface","info":{"dg":"cc1faa6a0c714f2f0c497731f1772fa2","sid":"DC_FirstMile_Right_Sec_Surface"},"mimeType":"file","size":294,"ts":1696585143000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"ab062dea95f25ef019cc2f5f5f0121d4","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1250,"ts":1696583346000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"65580efad4bc88b91040ff50d71bfae9","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1255,"ts":1696583346000},{"id":"DC_Reader_Edit_LHP_Banner"
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
      File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
      Category:dropped
      Size (bytes):12288
      Entropy (8bit):0.9896272906362629
      Encrypted:false
      SSDEEP:24:TLHRx/XYKQvGJF7urs67Y9QmQ6QewIcLESiAie4F:TVl2GL7ms67YXtr/cI8I
      MD5:185EFBA54596C39AD81D874436C1ED04
      SHA1:D3F9B31F382930B43C300C39421BE80CBF3BACE9
      SHA-256:906443E5DE5C000BAA4CEFA52AC83B3840E20547FB3FDBB623BC1F714D27C026
      SHA-512:25F3295E3145A6663CEB227580AB64083F67B326ABF42202E719C54F04AE653E3AC57FECD266F65040AB92AE16E28CAE2DF070C5B71FCA17D237CA7F68B2B7DD
      Malicious:false
      Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
      File Type:SQLite Rollback Journal
      Category:dropped
      Size (bytes):8720
      Entropy (8bit):1.345312568520325
      Encrypted:false
      SSDEEP:24:7+tNASY9QmQ6Qew7cLESiAi0mY9QfqqLBx/XYKQvGJF7ursi:7MNlYXtrMcI8KYvqll2GL7msi
      MD5:50EF01B594130CD32A745794A22EEAB5
      SHA1:031C8DCAC75003ED5EE3DCAA6276A10CB6FF4373
      SHA-256:6ABFC32F5EA05E37A640F7C0C25D4DA0A0FCFCED4B16DB94DAC248DCD1CC99DF
      SHA-512:2C0140CAEDBDB2C55C530F1ABCD1AEA0CCD3397F7AEEF67B6DD581665FC6159CEEC67FC2C1EB5D8EC1370148376BB5D3CF6D18A0CA2AA6C7AD6C2E023802473A
      Malicious:false
      Preview:.... .c.......$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j...#..#.#.#.#.#.#.#.#.7.7........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:data
      Category:dropped
      Size (bytes):231348
      Entropy (8bit):4.386717810715149
      Encrypted:false
      SSDEEP:1536:JIYLzYgsHsg0xwVmkgsb1NcAz79ysQqt2jpTkqoQFIrcm0FvHYNyn8bveZLpzvoR:FEgTSXgKmiGu2qqoQ6rt0Fv3AetVmPJX
      MD5:560524B6AA728A438792E4C138067942
      SHA1:BF4BAA1FAB8174B6EBBFFD995283762BE4061F14
      SHA-256:D66EBB46A44C4072D3412C6C4EE2471D4FA6D5DF674060120641A477D289854C
      SHA-512:2E0A6354CE6FB129E485CB50E3D4AF9FCA41BEB71493A8A1B1EB03636F32BFC53ABA6883247E99235F5B11D61F71796732C80575804ED20FF580331F8F94891A
      Malicious:false
      Preview:TH02...... ..72.O%......SM01X...,.....#.O%..........IPM.Activity...........h...............h............H..h.o.....i.....h.........v..H..h\cal ...pDat...hH...0...@.o....h..\............h........_`Uk...h..\.@...I.lw...h....H...8.Zk...0....T...............d.........2h...............k..............!h.............. h.:L?....X.o...#h....8.........$h.v......8....."h..............'h..>...........1h..\.<.........0h....4....Zk../h....h.....ZkH..h`...p....o...-h .........o...+h!.\.....o................. ..............F7..............FIPM.Activity....Form....Standard....Journal Entry...IPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000.GwwMicrosoft...This form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:ASCII text, with very long lines (65536), with no line terminators
      Category:dropped
      Size (bytes):322260
      Entropy (8bit):4.000299760592446
      Encrypted:false
      SSDEEP:6144:dztCFLNyoAHq5Rv2SCtUTnRe4N2+A/3oKBL37GZbTSB+pMZIrh:HMLgvKz9CtgRemO3oUHi3SBSMZIl
      MD5:CC90D669144261B198DEAD45AA266572
      SHA1:EF164048A8BC8BD3A015CF63E78BDAC720071305
      SHA-256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
      SHA-512:16F8A8A6DCBAEAEFB88C7CFF910BCCC71B76A723CF808B810F500E28E543112C2FAE2491D4D209569BD810490EDFF564A2B084709B02963BCAF6FDF1AEEC59AC
      Malicious:false
      Preview:51253fe60063c31af0d295afb42228b0:v2:2:1:1590:2:8479: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
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):10
      Entropy (8bit):2.6464393446710157
      Encrypted:false
      SSDEEP:3:LM60:X0
      MD5:F04A63857ABDE2895E55D41B7E405753
      SHA1:6E7C06165647772C3601AA862FFF131BE4379432
      SHA-256:33043C2D77A5CA4159245E4B01D6851DAF465D9DE1DD48B07D9835C066859EC9
      SHA-512:9DC36BEFBF2007F865EBD6A49478A2E6E6A5A033593C1FB9507B45FE978C54678EEB8B491F9922CAED4F3CC2E0D07C35096E90057CA34D3D9D896D7A572E818F
      Malicious:false
      Preview:1729689980
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:SQLite 3.x database, last written using SQLite version 3023002, writer version 2, read version 2, file counter 2, database pages 1, cookie 0, schema 0, largest root page 1, unknown 0 encoding, version-valid-for 2
      Category:dropped
      Size (bytes):4096
      Entropy (8bit):0.09216609452072291
      Encrypted:false
      SSDEEP:3:lSWFN3l/klslpF/4llfll:l9F8E0/
      MD5:F138A66469C10D5761C6CBB36F2163C3
      SHA1:EEA136206474280549586923B7A4A3C6D5DB1E25
      SHA-256:C712D6C7A60F170A0C6C5EC768D962C58B1F59A2D417E98C7C528A037C427AB6
      SHA-512:9D25F943B6137DD2981EE75D57BAF3A9E0EE27EEA2DF19591D580F02EC8520D837B8E419A8B1EB7197614A3C6D8793C56EBC848C38295ADA23C31273DAA302D9
      Malicious:false
      Preview:SQLite format 3......@ .......................................................................... .....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:SQLite Rollback Journal
      Category:dropped
      Size (bytes):4616
      Entropy (8bit):0.13654994434077541
      Encrypted:false
      SSDEEP:3:7FEG2l+g1rl4/FllkpMRgSWbNFl/sl+ltlslVlllflllcn:7+/lf1Og9bNFlEs1EP/Vcn
      MD5:EC840D91C34480668972869EBACF91CE
      SHA1:D8DE3B62CEC36996284813662350BC18A61E0F03
      SHA-256:CECB4ABDFCA8AC1D3376B641B58E77527F2848FC36C4BCAA3EE370797A205285
      SHA-512:2FBC62F1115DE1A537907EBE3C627D85FDE632437B2AC223157758249D1C2CCD9EC638134E4BC1CAFE049CE970FAFB5106EB18561DF84CF899299F4096A0DCB6
      Malicious:false
      Preview:.... .c.......uy....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................SQLite format 3......@ .......................................................................... .................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:data
      Category:dropped
      Size (bytes):32768
      Entropy (8bit):0.04470641479249482
      Encrypted:false
      SSDEEP:6:G4l21qnNvVCnl21qnNvVCt/0L9XXPH4l942U:l2g42gW/05A0
      MD5:7140BFEE6EF62B8D78472F95F672FF1D
      SHA1:A2CEB4B155988D272AC25582082C79C065AE7292
      SHA-256:025997677AC8CC40FBCC7092BCBFC31C2991D8392F1743A050E6E995E1BA7EB9
      SHA-512:B519C348F010B21B507E3789E1113EA1BFA009BEA6D33109C3953107FE7CF52B9C25DD3ECDE97253F19003AFEA655E05D418D7E584E8366A7207C0D44FDBD1DF
      Malicious:false
      Preview:..-.....................Ov.x.....I.....x.pE..-.....................Ov.x.....I.....x.pE........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:SQLite Write-Ahead Log, version 3007000
      Category:dropped
      Size (bytes):45352
      Entropy (8bit):0.39498209005613816
      Encrypted:false
      SSDEEP:24:KmfzlQ3zRDMEUll7DBtDi4kZERDnAhJzqt8VtbDBtDi4kZERDKu:TfBQ1ZUll7DYMUhJzO8VFDYM
      MD5:4CD38578F74C6A29CD66FF478CDC297C
      SHA1:131C634DDAF073FCCA6170B70984F035A777DEC2
      SHA-256:A3DD79FA699CA536BFBB96FCD00D2F6C9235E5B5A4D39A6BC3CD59F723AF93A6
      SHA-512:84C022A5BB69C765B007AA0942E1F1EFC0937E8AA4500B8BE35384CF309B462EB69548D1DC4E048B064151614E79294D9D136F7C805612E9B6C8EE9D6CCF1A56
      Malicious:false
      Preview:7....-............I....0...T*..........I...+\x.....SQLite format 3......@ .......................................................................... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:PDF document, version 1.4, 2 pages
      Category:dropped
      Size (bytes):30528
      Entropy (8bit):7.840108993931288
      Encrypted:false
      SSDEEP:768:jOEZAmHoM1eIlLTSW+V54RWwwsaWxv84f3kpy3Src:aEfH9pN+VeswwsaCnCrc
      MD5:D4D4CA0B3A3E1EFE107806732794D92C
      SHA1:CCD39382DD780A44C182C13665E7396F2654BD41
      SHA-256:00ECC8AC401CA77EB6C4553AE765E917BD0684EA1EE2F1AE338228B89E18CB8D
      SHA-512:BCF5D7A04894F459179261ED4C524A68FBBD2ADBFAD43DA21FA1F4337146331DD166419615705F5A4169CEC02914025AFBAA308EBD5BB0A4303DCA509FEDB038
      Malicious:false
      Preview:%PDF-1.4.1 0 obj.<<./Title (..)./Creator (..)./Producer (...Q.t. .5...5...1)./CreationDate (D:20241023010309).>>.endobj.2 0 obj.<<./Type /Catalog./Pages 3 0 R.>>.endobj.4 0 obj.<<./Type /ExtGState./SA true./SM 0.02./ca 1.0./CA 1.0./AIS false./SMask /None>>.endobj.5 0 obj.[/Pattern /DeviceRGB].endobj.6 0 obj.<<./Type /Page./Parent 3 0 R./Contents 9 0 R./Resources 11 0 R./Annots 12 0 R./MediaBox [0 0 595 842].>>.endobj.11 0 obj.<<./ColorSpace <<./PCSp 5 0 R./CSp /DeviceRGB./CSpg /DeviceGray.>>./ExtGState <<./GSa 4 0 R.>>./Pattern <<.>>./Font <<./F7 7 0 R./F8 8 0 R.>>./XObject <<.>>.>>.endobj.12 0 obj.[ ].endobj.9 0 obj.<<./Length 10 0 R./Filter /FlateDecode.>>.stream.x..][....~..s`..n]Z..3.3..........$a...}..<.L....;..9%9.o....:.k.............-?.>.>,.....n.;.:...i.y.y.~................G...~......}....?....e.................|..b.....|........._.....o.?./.........yf.......,.......O.q..z.|.a...*..-..<...........l^......{....^........z.2..|..;..t....`."..3p......C}x..
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:ASCII text, with CRLF line terminators
      Category:modified
      Size (bytes):26
      Entropy (8bit):3.95006375643621
      Encrypted:false
      SSDEEP:3:gAWY3n:qY3n
      MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
      SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
      SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
      SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
      Malicious:false
      Preview:[ZoneTransfer]..ZoneId=3..
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:PDF document, version 1.4, 2 pages
      Category:dropped
      Size (bytes):30528
      Entropy (8bit):7.840108993931288
      Encrypted:false
      SSDEEP:768:jOEZAmHoM1eIlLTSW+V54RWwwsaWxv84f3kpy3Src:aEfH9pN+VeswwsaCnCrc
      MD5:D4D4CA0B3A3E1EFE107806732794D92C
      SHA1:CCD39382DD780A44C182C13665E7396F2654BD41
      SHA-256:00ECC8AC401CA77EB6C4553AE765E917BD0684EA1EE2F1AE338228B89E18CB8D
      SHA-512:BCF5D7A04894F459179261ED4C524A68FBBD2ADBFAD43DA21FA1F4337146331DD166419615705F5A4169CEC02914025AFBAA308EBD5BB0A4303DCA509FEDB038
      Malicious:false
      Preview:%PDF-1.4.1 0 obj.<<./Title (..)./Creator (..)./Producer (...Q.t. .5...5...1)./CreationDate (D:20241023010309).>>.endobj.2 0 obj.<<./Type /Catalog./Pages 3 0 R.>>.endobj.4 0 obj.<<./Type /ExtGState./SA true./SM 0.02./ca 1.0./CA 1.0./AIS false./SMask /None>>.endobj.5 0 obj.[/Pattern /DeviceRGB].endobj.6 0 obj.<<./Type /Page./Parent 3 0 R./Contents 9 0 R./Resources 11 0 R./Annots 12 0 R./MediaBox [0 0 595 842].>>.endobj.11 0 obj.<<./ColorSpace <<./PCSp 5 0 R./CSp /DeviceRGB./CSpg /DeviceGray.>>./ExtGState <<./GSa 4 0 R.>>./Pattern <<.>>./Font <<./F7 7 0 R./F8 8 0 R.>>./XObject <<.>>.>>.endobj.12 0 obj.[ ].endobj.9 0 obj.<<./Length 10 0 R./Filter /FlateDecode.>>.stream.x..][....~..s`..n]Z..3.3..........$a...}..<.L....;..9%9.o....:.k.............-?.>.>,.....n.;.:...i.y.y.~................G...~......}....?....e.................|..b.....|........._.....o.?./.........yf.......,.......O.q..z.|.a...*..-..<...........l^......{....^........z.2..|..;..t....`."..3p......C}x..
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):26
      Entropy (8bit):3.95006375643621
      Encrypted:false
      SSDEEP:3:gAWY3n:qY3n
      MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
      SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
      SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
      SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
      Malicious:false
      Preview:[ZoneTransfer]..ZoneId=3..
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:data
      Category:dropped
      Size (bytes):20971520
      Entropy (8bit):0.00710516722458067
      Encrypted:false
      SSDEEP:192:iWaKKlcKTBLshOjVw52bsLIUWhJg4Nc0HlwBQ:iWUTTBL0OjVG2bEIUWhJgac0HlwBQ
      MD5:B653A9256D2F690EC15B403440D52093
      SHA1:6DF85F3DE8D421E2F9026373F70508921EDFBF03
      SHA-256:DDA0BFD9A5251B1541A58008544DF6E4A5DB669A6203B68C170725091A574A67
      SHA-512:E1C70B6FE97AC886213F113ED6F528B62EDDCF8E9D187F0D4049A421BA3882788365F7804EC8DA0D8A64AB1E36288E93967C362BE2341ED7FA668DC446E67318
      Malicious:false
      Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..10/23/2024 13:26:17.874.OUTLOOK (0x1310).0x1308.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.System.GracefulExit.GracefulAppExitDesktop","Flags":33777014402039809,"InternalSequenceNumber":21,"Time":"2024-10-23T13:26:17.874Z","Data.PreviousAppMajor":16,"Data.PreviousAppMinor":0,"Data.PreviousAppBuild":16827,"Data.PreviousAppRevision":20130,"Data.PreviousSessionId":"A65A27EC-FD43-47B9-BAB6-7839F1B0748D","Data.PreviousSessionInitTime":"2024-10-23T13:25:56.396Z","Data.PreviousSessionUninitTime":"2024-10-23T13:25:59.740Z","Data.SessionFlags":2147483652,"Data.InstallMethod":0,"Data.OfficeUILang":1033,"Data.PreviousBuild":"Unknown","Data.EcsETag":"\"\"","Data.ProcessorArchitecture":"x64"}...10/23/2024 13:26:17.906.OUTLOOK (0x1310).0x19E0.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Telemetry.LoadXmlRules","Flags":33777014401990913,"InternalSequenceNumber":28
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:data
      Category:dropped
      Size (bytes):20971520
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
      SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
      SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
      SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
      Malicious:false
      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):246
      Entropy (8bit):3.5325285763919316
      Encrypted:false
      SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8rOlQa5YH:Qw946cPbiOxDlbYnuRKDlxYH
      MD5:4329C6A183D512291DB379F877A911E2
      SHA1:EB4E0BB621BAEE2A834980D58B58F1C4A80ABD10
      SHA-256:40D88D3722AD2E07699C2B1403925DC85620E0442D09F2F186CBC22B1B6BD517
      SHA-512:04279FFAA34A4D91FB016DA3E6E020C3CBB4B52285136727126BA2D505CB018130F31E44021CBDD7ADD345CD30C0FBE7C90DA6DC5765DC9FA8D19A105FDF3D14
      Malicious:false
      Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.3./.1.0./.2.0.2.4. . .0.9.:.2.6.:.5.0. .=.=.=.....
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:data
      Category:dropped
      Size (bytes):114688
      Entropy (8bit):4.553598757016395
      Encrypted:false
      SSDEEP:768:Ox8bZvxvM82e8prmq4cksNS9gAJqlETQpnmXFmdbUhU7uYh6X43R7UBSpqs36via:+yv64cFNS9gAXTQ4XFuCR
      MD5:353D642F15EC0C9EF58553AA7E7C7359
      SHA1:9604DC4AC5F55DCBE46F804C639718B0BF52269A
      SHA-256:8BAF16D377F01AA1740052F660BA151CF48AF4203170CC52DA4EE4D08EF1D500
      SHA-512:1A55975968E84B55B2381D05306D01371B35DC16372B633729A68DD3D3CD798F2B6D713F5C5D606172139F20390406622410B247AE5E895A525A7327C339D964
      Malicious:false
      Preview:............................................................................`.............#$O%..................eJ..............Zb..2...................................,...@.t.z.r.e.s...d.l.l.,.-.1.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.1.1.1................................................................Y............#$O%..........v.2._.O.U.T.L.O.O.K.:.1.3.1.0.:.5.0.0.d.f.8.c.5.7.c.d.4.4.c.0.6.9.3.8.f.a.7.6.1.c.1.9.1.3.4.6.6...C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.1.0.2.3.T.0.9.2.6.1.7.0.6.5.3.-.4.8.8.0...e.t.l.......P.P...........#$O%..........................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
      File Type:ASCII text, with very long lines (393)
      Category:dropped
      Size (bytes):16525
      Entropy (8bit):5.353642815103214
      Encrypted:false
      SSDEEP:384:tbxtsuP+XEWJJQbnR8L31M7HeltV+KYm3wsa2KjF4ODkr/O8r2IUHUHMWwEyZRN2:aPL
      MD5:91F06491552FC977E9E8AF47786EE7C1
      SHA1:8FEB27904897FFCC2BE1A985D479D7F75F11CEFC
      SHA-256:06582F9F48220653B0CB355A53A9B145DA049C536D00095C57FCB3E941BA90BB
      SHA-512:A63E6E0D25B88EBB6602885AB8E91167D37267B24516A11F7492F48876D3DDCAE44FFC386E146F3CF6EB4FA6AF251602143F254687B17FCFE6F00783095C5082
      Malicious:false
      Preview:SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:073+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:073+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="SetConfig:
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
      File Type:ASCII text, with very long lines (393), with CRLF line terminators
      Category:dropped
      Size (bytes):15114
      Entropy (8bit):5.326398026037151
      Encrypted:false
      SSDEEP:384:/nJLEahBIJ8i0vhYyxA5QOqCG1Y9+rnxJCtJkY0eb9xGwh5eEdis88psxYiM3ee+:V7J
      MD5:C8ED474AA510413F0DCAF846105913DC
      SHA1:C08BD77201FB46C40EA1DB4499A18F3D63B2D791
      SHA-256:4911906780F8E620A06BD3C8C27786A45A70E570E25A07AC42194F6E3B81933D
      SHA-512:06EB0C9D13F58FEBAC64C94399907D75086B47D339BCDA57E0408761F090304740308C310202414B8E3E1BCC22A61C108865D472908EB9459BD7CFE0FCEA4F6F
      Malicious:false
      Preview:SessionID=73f2892c-aaa0-4cec-9f40-3c6737c6afe0.1729690005095 Timestamp=2024-10-23T09:26:45:095-0400 ThreadID=6844 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=73f2892c-aaa0-4cec-9f40-3c6737c6afe0.1729690005095 Timestamp=2024-10-23T09:26:45:096-0400 ThreadID=6844 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=73f2892c-aaa0-4cec-9f40-3c6737c6afe0.1729690005095 Timestamp=2024-10-23T09:26:45:096-0400 ThreadID=6844 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=73f2892c-aaa0-4cec-9f40-3c6737c6afe0.1729690005095 Timestamp=2024-10-23T09:26:45:097-0400 ThreadID=6844 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=73f2892c-aaa0-4cec-9f40-3c6737c6afe0.1729690005095 Timestamp=2024-10-23T09:26:45:097-0400 ThreadID=6844 Component=ngl-lib_NglAppLib Description="SetConf
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):29752
      Entropy (8bit):5.423034382065854
      Encrypted:false
      SSDEEP:192:0cbgIhPcbocbAIlncb2cbwI/RcbNcbQIVvcbXcb2ImocbJ:fhWlA/TV5mP
      MD5:199F55319E009D10D03622934421A7B5
      SHA1:CFCEE8DB58C5FE60E03564489DD7B92C79DA1B43
      SHA-256:2167EAC921F436C237482D7934EAFC5D9E86E49E0FAE9C026D3E2F6EFF3C68B6
      SHA-512:F615422142B7930A1CB41A8FBA1BE638F27BED39C4198BAF7414267CF1D2FF2EC2DAA7EA9C72830FABD32FB48EB4E0DD96FD16862D1EFFC3436B1F1BDE0CCF1A
      Malicious:false
      Preview:06-10-2023 10:08:42:.---2---..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : Starting NGL..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..06-10-2023 10:08:42:.Closing File..06-10-
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
      Category:dropped
      Size (bytes):1407294
      Entropy (8bit):7.97605879016224
      Encrypted:false
      SSDEEP:24576:NW7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07tOWLaGZ4ZwYIGNPS:RB3mlind9i4ufFXpAXkrfUs0kWLaGZ48
      MD5:9A0DB1882660D02A9C5A0EA5814705F9
      SHA1:16EECDF2569D1BA1FF8357D6585E644ACB725A3A
      SHA-256:725FE3DF6DBFBCC7B760F4AD240344095A1E2BD5BE4CAAC13D34B15BAC5052DC
      SHA-512:2E51F185C6B4A3D5CBF5DB4859F3A5CC4649CD6D619015D454A899843D3D1303C6E6950BB542373CE713C51E0051ED9D4E8B62E3C12BBD6A93C0AC3DC28D277D
      Malicious:false
      Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
      Category:dropped
      Size (bytes):1419751
      Entropy (8bit):7.976496077007677
      Encrypted:false
      SSDEEP:24576:/xaWL07oXGZGwYIGNPJwdpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:JaWLxXGZGwZGM3mlind9i4ufFXpAXkru
      MD5:0A347312E361322436D1AF1D5145D2AB
      SHA1:1D6C06A274705F8A295F62AD90CF8CA27555C226
      SHA-256:094501B3CA4E93F626ABFCAE800645C533B61409DC3D1D233F4D053CE6A124D7
      SHA-512:9856C231513B47DD996488DF19EEE44DBB320E55432984C0C041EF568B6EC5C05F5340831132890D1D162E0505CA243D579582EDB9157CF722A86EC8CE2FEAFE
      Malicious:false
      Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
      Category:dropped
      Size (bytes):758601
      Entropy (8bit):7.98639316555857
      Encrypted:false
      SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
      MD5:3A49135134665364308390AC398006F1
      SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
      SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
      SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
      Malicious:false
      Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
      Category:dropped
      Size (bytes):386528
      Entropy (8bit):7.9736851559892425
      Encrypted:false
      SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
      MD5:5C48B0AD2FEF800949466AE872E1F1E2
      SHA1:337D617AE142815EDDACB48484628C1F16692A2F
      SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
      SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
      Malicious:false
      Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:data
      Category:dropped
      Size (bytes):30
      Entropy (8bit):1.2389205950315936
      Encrypted:false
      SSDEEP:3:JcklzX:Ssz
      MD5:E1A8E8BDB402A464456AFB38C03F1A37
      SHA1:382206D4EB38D2690E457262AE5104AC9EED3CC9
      SHA-256:E236FDCD13D1B83391A641352AFD7A02D63BE41D07572BFF4D3DC8EFE3B99035
      SHA-512:821C97E472577D62B813FF63D124DF6582B639EA1B3DEDD82AE0CF6E37745C733EBE1E70B3732D6506E69AE7F622821CA1C48A6635CB6C53BCEEC83B9F2B62BB
      Malicious:false
      Preview:....~.........................
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:Composite Document File V2 Document, Cannot read section info
      Category:dropped
      Size (bytes):16384
      Entropy (8bit):0.6701264453628039
      Encrypted:false
      SSDEEP:12:rl3baFsVqLKeTy2MyheC8T23BMyhe+S7wzQP9zNMyhe+S7xMyheCzjh2m:rh0mnq1Py961Pcm
      MD5:3FE34A7A3298A84326FDE060340B3128
      SHA1:AECB59482000533DB35864DC4F58F94BD62E3FCC
      SHA-256:FA7BBCB7C8267DBDD7EC5D04B2CC731B8BD2FF837E97F104384FA69DFF93258C
      SHA-512:66642304C5ED689CFB98FBFC71A2B25193E1B0DBE83A183C0C95C1F6646CD4D645AAD71402DF2AA443283402055C14E79052219ECA780338C537ACF1E63BEDF4
      Malicious:true
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:Microsoft Outlook email folder (>=2003)
      Category:dropped
      Size (bytes):271360
      Entropy (8bit):3.560614319781914
      Encrypted:false
      SSDEEP:1536:5tTCVcl9tG039kMijUI1RkakSxw6gHel2M2siKiWl1uDiuUCNpL3zxHW53jEpEHF:5dtxJE1qYOLHeqBO+fNdpjmypj
      MD5:1655AD2A54F51281C579B715BB0B1C7D
      SHA1:471F587FC3C71264CCC08CBD37296D2F85D6DE61
      SHA-256:2BF86A7ACB64D6F28FC667E360043EFDA036FE4A224951CC1F33644515A78DDA
      SHA-512:253A47259AA80CC4624F042ABA9B882D4CBFAD8C239622EB29F25B3825CB393AB001B0FD577654B1E865707FF643B7A71970ACE8D93ABDEEE59B169F56C49CC5
      Malicious:true
      Preview:!BDN.L.SM......\...............D.......b................@...........@...@...................................@...........................................................................$.......D.......?..............B...............?........z..................................................................................................................................................................................................................................................................................T.......e.<.(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      File Type:data
      Category:dropped
      Size (bytes):131072
      Entropy (8bit):4.654162026862712
      Encrypted:false
      SSDEEP:1536:g7lTUiZR839kMipUI1RkukSxw6ZW53jEpEHPVQ10BAwrzqPKnKmU7tT:tJ+1qMOwpjh7d
      MD5:6AD270014D8EE9CF95EA6F1384785322
      SHA1:3FFF4AF5A2C3E69DDCE497DE08989846EF290691
      SHA-256:073C18E589D43B2774D414EB5EBEAAA88FE2C9499149A471E1BC1DFE6965E015
      SHA-512:A934B2A80B3ED61F8BB3D3083FDD203273EADD1CAE128493425C954E1EA0ACA1372E978677AB9E196DEC41022BB9031A8C85BB16120713512FA1AFF03486EB42
      Malicious:true
      Preview:$..[C...l...........`Q.$O%....................#.!BDN.L.SM......\...............D.......b................@...........@...@...................................@...........................................................................$.......D.......?..............B...............?........z..................................................................................................................................................................................................................................................................................T.......e.<.(...`Q.$O%.......B............#.........................................................................................................................................................................................................................................................................................................................................................................................................
      File type:RFC 822 mail, ASCII text, with CRLF line terminators
      Entropy (8bit):6.142718512413805
      TrID:
      • E-Mail message (Var. 5) (54515/1) 100.00%
      File name:John Garby.eml
      File size:54'805 bytes
      MD5:4089c8345685b82eca6a96828e6a9f77
      SHA1:5264f43ae46f9867d0d87e744e32742d5cbfe8fc
      SHA256:2e3f747cf12a29db06f0e9883fdb512185078c0088eed21370325678e19ac57c
      SHA512:ecffb402c4f87247f98e0abaca0ac66b4725ab5b7a97601772bbdbacd5ed179270484e1842a3172f70612e566313230daf92e3d50563d5de50ee0dceaadc34f4
      SSDEEP:1536:R9UH0U8AzzYZfwFDzMn+BRSAqnFFrtR/KCA:jEzl5zMnORSvbXiz
      TLSH:DA33D003D9000472BBB0117E9F27DC362067BD1B3DB65891356E91EE07FA7BA3B28599
      File Content Preview:Received: from PH8PR09MB10363.namprd09.prod.outlook.com.. (2603:10b6:510:18f::12) by SJ0PR09MB9953.namprd09.prod.outlook.com with.. HTTPS; Wed, 23 Oct 2024 01:03:26 +0000..Received: from DM6PR09CA0007.namprd09.prod.outlook.com (2603:10b6:5:160::20).. by P
      Subject:John Garby
      From:Tivarius Bordeaux <tivariusbordeaux@gmail.com>
      To:"Garby, John Jr CTR (FAA)" <John.CTR.Garby-Jr@faa.gov>
      Cc:
      BCC:
      Date:Wed, 23 Oct 2024 01:03:17 +0000
      Communications:
      • CAUTION: This email originated from outside of the Federal Aviation Administration (FAA). Do not click on links or open attachments unless you recognize the sender and know the content is safe. John Garby 2300 E. Devon Ave Des Plaines IL 60018 224-567-3721
      Attachments:
      • JohnGarby.pdf
      Key Value
      Receivedby 2002:a05:622a:7910:b0:460:9826:dae2 with HTTP; Tue, 22 Oct 2024 18:03:17 -0700 (PDT)
      FromTivarius Bordeaux <tivariusbordeaux@gmail.com>
      To"Garby, John Jr CTR (FAA)" <John.CTR.Garby-Jr@faa.gov>
      SubjectJohn Garby
      Thread-TopicJohn Garby
      Thread-IndexAQHbJOddl65ifTuUnkSXjnNXd+m3qg==
      X-MS-Exchange-MessageSentRepresentingType1
      DateWed, 23 Oct 2024 01:03:17 +0000
      Message-ID <CAAJaOE2Py-ppR_nTGAAWTzPgW5pB411iBnotFSEW8JiFbk5vzw@mail.gmail.com>
      Content-Languageen-US
      X-MS-Exchange-Organization-AuthAsAnonymous
      X-MS-Exchange-Organization-AuthSource BL02EPF0001B418.namprd09.prod.outlook.com
      X-MS-Has-Attachyes
      X-MS-Exchange-Organization-Network-Message-Id 1f8df195-7645-48c0-e3a6-08dcf2fe7cb3
      X-MS-Exchange-Organization-SCL1
      X-MS-TNEF-Correlator
      X-MS-Exchange-Organization-RecordReviewCfmType0
      received-spfPass (relay3.faa.gov: domain of tivariusbordeaux@gmail.com designates 2607:f8b0:4864:20::831 as permitted sender) identity=mailfrom; client-ip=2607:f8b0:4864:20::831; receiver=relay3.faa.gov; envelope-from="tivariusbordeaux@gmail.com"; x-sender="tivariusbordeaux@gmail.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip6:2001:4860:4000::/36 ip6:2404:6800:4000::/36 ip6:2607:f8b0:4000::/36 ip6:2800:3f0:4000::/36 ip6:2a00:1450:4000::/36 ip6:2c0f:fb50:4000::/36 ~all"
      x-ms-publictraffictypeEmail
      x-ironport-anti-spam-filteredtrue
      x-ironport-avE=Sophos;i="6.11,223,1725336000"; d="pdf'?scan'208";a="733767776"
      authentication-resultsspf=softfail (sender IP is 204.108.9.5) smtp.mailfrom=gmail.com; dkim=pass (signature was verified) header.d=gmail.com;dmarc=pass action=none header.from=gmail.com;
      x-ms-exchange-transport-endtoendlatency00:00:05.5762242
      x-ms-traffictypediagnostic BL02EPF0001B418:EE_|PH8PR09MB10363:EE_|SJ0PR09MB9953:EE_
      x-forefront-antispam-report CIP:204.108.9.5;CTRY:US;LANG:fr;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:acyinternalrelay1.faa.gov;PTR:ErrorRetry;CAT:NONE;SFS:(13230040)(7093399012)(82310400026)(8096899003);DIR:INB;
      x-ms-exchange-crosstenant-originalarrivaltime23 Oct 2024 01:03:20.6765 (UTC)
      x-ms-exchange-crosstenant-fromentityheaderHybridOnPrem
      x-ms-exchange-crosstenant-network-message-id 1f8df195-7645-48c0-e3a6-08dcf2fe7cb3
      x-ms-exchange-transport-crosstenantheadersstampedPH8PR09MB10363
      x-ms-exchange-crosstenant-id2b69d099-dc61-447b-84c8-001733d8be3a
      x-ms-office365-filtering-correlation-id1f8df195-7645-48c0-e3a6-08dcf2fe7cb3
      x-microsoft-antispamBCL:0;ARA:13230040|7093399012|82310400026|8096899003;
      ironport-sdr67184b57_Hu4VDzJOtczRzY/VKRq4dwzcjesdQgcqw7QYCkufFhJb0Na 9DGwBuP8ly7xW5DgA29FwCTfBd4ixYghpkdxjvQ==
      dkim-signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1729645398; x=1730250198; darn=faa.gov; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=jibiurI2Hkp55bB7UQ9P/41TTf2Rj+dRJ5P6rCMSX9A=; b=P23BaB82HiNNsfwYxiULL1QYGlb2u/oSvx6Vk6+xG6GWGFL6v2MtlUGTPgAYLpCHCD ZDb8m8JG4ai56wmHLk6r+bxvmNB1op96ag8qTRZ2WrlRzw2c9adJmFypZODqglCX+/am tb3VHTBqZAbxbCX2WunzHuykIbejP6EEs6chFdFNuBVczvAIuBlc6Q3BOqAUWw/88ULl QDqqOSOtdPwuEQ7SCG0L0detkD2DFQ3npN0o1KhH3PoDH/UkSsw+dJtgOH3XIsAv2PJb 1L6mwRM9yOH7I/1ehMdaKZb0r5Ozu1jy9nm1Y7Mz4ZBvevooru6o33iGcWRtH2iQYMIV idIg==
      x-originatororgusfaa.onmicrosoft.com
      x-ms-exchange-processed-by-bccfoldering15.20.8069.009
      authentication-results-originalrelay3.faa.gov; spf=Pass smtp.mailfrom=tivariusbordeaux@gmail.com; dkim=pass (signature verified) header.i=@gmail.com; dmarc=pass (p=none dis=none) d=gmail.com
      x-eopattributedmessage0
      x-gm-message-stateAOJu0YwUjtWWdks2t1PU0FgH/bzUnmvgPvEJb5LbCvefgnwJiTx54FgX +8LPkt38yCc/F2GUNdVgfW6LSaPdRrU62o2/uTvPGAakXK8tDIBi++D9EoIbnxJkQgetTt74zr7 NsJAKVnbRx1MTU9pIrh8hxxZrBYEC+mTzCCA5
      x-google-smtp-source AGHT+IFK6yd+mwy7Wkg+9bqdIl/Tw+wucd7IE61VagdB2xmpY2W7ySpfbCTjMuemXKil63IhfnHSWplfazSm5LvbrWk=
      x-receivedby 2002:ac8:5847:0:b0:461:c8b:6448 with SMTP id d75a77b69052e-4611409f751mr18370881cf.12.1729645397557; Tue, 22 Oct 2024 18:03:17 -0700 (PDT)
      x-ms-exchange-crosstenant-originalattributedtenantconnectingip TenantId=2b69d099-dc61-447b-84c8-001733d8be3a;Ip=[204.108.9.5];Helo=[acyinternalrelay1.faa.gov]
      x-ms-exchange-crosstenant-authsource BL02EPF0001B418.namprd09.prod.outlook.com
      x-ms-exchange-crosstenant-authasAnonymous
      x-google-dkim-signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1729645398; x=1730250198; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=jibiurI2Hkp55bB7UQ9P/41TTf2Rj+dRJ5P6rCMSX9A=; b=r3k0SqqFBkC+Lo/W4CAD9QoHBhlhDapdo/pGcOeAs7b+KXvtTZVdVF8c7P/l3pPYhi /bmf0jnstMGM2TybRiYZ3sHjTGH8V5rtAApV4mt6GDpb/889IOoOmI3mpIGU8trrbJwP H+WZPpouChUM+l81/QDlyFKiye3vZtRbIcpCyENhsJ4sVZLuuxWsUXj7o36Y8FpcwBh/ 9UAdG9Kinl5k7u2LQHkERCx8FMn4XT+kFfIa58e9DUA77lg31Tj7R5mvvhVRQqMY8/xR I26iZGK4fW5Gwcq6hUPIsmtsBsFZ4I6XuzHsClHeQH5dYILZ7VtCKDe2C3Woq1IZj/sF cPsg==
      ironport-hdrordrA9a23:zAaCGqkUwyucn5Lp/VyDxclPinjpDfIj3DAbv31ZSRFFG/Fw9v re+sjzsCWftN9/YgBDpTntAtjifZq+z/9ICOsqTNKftWDd0QPCTL2KhrGSpwEIdReOkdK1Fp 0NT0G9MrDN5JRB4voSKTPXL+od
      X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
      X-Microsoft-Antispam-Message-Info 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
      Content-Typemultipart/mixed; boundary="_004_CAAJaOE2PyppRnTGAAWTzPgW5pB411iBnotFSEW8JiFbk5vzwmailgm_"
      MIME-Version1.0

      Icon Hash:46070c0a8e0c67d6
      TimestampSource PortDest PortSource IPDest IP
      Oct 23, 2024 15:26:56.168323040 CEST6478053192.168.2.161.1.1.1
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Oct 23, 2024 15:26:56.168323040 CEST192.168.2.161.1.1.10xe219Standard query (0)x1.i.lencr.orgA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Oct 23, 2024 15:26:56.176084042 CEST1.1.1.1192.168.2.160xe219No error (0)x1.i.lencr.orgcrl.root-x1.letsencrypt.org.edgekey.netCNAME (Canonical name)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:4
      Start time:09:26:17
      Start date:23/10/2024
      Path:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
      Wow64 process (32bit):true
      Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\John Garby.eml"
      Imagebase:0xb80000
      File size:34'446'744 bytes
      MD5 hash:91A5292942864110ED734005B7E005C0
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:6
      Start time:09:26:18
      Start date:23/10/2024
      Path:C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "71E62F43-4037-4074-8577-B1B23D5E6097" "34F605BC-11FC-4DA2-BEDD-E779C32D2686" "4880" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
      Imagebase:0x7ff679ff0000
      File size:710'048 bytes
      MD5 hash:EC652BEDD90E089D9406AFED89A8A8BD
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:9
      Start time:09:26:41
      Start date:23/10/2024
      Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\162Z7WQ3\JohnGarby.pdf"
      Imagebase:0x7ff65b720000
      File size:5'641'176 bytes
      MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:10
      Start time:09:26:42
      Start date:23/10/2024
      Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
      Imagebase:0x7ff74c630000
      File size:3'581'912 bytes
      MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:11
      Start time:09:26:43
      Start date:23/10/2024
      Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2260 --field-trial-handle=1556,i,17499574801468197080,10624922083168603172,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
      Imagebase:0x7ff74c630000
      File size:3'581'912 bytes
      MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      No disassembly