Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Message 2.eml

Overview

General Information

Sample name:Message 2.eml
Analysis ID:1588034
MD5:558474cdae29ce079570d5e0e5a803b2
SHA1:e2adf8441504c37f2b3908bbf1cc418abcaf971d
SHA256:ce697e07dc6cea1a05b55600914f3df73d9ee656c402739d7a569bd0c4719a6e
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected potential phishing Email
AI detected suspicious URL
Detected non-DNS traffic on DNS port
Email DKIM failed
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6920 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Message 2.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 7096 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "27CD839D-13DF-480D-ACB0-39E21882D3A1" "318F7960-9122-4885-9334-57DE6FEB9450" "6920" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • chrome.exe (PID: 6360 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2F4.zsi0z.mudassarseotools.com%2F4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12&data=05%7C02%7Csharris%40biolegend.com%7C7e83669b39564936788908dd31a2969a%7Cfa246a9e8fe04eed9eec93652a25c4ee%7C0%7C0%7C638721296747259073%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C40000%7C%7C%7C&sdata=s1j4Mqr2f9UCh%2FNbCUPP4s1OOxE4HkiQEx0HsMWBvws%3D&reserved=0 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
      • chrome.exe (PID: 3048 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 --field-trial-handle=1996,i,6426640467595174815,8874587255388650569,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
    • Acrobat.exe (PID: 600 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\T2RWRHJ3\Harbor Freight Exclusive Offer.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 2380 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 3764 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2112 --field-trial-handle=1568,i,159241030600882616,14679362248790632747,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
    • chrome.exe (PID: 8044 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2F4.zsi0z.mudassarseotools.com%2F4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12&data=05%7C02%7Csharris%40biolegend.com%7C7e83669b39564936788908dd31a2969a%7Cfa246a9e8fe04eed9eec93652a25c4ee%7C0%7C0%7C638721296747259073%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C40000%7C%7C%7C&sdata=s1j4Mqr2f9UCh%2FNbCUPP4s1OOxE4HkiQEx0HsMWBvws%3D&reserved=0 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
      • chrome.exe (PID: 7184 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1876,i,8234021842610110883,15908815094523754103,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 83395EAB5B03DEA9720F8D7AC0D15CAA)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6920, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
Source: Registry Key setAuthor: frack113: Data: Details: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\T2RWRHJ3\, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6920, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Security\OutlookSecureTempFolder
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

Phishing

barindex
Source: EmailJoe Sandbox AI: Detected potential phishing email: The sender email address is suspicious and doesn't match the content (claims to be about generator winners but contains weather updates). The subject line and sender name are typical clickbait/scam formatting with random characters (--ghMLB, -----3SN7). There's a mismatch between the apparent legitimate weather alert content and the fraudulent sender/subject, suggesting content hijacking
Source: URLJoe Sandbox AI: AI detected IP in URL: http://4.zsi0z.mudassarseotools.com
Source: Message 2.emlEmail attachement header: Authentication-Results: fail (signature did not verify) header.d=wakemed.org
Source: EmailClassification: Lure-Based Attack
Source: http://4.zsi0z.mudassarseotools.com/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12HTTP Parser: No favicon
Source: http://4.zsi0z.mudassarseotools.com/t/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12HTTP Parser: No favicon
Source: http://4.zsi0z.mudassarseotools.com/news?q=IP%20provider%20is%20blacklisted!%20LEVEL3HTTP Parser: No favicon
Source: http://4.zsi0z.mudassarseotools.com/news?q=IP%20provider%20is%20blacklisted!%20LEVEL3HTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 20.190.159.4:443 -> 192.168.2.17:49707 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.17:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.17:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49724 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.227.215:443 -> 192.168.2.17:49725 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49733 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 0MB later: 30MB
Source: global trafficTCP traffic: 192.168.2.17:52762 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.17:52762 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.17:52762 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.17:52762 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.17:52762 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.17:52762 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.17:52762 -> 1.1.1.1:53
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.4
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 4.245.163.56
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: unknownTCP traffic detected without corresponding DNS query: 2.23.242.162
Source: global trafficHTTP traffic detected: GET /4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12 HTTP/1.1Host: 4.zsi0z.mudassarseotools.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12 HTTP/1.1Host: 4.zsi0z.mudassarseotools.comConnection: keep-aliveCache-Control: max-age=0Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: 4.zsi0z.mudassarseotools.comConnection: keep-aliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Referer: http://4.zsi0z.mudassarseotools.com/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /t/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12 HTTP/1.1Host: 4.zsi0z.mudassarseotools.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://4.zsi0z.mudassarseotools.com/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /news?q=IP%20provider%20is%20blacklisted!%20LEVEL3 HTTP/1.1Host: 4.zsi0z.mudassarseotools.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://4.zsi0z.mudassarseotools.com/t/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12 HTTP/1.1Host: 4.zsi0z.mudassarseotools.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /t/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12 HTTP/1.1Host: 4.zsi0z.mudassarseotools.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://4.zsi0z.mudassarseotools.com/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /news?q=IP%20provider%20is%20blacklisted!%20LEVEL3 HTTP/1.1Host: 4.zsi0z.mudassarseotools.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Referer: http://4.zsi0z.mudassarseotools.com/t/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12Accept-Encoding: gzip, deflateAccept-Language: en-US,en;q=0.9
Source: global trafficDNS traffic detected: DNS query: nam11.safelinks.protection.outlook.com
Source: global trafficDNS traffic detected: DNS query: 4.zsi0z.mudassarseotools.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: feeds.foxnews.com
Source: global trafficDNS traffic detected: DNS query: moxie.foxnews.com
Source: global trafficDNS traffic detected: DNS query: www.foxnews.com
Source: global trafficDNS traffic detected: DNS query: x1.i.lencr.org
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/plain; charset=utf-8X-Address: gin_throttle_mw_7200000000_8.46.123.189X-Ratelimit-Limit: 500X-Ratelimit-Remaining: 497X-Ratelimit-Reset: 1736539128Date: Fri, 10 Jan 2025 18:58:49 GMTContent-Length: 0
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52773
Source: unknownNetwork traffic detected: HTTP traffic on port 49691 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52771
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52776
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52774
Source: unknownNetwork traffic detected: HTTP traffic on port 52771 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52773 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49691
Source: unknownNetwork traffic detected: HTTP traffic on port 52776 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52774 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownHTTPS traffic detected: 20.190.159.4:443 -> 192.168.2.17:49707 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.17:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.242.162:443 -> 192.168.2.17:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.107.5.88:443 -> 192.168.2.17:49724 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.23.227.215:443 -> 192.168.2.17:49725 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.17:49733 version: TLS 1.2
Source: classification engineClassification label: mal48.winEML@45/45@19/172
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20250110T1358100551-6920.etl
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.ini
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Message 2.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "27CD839D-13DF-480D-ACB0-39E21882D3A1" "318F7960-9122-4885-9334-57DE6FEB9450" "6920" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "27CD839D-13DF-480D-ACB0-39E21882D3A1" "318F7960-9122-4885-9334-57DE6FEB9450" "6920" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2F4.zsi0z.mudassarseotools.com%2F4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12&data=05%7C02%7Csharris%40biolegend.com%7C7e83669b39564936788908dd31a2969a%7Cfa246a9e8fe04eed9eec93652a25c4ee%7C0%7C0%7C638721296747259073%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C40000%7C%7C%7C&sdata=s1j4Mqr2f9UCh%2FNbCUPP4s1OOxE4HkiQEx0HsMWBvws%3D&reserved=0
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 --field-trial-handle=1996,i,6426640467595174815,8874587255388650569,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2F4.zsi0z.mudassarseotools.com%2F4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12&data=05%7C02%7Csharris%40biolegend.com%7C7e83669b39564936788908dd31a2969a%7Cfa246a9e8fe04eed9eec93652a25c4ee%7C0%7C0%7C638721296747259073%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C40000%7C%7C%7C&sdata=s1j4Mqr2f9UCh%2FNbCUPP4s1OOxE4HkiQEx0HsMWBvws%3D&reserved=0
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 --field-trial-handle=1996,i,6426640467595174815,8874587255388650569,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\T2RWRHJ3\Harbor Freight Exclusive Offer.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2112 --field-trial-handle=1568,i,159241030600882616,14679362248790632747,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 3EF2059EBF607116F9AA2873A7590AFB
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\T2RWRHJ3\Harbor Freight Exclusive Offer.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2112 --field-trial-handle=1568,i,159241030600882616,14679362248790632747,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2F4.zsi0z.mudassarseotools.com%2F4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12&data=05%7C02%7Csharris%40biolegend.com%7C7e83669b39564936788908dd31a2969a%7Cfa246a9e8fe04eed9eec93652a25c4ee%7C0%7C0%7C638721296747259073%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C40000%7C%7C%7C&sdata=s1j4Mqr2f9UCh%2FNbCUPP4s1OOxE4HkiQEx0HsMWBvws%3D&reserved=0
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1876,i,8234021842610110883,15908815094523754103,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2F4.zsi0z.mudassarseotools.com%2F4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12&data=05%7C02%7Csharris%40biolegend.com%7C7e83669b39564936788908dd31a2969a%7Cfa246a9e8fe04eed9eec93652a25c4ee%7C0%7C0%7C638721296747259073%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C40000%7C%7C%7C&sdata=s1j4Mqr2f9UCh%2FNbCUPP4s1OOxE4HkiQEx0HsMWBvws%3D&reserved=0
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1876,i,8234021842610110883,15908815094523754103,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation21
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
Security Account Manager14
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Extra Window Memory Injection
1
Extra Window Memory Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://4.zsi0z.mudassarseotools.com/favicon.ico0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    high
    nam11.safelinks.eop-tm2.outlook.com
    104.47.56.156
    truefalse
      unknown
      www.google.com
      142.250.185.100
      truefalse
        high
        default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
        84.201.210.39
        truefalse
          high
          4.zsi0z.mudassarseotools.com
          185.246.87.22
          truetrue
            unknown
            nam11.safelinks.protection.outlook.com
            unknown
            unknownfalse
              unknown
              x1.i.lencr.org
              unknown
              unknownfalse
                high
                moxie.foxnews.com
                unknown
                unknownfalse
                  high
                  www.foxnews.com
                  unknown
                  unknownfalse
                    high
                    feeds.foxnews.com
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://4.zsi0z.mudassarseotools.com/t/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12false
                        unknown
                        http://4.zsi0z.mudassarseotools.com/news?q=IP%20provider%20is%20blacklisted!%20LEVEL3false
                          unknown
                          http://4.zsi0z.mudassarseotools.com/favicon.icofalse
                          • Avira URL Cloud: safe
                          unknown
                          http://4.zsi0z.mudassarseotools.com/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12false
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            142.250.186.46
                            unknownUnited States
                            15169GOOGLEUSfalse
                            185.246.87.22
                            4.zsi0z.mudassarseotools.comFrance
                            21409IKOULAFRtrue
                            142.250.74.206
                            unknownUnited States
                            15169GOOGLEUSfalse
                            173.194.76.84
                            unknownUnited States
                            15169GOOGLEUSfalse
                            52.109.89.119
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            2.16.168.101
                            unknownEuropean Union
                            20940AKAMAI-ASN1EUfalse
                            142.250.185.100
                            www.google.comUnited States
                            15169GOOGLEUSfalse
                            23.56.162.204
                            unknownUnited States
                            16625AKAMAI-ASUSfalse
                            23.209.209.135
                            unknownUnited States
                            23693TELKOMSEL-ASN-IDPTTelekomunikasiSelularIDfalse
                            142.250.185.163
                            unknownUnited States
                            15169GOOGLEUSfalse
                            52.6.155.20
                            unknownUnited States
                            14618AMAZON-AESUSfalse
                            199.232.214.172
                            bg.microsoft.map.fastly.netUnited States
                            54113FASTLYUSfalse
                            52.168.112.67
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            142.250.184.228
                            unknownUnited States
                            15169GOOGLEUSfalse
                            142.250.74.195
                            unknownUnited States
                            15169GOOGLEUSfalse
                            172.64.41.3
                            unknownUnited States
                            13335CLOUDFLARENETUSfalse
                            52.113.194.132
                            unknownUnited States
                            8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            2.23.240.205
                            unknownEuropean Union
                            8781QA-ISPQAfalse
                            239.255.255.250
                            unknownReserved
                            unknownunknownfalse
                            142.251.32.110
                            unknownUnited States
                            15169GOOGLEUSfalse
                            104.102.34.105
                            unknownUnited States
                            16625AKAMAI-ASUSfalse
                            104.47.56.156
                            nam11.safelinks.eop-tm2.outlook.comUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            151.101.2.132
                            unknownUnited States
                            54113FASTLYUSfalse
                            52.109.76.243
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                            IP
                            192.168.2.17
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1588034
                            Start date and time:2025-01-10 19:57:41 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:defaultwindowsinteractivecookbook.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:27
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • EGA enabled
                            Analysis Mode:stream
                            Analysis stop reason:Timeout
                            Sample name:Message 2.eml
                            Detection:MAL
                            Classification:mal48.winEML@45/45@19/172
                            Cookbook Comments:
                            • Found application associated with file extension: .eml
                            • Exclude process from analysis (whitelisted): dllhost.exe, TextInputHost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 52.113.194.132, 52.109.76.243, 2.16.168.101, 2.16.168.119
                            • Excluded domains from analysis (whitelisted): ecs.office.com, omex.cdn.office.net, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, eur.roaming1.live.com.akadns.net, neu-azsc-000.roaming.officeapps.live.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, login.live.com, s-0005.s-msedge.net, osiprod-neu-buff-azsc-000.northeurope.cloudapp.azure.com, ecs.office.trafficmanager.net, omex.cdn.office.net.akamaized.net, a1864.dscd.akamai.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtQueryAttributesFile calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • Report size getting too big, too many NtSetValueKey calls found.
                            • VT rate limit hit for: nam11.safelinks.eop-tm2.outlook.com
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 11, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 11
                            Category:dropped
                            Size (bytes):86016
                            Entropy (8bit):4.444683818704761
                            Encrypted:false
                            SSDEEP:
                            MD5:FC72842E89B7AA887A0754EBE8490139
                            SHA1:4934CF2ADAA2D820AF2A9C9DBDD3B7858207AFDC
                            SHA-256:00B2C5A8A481911EE2C1C65BE1676DCBE8863827E2946B8DBF3EBA293EE4385D
                            SHA-512:FE66B07F025F6139DDF591CB3AF9D3A7D0B3E12F2B7323181B4253B12CD486E2BCCA63C1CBCD3BDE4777C9F40A4D3B50B4FA475F4188C21065111B9D32A3B36C
                            Malicious:false
                            Reputation:unknown
                            Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:SQLite Rollback Journal
                            Category:dropped
                            Size (bytes):8720
                            Entropy (8bit):3.7671821092806734
                            Encrypted:false
                            SSDEEP:
                            MD5:D9A173D0757718C2F1BDA540CDF6C491
                            SHA1:BCCBA0F6B721543D2BD8DEC77827BDD9BFA29DC0
                            SHA-256:34AC3E7B69B94826B1FBED057782DF9FECF52B54AB3C5FD2605295333458ED72
                            SHA-512:B2FFAC33477811DD6FEB82E6A45DBBFB20BC5AA45C3EF674B1639AA030D835ED22BDF49167F4C1DEE234A8928EF13C1B6E854E978F4580628FCF0B8A91507814
                            Malicious:false
                            Reputation:unknown
                            Preview:.... .c.....Ya!................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...[...b...r...t...}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:Certificate, Version=3
                            Category:dropped
                            Size (bytes):1391
                            Entropy (8bit):7.705940075877404
                            Encrypted:false
                            SSDEEP:
                            MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                            SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                            SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                            SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                            Malicious:false
                            Reputation:unknown
                            Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                            Category:dropped
                            Size (bytes):71954
                            Entropy (8bit):7.996617769952133
                            Encrypted:true
                            SSDEEP:
                            MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                            SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                            SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                            SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                            Malicious:false
                            Reputation:unknown
                            Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):192
                            Entropy (8bit):2.7529698674325394
                            Encrypted:false
                            SSDEEP:
                            MD5:BA07B5D1E5B06D80E05582C750FDC482
                            SHA1:62EEE4B907BBC20E1C86FF0612113B60D1A2F070
                            SHA-256:54FE3B3EB9548E544014A59DBA41EF65FC969FCE235E3C1AB4577CB6744C3C2A
                            SHA-512:E105770A43FA58B1265E9B3AACF15881C00FE6829919F37F9A3DC3FE9EF908E573CA03C88BC204983296014CA9C2014CD718BD1A555DFDB03444600505F84C6E
                            Malicious:false
                            Reputation:unknown
                            Preview:p...... .........V@..c..(....................................................... ..........W....................o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                            File Type:data
                            Category:modified
                            Size (bytes):328
                            Entropy (8bit):3.233096791118922
                            Encrypted:false
                            SSDEEP:
                            MD5:CACA95235CD8145ACC75D6567FBAB0AA
                            SHA1:48F1569D3CAF4AEEFF0E1F6761179D0F9B2C5E63
                            SHA-256:0ECBBE0F0437C6454E47084E75EA735A593ED8DADAE3364E8AF348E748777200
                            SHA-512:3F45A8416A6142D0387D2D6C7FC8C82D53F8FCB858E207C7AD472807E1A568AAFE02366AA967052EF5E235101E9E96CFBDB231E4ED8C08F882CED316C9F441CD
                            Malicious:false
                            Reputation:unknown
                            Preview:p...... ........Vn..c..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:PostScript document text
                            Category:dropped
                            Size (bytes):0
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:
                            MD5:8BA9D8BEBA42C23A5DB405994B54903F
                            SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                            SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                            SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                            Malicious:false
                            Reputation:unknown
                            Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:PostScript document text
                            Category:dropped
                            Size (bytes):1233
                            Entropy (8bit):5.233980037532449
                            Encrypted:false
                            SSDEEP:
                            MD5:8BA9D8BEBA42C23A5DB405994B54903F
                            SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                            SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                            SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                            Malicious:false
                            Reputation:unknown
                            Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:PostScript document text
                            Category:dropped
                            Size (bytes):0
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:
                            MD5:8BA9D8BEBA42C23A5DB405994B54903F
                            SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                            SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                            SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                            Malicious:false
                            Reputation:unknown
                            Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:PostScript document text
                            Category:dropped
                            Size (bytes):0
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:
                            MD5:B60EE534029885BD6DECA42D1263BDC0
                            SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                            SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                            SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                            Malicious:false
                            Reputation:unknown
                            Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:PostScript document text
                            Category:dropped
                            Size (bytes):10880
                            Entropy (8bit):5.214360287289079
                            Encrypted:false
                            SSDEEP:
                            MD5:B60EE534029885BD6DECA42D1263BDC0
                            SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                            SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                            SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                            Malicious:false
                            Reputation:unknown
                            Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):295
                            Entropy (8bit):5.369210030207719
                            Encrypted:false
                            SSDEEP:
                            MD5:D1FACA0E324DD006BD65B885D5EA615C
                            SHA1:73A4D3642BF97713632279D371349B6CA6941B13
                            SHA-256:9BE7E79B35EF1BA8B888726F5A52C958634BC321A1B19B3835AD0E6E0009EF0A
                            SHA-512:712B50BCD4905651917A44400C57CFC4CCDC1EE0323E6C8328A981806909C3FEA240D454DCED80F02D95325B43F2FDF2256C97612B10F0F3D0F7387BFF13967C
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):294
                            Entropy (8bit):5.318371167532644
                            Encrypted:false
                            SSDEEP:
                            MD5:8007E7F9753E90C168C3D2286DFF4A53
                            SHA1:0631075A564B2A5C585E2E179CB2C83909B0472E
                            SHA-256:3C765952C3482A9E2CB38E7B0EC1F8DEBE2B740E3DA03A7ECBB33C866D2F8C4B
                            SHA-512:03192EFF2DB6ABC45790291AF1BB78F1C4982F0E7FC60F47926A6B3AE70CE1EC1454D2EA8AF1C0103A4F9B110FACD2A482560DE40E9963664566544EB4B31ABA
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):294
                            Entropy (8bit):5.2970773817595225
                            Encrypted:false
                            SSDEEP:
                            MD5:956D02DB7073A3EEB9CC2F4FBBCC728F
                            SHA1:5BCAC4797EE46D66864243C5313C65F56B51DAC4
                            SHA-256:A8DEB58586515E26FC18F6E43F9E81F22F5211B4261AAF496A39A2C949AB5505
                            SHA-512:D2A569C9CCDD68EE015AAD65EDD09DF021F9B39E90898E1AABCA15E22D4A051B8DFDDD569747947EB3095271A1B32E24DE03DC8D9098A0376831FE747B43CE6E
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):285
                            Entropy (8bit):5.35551165937089
                            Encrypted:false
                            SSDEEP:
                            MD5:BD7292F9D63DCCF9F528DD7E9C1846F2
                            SHA1:35E0E83642D6F514C67B0B2265051F60E9280184
                            SHA-256:A0B73D099E5ABD5E0F0E1756D7FEFBCC9665A585C99416CC4300B47FF4BEC195
                            SHA-512:CBE01F83A1DA0E8173F0B3E08D1EDCD1E77C6C059A34DDDE2F595B6C717D3865069367F98E65B7B18773D2829242BF8B538390015CC05CD5AD789C6076176A87
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):1123
                            Entropy (8bit):5.694883643888607
                            Encrypted:false
                            SSDEEP:
                            MD5:F1D1DF815C5D5BE4221752DC71E547A8
                            SHA1:6629C1CE5B2E6808B496A6FC4CF0D0CA645EFDA3
                            SHA-256:35B36FA00E500E2548A0FEFD130823AC71B6BDB2F32FB5E90D3C281E059D9F39
                            SHA-512:EBF31DBB02E1FE283E2C70984C1415AF466DCA2A62AB392C5E87168703D9445CCFFB0FADE5D12E63BCD11DEE8727F5D523A5C7E9D1425CA3C6430C9FC55AF3E0
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_1","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"d5bba1ae-6009-4d23-8886-fd4a474b8ac9","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IkNvbnZlcnRQREZSZHJSSFBBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkV4cG9ydCBQREZzIHRvIE1pY3Jvc29mdCBXb3JkIGFuZCBFeGNlbC4ifSwidGNh
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):289
                            Entropy (8bit):5.306203529741759
                            Encrypted:false
                            SSDEEP:
                            MD5:113A9D8CE14382E77605CC25A6AA8646
                            SHA1:FDB6DC9292006FD43861FCC02531C086213EAFD7
                            SHA-256:EDB5F2E9AE3B7C8152DE0E97A76A85D846E1451AD5073E4F9C8AABB9D664D8CD
                            SHA-512:29E3BC3301C31750400EC446E99B6D89D3F23D188E38E51130BC82B423EFB7827ED36067004EB2D99F0890BF1F3109A7C4BB1C640C9E2C3A88B670EA6D66D521
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):292
                            Entropy (8bit):5.307403993660447
                            Encrypted:false
                            SSDEEP:
                            MD5:ED4C12E64B814D2429C5E82CF5D4825E
                            SHA1:68EA46865F4A4D38505A5F4614829BA25F94B4E9
                            SHA-256:372E827C0D5C40C1E6ABAA02B86D7D44F3B445E339750D59C1CDABC0C0B35DC1
                            SHA-512:157597A67E2EC4A8C7C9947DB10C0F91FCAC22FE8A33F84B812AA82F1AFDC2BFB1C538A018B2D25AC6F6AA526927834072C090D8B844FA0FAFDAFA98758C72C4
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):289
                            Entropy (8bit):5.315632214308304
                            Encrypted:false
                            SSDEEP:
                            MD5:0E35CE19792D25434EC08D1DA20B1B9B
                            SHA1:967A1CF6525634FFFC816BCA7B55E642725A13F4
                            SHA-256:2F4D87CDD5BC575490556D849077CCD2E6394E61603218729BB6A59434424203
                            SHA-512:0D327B1C8FE060033EB8DE1B0C7F61E37053AA6753C956C5509F00AAF01AFEB06139E819446CF2D8833D49FD5ACD7BA718E6194917F1CC96C6654DF8DC745EDD
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):295
                            Entropy (8bit):5.332007386109907
                            Encrypted:false
                            SSDEEP:
                            MD5:6CB6E85BA785824A5D25CAE0EF0461D5
                            SHA1:A8336AAB82A265718F501015D27EC8C835B90491
                            SHA-256:D157287546AC50492262D7F607CB807EE0D1F77CA9E4B72994302FBC112149E0
                            SHA-512:025FB9294D1926787120BA94EA3238F12D4C7A2D6F8D5AC119AA68DB10F11EF32EA258010172DFC1A8F0E506B11AFB359B013D496CD7E0D0784337F32747EE7A
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):289
                            Entropy (8bit):5.312913629198985
                            Encrypted:false
                            SSDEEP:
                            MD5:7AC02996BE39EB15AA99FEE9E0F656F2
                            SHA1:A8CA6EA32BC56C2922A899EF2C0A64F3248762B2
                            SHA-256:8DDE17884475D67353B6FB60DA61249AF909EA841C34875CD40315F8D608EDF6
                            SHA-512:EA135AFB93205F28AD8FE9F4EDDCE17B818C54F3E578290F8A8FB9A95414231C87BE9450F62E109A0FDEEDE98F3C0189BBA2F0B199445AD3190BA4B6FAD5EECA
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):284
                            Entropy (8bit):5.299191354648601
                            Encrypted:false
                            SSDEEP:
                            MD5:6AB65BBC67F93CA762D58E5333BA7D5C
                            SHA1:48B868A946F1EDAAFBE82EAD04BEAF089B4FA7FD
                            SHA-256:B12183ED853C2D5C31ADCAC05AF43A2628518D2764BD59389F7EE882C7D1F468
                            SHA-512:8B3F4E4025289234367E78FF5EBFC637DF1642773477DE9B6027953B9978905624C27B35DEC9D7A56E5014B5C8E4C1E71ADED77B813F28E992C89D53284C4A88
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):291
                            Entropy (8bit):5.296371973407562
                            Encrypted:false
                            SSDEEP:
                            MD5:533992AF9D65071483CAFD231C8DFD59
                            SHA1:FADB5DC4EBC8B46EF0ABD95089F4C0D1E1BF3619
                            SHA-256:C462460922A802484A92B4D3D814CF123136F455CF83D8D4CFFEB06E0A351F09
                            SHA-512:F5AF273F73BF727B54651060BE8890D6BCBA28023F6CB51F73FBB70EF7364EFF3A06988CAD5241AD4C9D626F91F73A2EFCF7CC2397EC27EE5B63FD59275A5B11
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):287
                            Entropy (8bit):5.298223936603584
                            Encrypted:false
                            SSDEEP:
                            MD5:E92922E823D21669F72174A5CCC4DC73
                            SHA1:31E9EDA1E9BFCD833B46D32295985C1AAA2615AE
                            SHA-256:56898BC6347BEB7A966A287D910780A82E1F20D36B1DB61CB90A31E10B7EF153
                            SHA-512:EAA77B26339E99F769A30CB5A14E70FDFEAD202C6BA4F7EC3417E8A089CF3D39C4C451CD8BCF0F26F9B4E5880FDB74173CDA323174698CDD5211DAB2315791D9
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):1090
                            Entropy (8bit):5.670107703601912
                            Encrypted:false
                            SSDEEP:
                            MD5:D75A02F6F34077156375729A74329866
                            SHA1:F09CCA59B10DEBDE5DB0712FC290D17E35C49C17
                            SHA-256:E1830DCC636B9BE9B71F7E37A5997AAE439B3F53E112CDD6C7F8791D9FCC0081
                            SHA-512:69DD952E2B05F097D57F07FFF290714C4751715738DB192AAD7ABA66E94391045CEA64B9A5A7ACC072F3B42E170FC3796CF48725AE65A33C8580CCFEC0EBB37E
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_0","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"266234d2-130d-426e-8466-c7a061db101f","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IlVwZ3JhZGVSSFBSZHJBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVhc2lseSBmaWxsIGFuZCBzaWduIFBERnMuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"app
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):286
                            Entropy (8bit):5.273603436300346
                            Encrypted:false
                            SSDEEP:
                            MD5:5D078EFDEF6B808BE07E7FBB625EB23C
                            SHA1:655F25747FA57A905EE2268CA35BD4B5ADDC1895
                            SHA-256:E2D9FFDBD02D6E35CFE6E4B9BA6E378359579DA54CF6501DDBD6E7BB9E1189C6
                            SHA-512:271B127374EBFC022C510E0E680A0CD4A2803064B973BC0E1D1045EB3F5549F43AC76C25D6F7FE08F397EE78E5ACE336B247CC80E1859B853E8F94787EF62711
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):282
                            Entropy (8bit):5.28216334996507
                            Encrypted:false
                            SSDEEP:
                            MD5:D968743ED23C294C5C76228882C9979E
                            SHA1:03A7588928CEFC8A7393F4A376F6125C11139F00
                            SHA-256:BD32A4FBE35EA64384C95B1BEA2446A104D58ABAD3FE994445E57B638121204F
                            SHA-512:4154AE0D5DD9DC31E1656BB2347F488BF1668F92A780EAAF56AB2B0702206F03957A98EE7139FA7173E56929F26D8A9CBC092B14605E438B4774F57464C6BB38
                            Malicious:false
                            Reputation:unknown
                            Preview:{"analyticsData":{"responseGUID":"59444674-377a-413d-a5fe-76b59d73322c","sophiaUUID":"94B2C178-E1F7-4D12-8BEA-76F4017C8DA0"},"encodingScheme":true,"expirationDTS":1736708742356,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):4
                            Entropy (8bit):0.8112781244591328
                            Encrypted:false
                            SSDEEP:
                            MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                            SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                            SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                            SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                            Malicious:false
                            Reputation:unknown
                            Preview:....
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:JSON data
                            Category:dropped
                            Size (bytes):2814
                            Entropy (8bit):5.12635166051587
                            Encrypted:false
                            SSDEEP:
                            MD5:4DF214F058DFDF5E33073669FD8F73FC
                            SHA1:B1114407F9BFCE0163F99B06FB47DF5F1C1CE700
                            SHA-256:0341A37C952627C120A5131BAD434C7225FB4D04C085BC17789798B28E8E2F31
                            SHA-512:1F05CBA0FBCD3FC4EE0E563B86FFBEB52C25CC54900875E0E64CE61C29890D21C128C7763412B49D58FFB668A90880B91C0DB39B69FD2BAD2550FA33DE326FE4
                            Malicious:false
                            Reputation:unknown
                            Preview:{"all":[{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"4ccd2203bc77b406598ab0d4de3fa8d1","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1736535551000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"cd0939dc798debd3f93fc2745f9818c5","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1123,"ts":1736535551000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"772ed0a17b51d5dccafd09fba3049ed5","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1090,"ts":1736535551000},{"id":"DC_Reader_Disc_LHP_Retention","info":{"dg":"630ba3034f1a3391b182792fc6ce78d8","sid":"DC_Reader_Disc_LHP_Retention"},"mimeType":"file","size":292,"ts":1736535551000},{"id":"DC_Reader_More_LHP_Banner","info":{"dg":"4c25ce3905de70a5a70929ff2594cafe","sid":"DC_Reader_More_LHP_Banner"},"mimeType":"file","size":289,"ts":1736535551000},{"id":"DC_Reader_Edit_LHP_Banner","info":{"dg":"65246cd791536f5bda23e43f7b0f21b2","sid":"DC_Reader_Edit_LHP_Banner"},"mimeType":"file","
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 23, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 23
                            Category:dropped
                            Size (bytes):12288
                            Entropy (8bit):1.3571672784043673
                            Encrypted:false
                            SSDEEP:
                            MD5:96CE7CDDE8B7355F793E1692EECE8010
                            SHA1:2286C0FF03171FCB31B7914F1F3086D83E54A482
                            SHA-256:1A14DC4266FF991D9DBFCBB4AEA197C50DE638FA1B2197D3A308E2DDCF8DB0FD
                            SHA-512:9BDC92D69E0348945BC6D6C154C2118164FBFDE4DFF19E062058AF866565C4B42DFE76EA6A5CF82A50CB13386A9419956B07AC79DC8B53C5FA4CF7B29B6ACB45
                            Malicious:false
                            Reputation:unknown
                            Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:SQLite Rollback Journal
                            Category:dropped
                            Size (bytes):8720
                            Entropy (8bit):1.8285717260253673
                            Encrypted:false
                            SSDEEP:
                            MD5:DF4974F05F9AD2967E52C04CDD32C1D6
                            SHA1:706DB238ED24027B81A507672085F6F57BDC7077
                            SHA-256:F166E563579FF5FF626A51A4C0DCD6B87DF80C40F8359242813A5E4E78BA63F2
                            SHA-512:9C2FE9681DCEEEC1FB6FF14524A4B1AB7D24FCC98BC62B5924196E882B51E3A09A3BED215BD8301F51256EB01B8EB67013211DDE3AD61D53CCE8995EDD3E9427
                            Malicious:false
                            Reputation:unknown
                            Preview:.... .c..... .._......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................v.../.././././.-.-.-.-.-.-.-.-.-.-.-.-.-.-........................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):66726
                            Entropy (8bit):5.392739213842091
                            Encrypted:false
                            SSDEEP:
                            MD5:354340FCEEA17574C240A80EFB8B1BA7
                            SHA1:AF4EBF6233A3806237B1BAE9B2EBCE7DE86873FF
                            SHA-256:0E66AFAACE508377C7CE45A5B95C44807ADA145DF1AD36BE06FD2EA20FAB89BA
                            SHA-512:CD4980A213F18A489868E2CC81E1303452019DEACA0695ACCB0B42F40A8B19A92B438E1FA277F052E9A589EEDFE104405033C311F2345A3FBC5A4EF631E90E6E
                            Malicious:false
                            Reputation:unknown
                            Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):246
                            Entropy (8bit):3.5136057226030957
                            Encrypted:false
                            SSDEEP:
                            MD5:79C407FAF34D9A33EFAA1B7A92E4BDA9
                            SHA1:EDB6902E7F4E3C0515FF5C46D1C970AC0A33310E
                            SHA-256:84B221F4196BA846BA7E7F3B4FAF8DFDB05AD5A0B0F62B0EDB5E8DC4DC7F77D2
                            SHA-512:505243D1CBDC5777DBB3EA1A68E246916FC2554CE14364B77DA6762184F6385F14A24DF02B519E7AA3563A64A927DAC0F107897DA2E294CF0508AB06C3E0F602
                            Malicious:false
                            Reputation:unknown
                            Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .1.0./.0.1./.2.0.2.5. . .1.3.:.5.9.:.1.3. .=.=.=.....
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:ASCII text, with very long lines (393)
                            Category:dropped
                            Size (bytes):16525
                            Entropy (8bit):5.359827924713262
                            Encrypted:false
                            SSDEEP:
                            MD5:06DEAEDB81D09FD8FB5FF668D8E09CB2
                            SHA1:28A02BCBD5975117B97A08AFB049F2C94F334726
                            SHA-256:D98DE785425112A2D7A41B16073812FA4FA4955F2D5139AE87C9A5FBC4717D64
                            SHA-512:948E3B56E5A8D818A5FE9D74B82A898F7264909ADF2C49E5D096CB90F4D28ED95990545A4857933F0E06D493AA0F6D41F6109C74B44BC0E4B84346B519681936
                            Malicious:false
                            Reputation:unknown
                            Preview:SessionID=c98ebd97-9477-4d7e-bd0c-12efa5f01bab.1696586972755 Timestamp=2023-10-06T12:09:32:755+0200 ThreadID=6536 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=c98ebd97-9477-4d7e-bd0c-12efa5f01bab.1696586972755 Timestamp=2023-10-06T12:09:32:756+0200 ThreadID=6536 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=c98ebd97-9477-4d7e-bd0c-12efa5f01bab.1696586972755 Timestamp=2023-10-06T12:09:32:756+0200 ThreadID=6536 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=c98ebd97-9477-4d7e-bd0c-12efa5f01bab.1696586972755 Timestamp=2023-10-06T12:09:32:756+0200 ThreadID=6536 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=c98ebd97-9477-4d7e-bd0c-12efa5f01bab.1696586972755 Timestamp=2023-10-06T12:09:32:756+0200 ThreadID=6536 Component=ngl-lib_NglAppLib Description="SetConfig:
                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):35721
                            Entropy (8bit):5.421411211792869
                            Encrypted:false
                            SSDEEP:
                            MD5:72A27871CFD9BC7565A0D800A827FAF1
                            SHA1:1EE257726DCB9072067EB6C1201FE0C243698BE5
                            SHA-256:60D4FB5B62D41CBFBE05B2AAFCEA2839F72C54743904A8C992242D7DC46E45D0
                            SHA-512:D1DBAE817E1A6FF61CDCC49895615823DDA9596505C1A59F5A4B48E166C38FC69F0ADECD4ED66B207C9E074D9C31620E19A44AA150FE37155056078D2FA8068F
                            Malicious:false
                            Reputation:unknown
                            Preview:06-10-2023 11:44:59:.---2---..06-10-2023 11:44:59:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 11:44:59:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 11:44:59:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..06-10-2023 11:44:59:.AcroNGL Integ ADC-4240758 : Starting NGL..06-10-2023 11:44:59:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...06-10-2023 11:44:59:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..06-10-2023 11:44:59:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..06-10-2023 11:44:59:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..06-10-2023 11:44:59:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..06-10-2023 11:44:59:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..06-10-2023 11:44:59:.Closing File..06-10-
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:GIF image data, version 89a, 15 x 15
                            Category:dropped
                            Size (bytes):663
                            Entropy (8bit):5.949125862393289
                            Encrypted:false
                            SSDEEP:
                            MD5:ED3C1C40B68BA4F40DB15529D5443DEC
                            SHA1:831AF99BB64A04617E0A42EA898756F9E0E0BCCA
                            SHA-256:039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A
                            SHA-512:C7B765B9AFBB9810B6674DBC5C5064ED96A2682E78D5DFFAB384D81EDBC77D01E0004F230D4207F2B7D89CEE9008D79D5FBADC5CB486DA4BC43293B7AA878041
                            Malicious:false
                            Reputation:unknown
                            Preview:GIF89a....w..!..MSOFFICE9.0.....sRGB......!..MSOFFICE9.0.....msOPMSOFFICE9.0Dn&P3.!..MSOFFICE9.0.....cmPPJCmp0712.........!.......,....................'..;..b...RQ.xx..................,+................................yy..;..b.........................qp.bb..........uv.ZZ.LL.......xw.jj.NN.A@....zz.mm.^_.........yw........yx.xw.RR.,*.++............................................................................................................................................................................................................8....>.......................4567...=..../0123.....<9:.()*+,-.B.@...."#$%&'....... !............C.?....A;<...HT(..;
                            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
                            File Type:data
                            Category:dropped
                            Size (bytes):47577
                            Entropy (8bit):7.940484405441777
                            Encrypted:false
                            SSDEEP:
                            MD5:9E6B75E73EAA7C705DED58B33A156350
                            SHA1:A51E0975F5FC1903573511FF3439DBD9F5DF04F1
                            SHA-256:C2817E8BE49256F85369F8B4C5ABB86C425E734BF122049BD584118F01B8E36B
                            SHA-512:58DECCA7A90B35B2BF76EFCF988DB461AAB0D7BD945A62750CD940170C1CB28D23C90716F9EB995E48DA89C58628D43C1A3EDEF54A2C54325A6B8366F0A2275C
                            Malicious:false
                            Reputation:unknown
                            Preview:.lI..&6.ak..M.p?...2y.t..wU...|.;.j..?.b....X.1..]......k.X....7.E.w....U..q....;.I.?....Q..$Z!....M.h.Z !.k.u.V.Z..........!.n.......@-#.g.)..|.....h....FA.E..;.-a..F(z.1....Mx^4.#.t..Q..dwp..zB......Z......... .IDAT.hBb.,..y0..PA..."H.....F.".2<C$2.M..i.W......w"X.......t...N..1.:......,...o).L..`D.nd..[...HQ.]vy.M....-.W...g.4.>..`3?...6E'%T+S4......X.=.j/..i4\.\.B..,?...'...,......7Z.O......k.6.FO....<....p|.....).a....Am.o.E....$.j..........:.....?[..G.......v...M7.@..uZW......5..B.....Z..Y....m..qv..9.9C.."..J.......,.U3....&Ih.6...~.4G..g.5_....=.C.G...2m.h8......IG........Ec?;T.!..#....4e.B..b.......h.M.H..k..b#.9.7i.S..n.........p.F...3..1...c.Y..AL;*]..r.=BkB.i..B..'.C..y>l..,t.).bBn&5v...\.!"m.B..q.,.H.i..."...z.1......\.!.e...ED..D"#.....Os..U.l]...T.)......:Hj.....|....v.Y..@.+.k....o..h.s.c..Cb.Jt.j.9O..;.@2.4..,E.....u.......n@..3h.=............v.........F....0..Y..s..v...2).5......B:.v..|B.\....0...5.....
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 17:58:44 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2677
                            Entropy (8bit):3.9958690458949007
                            Encrypted:false
                            SSDEEP:
                            MD5:53CA9229CC0122B379D7C7ACA89D4FC8
                            SHA1:EF9EB024CBBB533EE4A8D872E8F3898DF4BBF33E
                            SHA-256:0A81AE1A2510B2FFBD5D07776538E88B30BDCE9799142A8216217013E194C2AF
                            SHA-512:DA044774F1DA46EEE350BA06469C45AD5CBDBD4598D315484D0C3511EB6ECFF495D30A690532420B3CB0E7684C5AC014195C95FABCEB02157DE8E2BD7C045BC2
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,.....T.c......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I*Z<.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*ZU.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V*ZU.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V*ZU............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*ZW............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............(.:.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 17:58:44 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2679
                            Entropy (8bit):4.010503217135991
                            Encrypted:false
                            SSDEEP:
                            MD5:9D0AC8907C193B491E9AD591F8233413
                            SHA1:389DD93D7C3C9C233564F07DCCCF056D91005270
                            SHA-256:05A003B5F9C12D0E69D9343A59091AB293847EF1F503A7A320E445E4A80B7A2C
                            SHA-512:C856B1FD033A133E013FE0728227D95D9B1CF888E53C0C0F8FD17D016099F1C8DCF13D5E3D866DC41F49582018156072CAACDF9062CA3C1B7E53E582B085B899
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,....V...c......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I*Z<.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*ZU.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V*ZU.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V*ZU............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*ZW............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............(.:.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2693
                            Entropy (8bit):4.020387039085462
                            Encrypted:false
                            SSDEEP:
                            MD5:C09EE7847E2BE220EF28D8E427F3EC57
                            SHA1:BCF5BA8CA10E2D8412DD6A3BCD6DF80E066B66E9
                            SHA-256:34D79A4184B95482E8457CF8272DC4146ECA310157A186262350F69C8F0C1FDA
                            SHA-512:591F66E1730BCDC1E657549F0A2335DDD85A2A66D6723D28B672C72C2E03265EAABE58234813113C7EBFD403FC11D7911CF53CB53528E3005B5954194DD6E926
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,.....v. ;.......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I*Z<.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*ZU.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V*ZU.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V*ZU............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.VFW.N...........................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............(.:.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 17:58:44 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2681
                            Entropy (8bit):4.007100584914501
                            Encrypted:false
                            SSDEEP:
                            MD5:9258AACD8A1049F023E8865210E21810
                            SHA1:3E8E07EA24724CCEBCA657F098E4C05C05B9E395
                            SHA-256:ADB57F46767721D4D75C9A07FACCFA375F39C0188762CECEB6540EA38F7333ED
                            SHA-512:956E55A831A2FC9BF6F70FB25BEA55DD01E83BF3B0F2AF14743BF9AD84B6AD57A88C0F3454E4E9591646A2C5775569DEDC8A9EEAD187C3A7DF741971C445DF48
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,.....m..c......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I*Z<.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*ZU.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V*ZU.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V*ZU............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*ZW............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............(.:.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 17:58:44 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2681
                            Entropy (8bit):3.9964732853248144
                            Encrypted:false
                            SSDEEP:
                            MD5:1451BFDAA5FB04AD876CABC53B112C1F
                            SHA1:AE9BF90EE87977A658164043E66BD9CB64508CB2
                            SHA-256:3383672913775BD84C3944813BF9AE79F6EB29D9C005014D2FAA251E8EDBFC3F
                            SHA-512:9E25D034AB3211D135F6D1284E85582A876780DEC3546B892CF0D96A2192B423C0D60C4F3940B62BFBF83F8DE0E271DD77D716C6497B599EB06807CB8BAD3EC2
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,....0w.c......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I*Z<.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*ZU.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V*ZU.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V*ZU............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*ZW............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............(.:.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Jan 10 17:58:44 2025, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
                            Category:dropped
                            Size (bytes):2683
                            Entropy (8bit):4.009214034260711
                            Encrypted:false
                            SSDEEP:
                            MD5:11C7BEB06910C322C3FB3EFCCA0A2CF7
                            SHA1:2C9CD0E4D40255BEDDAAD19D5961B4F50D1E9762
                            SHA-256:CEFFCBB55AB56BAC583815D922D36C44460829DCBE070C80A5611819C910C91B
                            SHA-512:DA9E911BC120BB5B316132F2261B1B42718ECC510C7F9DC4F20A8B3E500EEF5F67821AEA471B69D70920C34501A270B9FFCFAD486B4C3033CB8DA32BBD8BBB22
                            Malicious:false
                            Reputation:unknown
                            Preview:L..................F.@.. ...$+.,....C...c......y... w......................1....P.O. .:i.....+00.../C:\.....................1.....FWoN..PROGRA~1..t......O.I*Z<.....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V*ZU.....L.....................p+j.G.o.o.g.l.e.....T.1.....FW.N..Chrome..>......CW.V*ZU.....M......................W..C.h.r.o.m.e.....`.1.....FW.N..APPLIC~1..H......CW.V*ZU............................W..A.p.p.l.i.c.a.t.i.o.n.....n.2. w..BW. .CHROME~1.EXE..R......CW.V*ZW............................3.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............(.:.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:HTML document, ASCII text
                            Category:downloaded
                            Size (bytes):210
                            Entropy (8bit):5.098105294030167
                            Encrypted:false
                            SSDEEP:
                            MD5:05DA576EB71641B10811A1AEF60A853D
                            SHA1:5E7C7F426430C30209FE270AB129A9C0100BDEE9
                            SHA-256:58B98E11D36F9689D4AF3C1CB3755528817709300FACF6D314C99CE91BD90B4B
                            SHA-512:2DAC5452E42E24043F512741B01E08CDEE464771A13C2D38D3F9958F75FCEA079F67A7B704AC6753C0BAB02DFDDD434AE7024D4674E3A532A70D50C5D6A72937
                            Malicious:false
                            Reputation:unknown
                            URL:http://4.zsi0z.mudassarseotools.com/t/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12
                            Preview:<script>.setTimeout(function(){. window.location.href = '/news?q=IP provider is blacklisted! LEVEL3'; . console.log('redirecting to /news?q=IP provider is blacklisted! LEVEL3');.}, 1000);.</script>.<p></p>.
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:XML 1.0 document, Unicode text, UTF-8 text, with very long lines (9080)
                            Category:downloaded
                            Size (bytes):208259
                            Entropy (8bit):4.78016065570557
                            Encrypted:false
                            SSDEEP:
                            MD5:17E06DE6CC087F78D643047B4883C5A0
                            SHA1:F3C8CD3DCE508E63B4B253C11EBDDC066EA87CD2
                            SHA-256:4A47E70D1C34D4A4C88A137FF16EA67DC251A553C585E3BCC2A8CB269DFF0702
                            SHA-512:31222F86729BEFE9D510383AA9DBAE941D000B0ADD28AD6E26B866917ED10DDFDBBF66B252CDE1E1FC5A3116C797B880A2570BD963583E19F4E42A6EF34F86E6
                            Malicious:false
                            Reputation:unknown
                            URL:https://moxie.foxnews.com/google-publisher/world.xml
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>.<rss xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">. <channel>. <title>Latest World News on Fox News</title>. <link>https://www.foxnews.com/world</link>. <description>See the latest world news and international news on Fox News. Learn all about the news happening around the world.</description>. <copyright>Copyright 2025 FOX News Network</copyright>. <language>en-us</language>. <pubDate>Fri, 10 Jan 2025 12:40:23 -0500</pubDate>. <image>. <url>https://global.fncstatic.com/static/orion/styles/img/fox-news/logos/fox-news-desktop.png</url>. <title>Latest World News on Fox News</title>. <link>https://www.foxnews.com/world</link>. </image>. <atom:link rel="self" href="https://moxie.foxnew
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:HTML document, ASCII text
                            Category:downloaded
                            Size (bytes):3190
                            Entropy (8bit):4.575314545920534
                            Encrypted:false
                            SSDEEP:
                            MD5:60BD26B073F36686FC3C652B95658AB6
                            SHA1:D63D6B893EC8A94A80BE93CD282CF393292CD7CA
                            SHA-256:DAFA1CA46E223B186E9553839D8DACD1B7AFDF0BE959863983814F01FBA7E904
                            SHA-512:C4C73E9EC0BB57C8DF84BBA68B63DB4CF73152D8663BA6B1669DEFB12427A81504A5FB193A25200DF798B97620C2209524672660EEEE4AF670544931F1AE154C
                            Malicious:false
                            Reputation:unknown
                            URL:http://4.zsi0z.mudassarseotools.com/news?q=IP%20provider%20is%20blacklisted!%20LEVEL3
                            Preview:<!DOCTYPE html>.<html lang="en">.<head>. <meta charset="UTF-8">. <meta name="viewport" content="width=device-width, initial-scale=1.0">. <title>Fox News World RSS Feed - pixmafr.com </title>. <style>. body {. font-family: Arial, sans-serif;. background-color: #f4f6f9;. color: #333;. margin: 0;. padding: 0;. }.. .container {. width: 80%;. margin: 0 auto;. }.. h1 {. font-size: 2rem;. margin: 2rem 0;. }.. .news-item {. background-color: white;. padding: 1.5rem;. margin-bottom: 1rem;. box-shadow: 0 1px 3px rgba(0, 0, 0, 0.12), 0 1px 2px rgba(0, 0, 0, 0.24);. }.. .news-item h2 {. font-size: 1.5rem;. margin-bottom: 1rem;. }.. .news-item a {. color: #1a73e8;. text-decoration: none;. }.. .news-item a:hover {
                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                            File Type:HTML document, ASCII text, with very long lines (398)
                            Category:downloaded
                            Size (bytes):458
                            Entropy (8bit):5.131460290374407
                            Encrypted:false
                            SSDEEP:
                            MD5:0A3E69B8B37A6DF0ACD7E7F5D9D3B854
                            SHA1:680DE96CFE2AFF1B030BFBD4A7CFA2529993EA61
                            SHA-256:0F3A07F36D6BDDEE418F7D7548BC165B09817E10764A359D2773388CDEC9FF8A
                            SHA-512:9C5C0679E082A5776536835110B90436CD6531E3B2C4FC7A15BDCE7F550D6647447C904E68D660FAF81E39C108E17198830E8B133E86D8559180FA6FB5CE25C7
                            Malicious:false
                            Reputation:unknown
                            URL:http://4.zsi0z.mudassarseotools.com/4kjDAy3639VmJk85vofswjxkgk266BQUJHXBRENVECWI35164FGOY15860L12
                            Preview:<script>.let e=new URL(window.location.href);e.pathname="/t"+e.pathname;let o=e.toString();navigator.cookieEnabled&&!function(e){for(var o=["googlebot","bingbot","yandexbot","duckduckbot","slurp","baiduspider","facebot","ia_archiver"],t=e.toLowerCase(),n=0;n<o.length;n++)if(t.indexOf(o[n])>-1)return!0;return!1}(navigator.userAgent)?setTimeout((function(){document.location.href=o}),1e3):console.log("bt");.</script>..<p style="color:gray;">redirect...</p>.
                            File type:Unicode text, UTF-8 (with BOM) text, with very long lines (347), with CRLF line terminators
                            Entropy (8bit):6.144977605877702
                            TrID:
                            • Text - UTF-8 encoded (3003/1) 100.00%
                            File name:Message 2.eml
                            File size:330'721 bytes
                            MD5:558474cdae29ce079570d5e0e5a803b2
                            SHA1:e2adf8441504c37f2b3908bbf1cc418abcaf971d
                            SHA256:ce697e07dc6cea1a05b55600914f3df73d9ee656c402739d7a569bd0c4719a6e
                            SHA512:9d46d26f65bc45c97c46a37468d3a617f285e7a4b450ba28ce4c4c0a778a3f29ebe83340294eca919ef4f61d157520aaadd00f89fd219399f039dbf3d3c7488c
                            SSDEEP:6144:mAr/L4RVT4HsZxd4faL169He5XrfA1CmWvVKhg:mAr/L4bN74iL16JexrfsqdKhg
                            TLSH:4C640278ACAB75BECBA232F6FC15BC42F1E1CC8AD1A752C0712D836619CB0B49B14D55
                            File Content Preview:..."Received: from PH0PR10MB4773.namprd10.prod.outlook.com (2603:10b6:510:3e::22).. by PH7PR10MB6459.namprd10.prod.outlook.com with HTTPS; Fri, 10 Jan 2025.. 18:14:34 +0000..Received: from BN9PR03CA0655.namprd03.prod.outlook.com (2603:10b6:408:13b::30)..
                            Subject:RE: Urgent: Youre Missing Out on Major Rewards! -----3SN7
                            From:PREDATOR 3500 Watt Inverter Generator Winner Announcement!--ghMLB <JANISBROWN.276@andqwrdt.tkmoto.top>
                            To:sharris@biolegend.com
                            Cc:sharris@biolegend.com
                            BCC:sharris@biolegend.com
                            Date:Fri, 10 Jan 2025 13:18:54 +0000
                            Communications:
                            • Good morning, Please see several updates below. If anyone has identified any concerns as their preparedness activities have progressed and the forecast has changed to more ice, please reach out directly to us. We will not hold a coordination call today as many of you will be on internal and external calls with various groups. * The AM weather briefing is attached. Increase to snow/ice amounts with potential of ice accumulations in excess of 0.25" possible. * The State Emergency Operations Center (SEOC) will be Activated from 0700 on 10 January 2025 through 1900 on January 12, 2025. * CapRAC On-Call - 919-350-7887 Key Messages from weather briefing: 1. Light to moderate snow will move into central NC from SW to NE between 3 PM and 8 PM Friday. Triad: 3 4 PM, Triangle/Fayetteville: 5 7 PM, Rocky Mount: 7 9 PM. Some very light snow accumulations may be possible as early as 12 1PM in the Triad. 2. Don't focus so much on the exact snow and ice amounts that are forecast, but rather focus on the hazards and impacts. To that point, there will be enough snow and ice accumulations to result in hazardous travel conditions beginning Friday afternoon and lasting into Saturday. 3. Due to very cold ground temperatures, the snow/ice is highly likely to stick and freeze immediately and enable rapid accumulation. Black ice will be a subsequent concern Sunday morning and Monday morning. 4. There is still a large amount of uncertainty on location and amounts of greatest ice accumulations. Large changes in the forecast will be possible over the next 12 hours. Residents of central NC should have preparations complete by this afternoon and plan to avoid/delay travel Friday night into early Saturday morning. Thank you, Janis ----- Janis Cox Brown, MPA Supervisor, CapRAC Healthcare Preparedness Coalition WakeMed Health & Hospitals<http://www.wakemed.org/> 919.350.6265 (o) 919.630.6764 (m) -----Original Message-----
                            • From: nws.raleigh@noaa.gov <nws.raleigh@noaa.gov> Sent: Friday, January 10, 2025 8:00 AM To: nws.raleigh@noaa.gov Subject: NWS Raleigh - Weather Briefing Update January 10 08:00:01 AM WARNING: This email originated from outside WakeMed Health & Hospitals. Do not click on links or open attachments unless you are sure you recognize the sender and you know the contents are safe. The Original Sender of this email is nws.er.rah.partners+bncbcypzihbxebrbw5tqs6amgqefcyhtaa@noaa.gov<mailto:nws.er.rah.partners+bncbcypzihbxebrbw5tqs6amgqefcyhtaa@noaa.gov> A new briefing that addresses Central North Carolina Weather has been issued. To view this briefing see the attached file, or please click this link: https://urldefense.com/v3/__http://www.weather.gov/media/rah/briefing/NWSRaleighLatestBriefing.pdf__;!!JN6lrkDE!zU-2sufqsekJkKqEbMHeGQ8f1fTLqUFLu9biExXf4G_sPobG8LPHl4qq9p5xlli_M_NIVICOk-f4ivWgognCbC3M5g$<https://urldefense.com/v3/__http:/www.weather.gov/media/rah/briefing/NWSRaleighLatestBriefing.pdf__;!!JN6lrkDE!zU-2sufqsekJkKqEbMHeGQ8f1fTLqUFLu9biExXf4G_sPobG8LPHl4qq9p5xlli_M_NIVICOk-f4ivWgognCbC3M5g$> As always, if you have any questions, don't hesitate to call us. Useful links: NWS Raleigh web page: https://urldefense.com/v3/__http://weather.gov/Raleigh__;!!JN6lrkDE!zU-2sufqsekJkKqEbMHeGQ8f1fTLqUFLu9biExXf4G_sPobG8LPHl4qq9p5xlli_M_NIVICOk-f4ivWgogmH7ibqyw$<https://urldefense.com/v3/__http:/weather.gov/Raleigh__;!!JN6lrkDE!zU-2sufqsekJkKqEbMHeGQ8f1fTLqUFLu9biExXf4G_sPobG8LPHl4qq9p5xlli_M_NIVICOk-f4ivWgogmH7ibqyw$> NWS Raleigh on Facebook: https://urldefense.com/v3/__https://www.facebook.com/NWSRaleigh__;!!JN6lrkDE!zU-2sufqsekJkKqEbMHeGQ8f1fTLqUFLu9biExXf4G_sPobG8LPHl4qq9p5xlli_M_NIVICOk-f4ivWgogkyLxLE2Q$<https://urldefense.com/v3/__https:/www.facebook.com/NWSRaleigh__;!!JN6lrkDE!zU-2sufqsekJkKqEbMHeGQ8f1fTLqUFLu9biExXf4G_sPobG8LPHl4qq9p5xlli_M_NIVICOk-f4ivWgogkyLxLE2Q$> NWS Raleigh on Twitter: https://urldefense.com/v3/__https://twitter.com/nwsraleigh__;!!JN6lrkDE!zU-2sufqsekJkKqEbMHeGQ8f1fTLqUFLu9biExXf4G_sPobG8LPHl4qq9p5xlli_M_NIVICOk-f4ivWgogmta6sqOg$<https://urldefense.com/v3/__https:/twitter.com/nwsraleigh__;!!JN6lrkDE!zU-2sufqsekJkKqEbMHeGQ8f1fTLqUFLu9biExXf4G_sPobG8LPHl4qq9p5xlli_M_NIVICOk-f4ivWgogmta6sqOg$> NWS Raleigh on YouTube: https://urldefense.com/v3/__https://www.youtube.com/user/NWSRaleigh__;!!JN6lrkDE!zU-2sufqsekJkKqEbMHeGQ8f1fTLqUFLu9biExXf4G_sPobG8LPHl4qq9p5xlli_M_NIVICOk-f4ivWgognrAEZ8dA$<https://urldefense.com/v3/__https:/www.youtube.com/user/NWSRaleigh__;!!JN6lrkDE!zU-2sufqsekJkKqEbMHeGQ8f1fTLqUFLu9biExXf4G_sPobG8LPHl4qq9p5xlli_M_NIVICOk-f4ivWgognrAEZ8dA$>
                            Attachments:
                            • Outlook-n41gului.png
                            • Harbor Freight Exclusive Offer.pdf
                            Key Value
                            "Receivedfrom PH0PR10MB4773.namprd10.prod.outlook.com (2603:10b6:510:3e::22) by PH7PR10MB6459.namprd10.prod.outlook.com with HTTPS; Fri, 10 Jan 2025 18:14:34 +0000
                            Receivedfrom CH2PR02MB6967.namprd02.prod.outlook.com ([fe80::f319:3b55:a859:f5f7]) by CH2PR02MB6967.namprd02.prod.outlook.com ([fe80::f319:3b55:a859:f5f7%4]) with mapi id 15.20.8335.011; Fri, 10 Jan 2025 13:18:55 +0000
                            Authentication-Resultsspf=pass (sender IP is 40.107.44.24) smtp.mailfrom=andqwrdt.tkmoto.top; dkim=fail (signature did not verify) header.d=wakemed.org;dmarc=permerror action=none header.from=andqwrdt.tkmoto.top;compauth=pass reason=111
                            Received-SPFPass (protection.outlook.com: domain of wakemed.org designates 205.220.177.47 as permitted sender) receiver=protection.outlook.com; client-ip=205.220.177.47; helo=mx0b-00589901.pphosted.com; pr=C
                            ARC-Seali=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=YL5DJOVMl4CCgvE9fj+/tSYLUkhVWWoeTeeBjqYcvOK82EQigdpkR1YdvcNQv1nQ3i3vtxrxEhh3Guum+pxHognLyiej6lytKQKLBQxdw3XEQbcxH7xDqhnSPrS43aWfFr6myJ/9L+DC011K7yUrMPHNfDxJ4nA/6imSHFNs90SRS1tPKpqAVRBAS0mQbdndzX8QtlRbM43tG9lzlw6Supl4HF44PWnoK2++KtzwIc9GcmkSXZy6qzZYzHtwOfNkzymZhMUdvwxIaA4Uxlqggmjle6Kt5/CYqGZhC9ARYnX6G3D4BmsXNie5JgZsrc56D2inBY8Xp/IzqzrytwldbA==
                            ARC-Message-Signaturei=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=8aUNYqzIpUh/mLxJUPmQ2KjGnHTPM7Y2a5JrOzB5wOs=; b=snZKx08X1ebAJaghEcygjgYHxJxuecTeq/iIwHqJoX99s1xjy4mUhqOvcQ8FTJM6mfSKHjWzvpH72h6y2GZY/IWB0PeVMS1zAQUjXrtgiTsNTwK3RxdXABA4Tzjs58P3OIJNfFm5/L1YFxmyZZlLpJqVmgf8qpLCluW2bkwGys4oSroLGsF8sKOYu/L6CCVrW9tMRj/T5ZgpO3GaaTMjBbXvt7jG9HsALxpkTtCvMdXKRTrXN9saKUstwRbsL8ahCDwE22mVjK+WL5ewWj4jDveV64waPnuwWLYe6VbaPt6Vze58poUSnTf5cAyMppLqXWDAv1Bix0NhsILFfylAxQ==
                            ARC-Authentication-Resultsi=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wakemed.org; dmarc=pass action=none header.from=wakemed.org; dkim=pass header.d=wakemed.org; arc=none
                            X-MS-Exchange-Authentication-Resultsspf=fail (sender IP is 185.246.85.51) smtp.mailfrom=andqwrdt.tkmoto.top; dkim=fail (signature did not verify) header.d=wakemed.org;dmarc=permerror action=none header.from=andqwrdt.tkmoto.top;
                            X-Mozilla-Status0001
                            X-Mozilla-Status200000000
                            Authentication-Results-Originalspf=pass (sender IP is 205.220.177.47) smtp.mailfrom=wakemed.org; dkim=pass (signature was verified) header.d=wakemed.org;dmarc=pass action=none header.from=wakemed.org;compauth=pass reason=100
                            DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=wakemed.org; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8aUNYqzIpUh/mLxJUPmQ2KjGnHTPM7Y2a5JrOzB5wOs=; b=4naW+TsZLIhXgxwlLaM2ooHa4Zp4Uf+EStdR/9L7PanmFciaR6gkGmXbaYarGRAUrXlAJwRNyyh+1T0omKCS5lhfAre9K1V+sQbSgySsVGA2nohVA812qgITuxU9bkhxOFhj2ftc8d52CB0iBJ6AgoBpbpkI09wvn2sWtyFIsq4=
                            FromPREDATOR 3500 Watt Inverter Generator Winner Announcement!--ghMLB <JANISBROWN.276@andqwrdt.tkmoto.top>
                            Tosharris@biolegend.com
                            CCsharris@biolegend.com
                            SubjectRE: Urgent: Youre Missing Out on Major Rewards! -----3SN7
                            Thread-TopicCapRAC Coalition updates: NWS Briefing 8AM, SEOC, CapRAC on-call #
                            Thread-IndexAQHbY2IyOSM6GeZwQUuQ7g0nFDTsKg==
                            DateFri, 10 Jan 2025 13:18:54 +0000
                            Message-ID<CH2PR02MB69676FC3A75yzqj41joxcb9592E0917A02C5BC31C2@CH2PR02MB6967.namprd02.prod.outlook.com>
                            References<678119d1.tw0ZF4fBSopq7K84%nws.raleigh@noaa.gov>
                            In-Reply-To<678119d1.tw0ZF4fBSopq7K84%nws.raleigh@noaa.gov>
                            Accept-Languageen-US
                            Content-Languageen-US
                            X-MS-Has-Attachyes
                            X-MS-TNEF-Correlator
                            x-ms-traffictypediagnosticCH2PR02MB6967:EE_|CYYPR02MB9888:EE_|BL6PEPF0001AB55:EE_|CO6P221MB0808:EE_|BN0P221MB0573:EE_|HK3PEPF0000021B:EE_|TY0PR04MB6592:EE_|BN2PEPF000055E0:EE_|PH0PR10MB4773:EE_|PH7PR10MB6459:EE_
                            X-MS-Office365-Filtering-Correlation-Id7e83669b-3956-4936-7889-08dd31a2969a
                            x-ld-processed4045d223-8b31-4c15-b863-ee20f3303bb8,ExtAddr
                            X-MS-Exchange-SenderADCheck1
                            X-MS-Exchange-AntiSpam-Relay0
                            X-Microsoft-Antispam-UntrustedBCL:0;ARA:13230040|41320700013|36860700013|34070700014|30052699003|35042699022|61400799027|82310400026|6140799039|376014|8135299006|8096899003|4076899003;
                            X-Microsoft-Antispam-Message-Info-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
                            X-Forefront-Antispam-Report-UntrustedCIP:185.246.85.51;CTRY:FR;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:prizmcom.com;PTR:kjgh.ofismoduli.baby;CAT:NONE;SFS:(13230040)(41320700013)(36860700013)(34070700014)(30052699003)(35042699022)(61400799027)(82310400026)(6140799039)(376014)(8135299006)(8096899003)(4076899003);DIR:OUT;SFP:1101;
                            X-MS-Exchange-AntiSpam-MessageData-Original-ChunkCount1
                            X-MS-Exchange-AntiSpam-MessageData-Original-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
                            Content-Typemultipart/mixed; boundary="_004_CH2PR02MB69676FC3A7592E0917A02C5BC31C2CH2PR02MB6967namp_"
                            X-MS-Exchange-Transport-CrossTenantHeadersStampedPH0PR10MB4773
                            X-Proofpoint-ORIG-GUID71vMt_vxniOoo8GsmlQtjTCJsS51YRa_
                            X-Proofpoint-GUIDTIUIJpZ8R10R_khseDlMxhjaF4USMNzh
                            X-Proofpoint-Virus-Versionvendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.60.29 definitions=2024-09-06_09,2024-09-06_01,2024-09-02_01
                            X-Proofpoint-Spam-Detailsrule=outbound_notspam policy=outbound score=0 mlxscore=0 phishscore=0 lowpriorityscore=0 impostorscore=0 mlxlogscore=999 priorityscore=1501 adultscore=0 spamscore=0 bulkscore=0 clxscore=1015 malwarescore=0 suspectscore=0 classifier=scan_limit adjust=0 reason=mlx scancount=1 engine=8.19.0-2411120000 definitions=main-2501100104
                            Return-PathJANISBROWN.654@andqwrdt.tkmoto.top
                            X-EOPAttributedMessage2
                            X-MS-Exchange-Transport-CrossTenantHeadersStrippedBN2PEPF000055E0.namprd21.prod.outlook.com
                            X-MS-Office365-Filtering-Correlation-Id-Prvs7f7c09f8-6d4e-418b-38ad-08dd31a29361
                            X-MS-Exchange-Transport-EndToEndLatency00:00:21.2938748
                            X-MS-Exchange-Processed-By-BccFoldering15.20.8335.010
                            X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003)(1420198);
                            X-MS-Exchange-Organization-ExpirationStartTime10 Jan 2025 18:14:13.7647 (UTC)
                            X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                            X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                            X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                            X-MS-Exchange-Organization-Network-Message-Id7e83669b-3956-4936-7889-08dd31a2969a
                            X-EOPTenantAttributedMessagefa246a9e-8fe0-4eed-9eec-93652a25c4ee:0
                            X-MS-Exchange-Organization-MessageDirectionalityIncoming
                            X-MS-Exchange-Transport-CrossTenantHeadersPromotedBN2PEPF000055E0.namprd21.prod.outlook.com
                            X-MS-PublicTrafficTypeEmail
                            X-MS-Exchange-Organization-AuthSourceBN2PEPF000055E0.namprd21.prod.outlook.com
                            X-MS-Exchange-Organization-AuthAsAnonymous
                            X-MS-Exchange-AtpMessagePropertiesSA|SL
                            X-MS-Exchange-Organization-SCL1
                            X-Microsoft-AntispamBCL:0;ARA:13230040|35042699022|5073199012|4073199012|4076899003|8096899003;
                            X-Forefront-Antispam-ReportCIP:40.107.44.24;CTRY:KR;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SEYPR02CU001.outbound.protection.outlook.com;PTR:mail-koreacentralazon11013024.outbound.protection.outlook.com;CAT:NONE;SFS:(13230040)(35042699022)(5073199012)(4073199012)(4076899003)(8096899003);DIR:INB;
                            X-MS-Exchange-CrossTenant-OriginalArrivalTime10 Jan 2025 18:14:13.2022 (UTC)
                            X-MS-Exchange-CrossTenant-Network-Message-Id7e83669b-3956-4936-7889-08dd31a2969a
                            X-MS-Exchange-CrossTenant-Idfa246a9e-8fe0-4eed-9eec-93652a25c4ee
                            X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIpTenantId=834fab4d-d063-416f-be32-2c02cf73e520;Ip=[185.246.85.51];Helo=[prizmcom.com]
                            X-MS-Exchange-CrossTenant-AuthSourceBN2PEPF000055E0.namprd21.prod.outlook.com
                            X-MS-Exchange-CrossTenant-AuthAsAnonymous
                            X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                            X-Microsoft-Antispam-Message-Info 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
                            MIME-Version1.0

                            Icon Hash:46070c0a8e0c67d6