Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
phish_alert_sp2_2.0.0.0.eml

Overview

General Information

Sample name:phish_alert_sp2_2.0.0.0.eml
Analysis ID:1543759
MD5:9bd574b882b28af5c9beab3daee6e57d
SHA1:222da480e782f8f2d03df51e627f02f2ba9fb5b3
SHA256:a96f33f9e0730c47457241b6fb829f46c67b13282123af107678cab592d63a7a
Infos:

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

AI detected potential phishing Email
Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Sigma detected: Outlook Security Settings Updated - Registry
Stores files to the Windows start menu directory

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6592 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\phish_alert_sp2_2.0.0.0.eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 6916 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "606F5C9C-E1F0-4BF6-89C0-6DAB45E415BF" "56446841-C234-4C9F-840E-C2B475B10F32" "6592" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • Acrobat.exe (PID: 4248 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\51GUIII9\????? ?????????? ??????_21337429345.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 6780 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 6724 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2256 --field-trial-handle=1576,i,1043786589874730688,4935669344658970160,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
      • chrome.exe (PID: 7556 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://qaz.is/load/sbKAaA/3f17f87a-a234-409b-bbd0-744b84a6a8a2 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
        • chrome.exe (PID: 7920 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1976,i,16319370167616673608,7253819963599798964,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6592, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
Source: Registry Key setAuthor: frack113: Data: Details: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\51GUIII9\, EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6592, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Security\OutlookSecureTempFolder
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 2.19.244.127:443 -> 192.168.2.16:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.19.244.127:443 -> 192.168.2.16:49710 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49727 version: TLS 1.2
Source: chrome.exeMemory has grown: Private usage: 1MB later: 28MB
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.0
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 2.19.244.127
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 80.87.203.251
Source: unknownTCP traffic detected without corresponding DNS query: 80.87.203.251
Source: unknownTCP traffic detected without corresponding DNS query: 80.87.203.251
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.10
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: x1.i.lencr.org
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownHTTPS traffic detected: 2.19.244.127:443 -> 192.168.2.16:49709 version: TLS 1.2
Source: unknownHTTPS traffic detected: 2.19.244.127:443 -> 192.168.2.16:49710 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49712 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.16:49727 version: TLS 1.2
Source: classification engineClassification label: sus22.winEML@35/41@3/177
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmp
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241028T0650380463-6592.etl
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.ini
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\phish_alert_sp2_2.0.0.0.eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "606F5C9C-E1F0-4BF6-89C0-6DAB45E415BF" "56446841-C234-4C9F-840E-C2B475B10F32" "6592" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\51GUIII9\????? ?????????? ??????_21337429345.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2256 --field-trial-handle=1576,i,1043786589874730688,4935669344658970160,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://qaz.is/load/sbKAaA/3f17f87a-a234-409b-bbd0-744b84a6a8a2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1976,i,16319370167616673608,7253819963599798964,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "606F5C9C-E1F0-4BF6-89C0-6DAB45E415BF" "56446841-C234-4C9F-840E-C2B475B10F32" "6592" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\msiexec.exe C:\Windows\System32\MsiExec.exe -Embedding 3FE70181C443FEA310043A807CD4C34E
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\51GUIII9\????? ?????????? ??????_21337429345.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://qaz.is/load/sbKAaA/3f17f87a-a234-409b-bbd0-744b84a6a8a2
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2256 --field-trial-handle=1576,i,1043786589874730688,4935669344658970160,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=1976,i,16319370167616673608,7253819963599798964,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dll
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dll
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{41945702-8302-44A6-9445-AC98E8AFA086}\InprocServer32
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common

Persistence and Installation Behavior

barindex
Source: EmailLLM: Detected potential phishing email: The email content appears to be corrupted or deliberately obfuscated with random punctuation and numbers
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformation
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Browser Extensions
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Process Injection
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
Security Account Manager14
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Extra Window Memory Injection
1
Extra Window Memory Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.214.172
truefalse
    unknown
    www.google.com
    142.250.185.228
    truefalse
      unknown
      default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
      217.20.57.34
      truefalse
        unknown
        windowsupdatebg.s.llnwi.net
        87.248.204.0
        truefalse
          unknown
          x1.i.lencr.org
          unknown
          unknownfalse
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            52.113.194.132
            unknownUnited States
            8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
            142.250.186.78
            unknownUnited States
            15169GOOGLEUSfalse
            142.250.185.228
            www.google.comUnited States
            15169GOOGLEUSfalse
            1.1.1.1
            unknownAustralia
            13335CLOUDFLARENETUSfalse
            13.89.179.14
            unknownUnited States
            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
            217.20.57.34
            default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comDenmark
            15516DK-DANSKKABELTVDKfalse
            172.217.18.3
            unknownUnited States
            15169GOOGLEUSfalse
            142.251.168.84
            unknownUnited States
            15169GOOGLEUSfalse
            2.23.197.184
            unknownEuropean Union
            1273CWVodafoneGroupPLCEUfalse
            80.87.203.251
            unknownRussian Federation
            29182THEFIRST-ASRUfalse
            239.255.255.250
            unknownReserved
            unknownunknownfalse
            23.43.60.134
            unknownUnited States
            20940AKAMAI-ASN1EUfalse
            142.250.185.142
            unknownUnited States
            15169GOOGLEUSfalse
            52.109.32.97
            unknownUnited States
            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
            18.207.85.246
            unknownUnited States
            14618AMAZON-AESUSfalse
            172.217.16.195
            unknownUnited States
            15169GOOGLEUSfalse
            52.109.76.144
            unknownUnited States
            8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
            172.64.41.3
            unknownUnited States
            13335CLOUDFLARENETUSfalse
            IP
            192.168.2.16
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1543759
            Start date and time:2024-10-28 11:50:07 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:defaultwindowsinteractivecookbook.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:20
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • EGA enabled
            Analysis Mode:stream
            Analysis stop reason:Timeout
            Sample name:phish_alert_sp2_2.0.0.0.eml
            Detection:SUS
            Classification:sus22.winEML@35/41@3/177
            Cookbook Comments:
            • Found application associated with file extension: .eml
            • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 52.109.32.97
            • Excluded domains from analysis (whitelisted): config.officeapps.live.com, prod.configsvc1.live.com.akadns.net, officeclient.microsoft.com, ukw-azsc-config.officeapps.live.com, europe.configsvc1.live.com.akadns.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtQueryAttributesFile calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            • Report size getting too big, too many NtSetValueKey calls found.
            • VT rate limit hit for: phish_alert_sp2_2.0.0.0.eml
            InputOutput
            URL: Model: claude-3-5-sonnet-latest
            {
                "explanation": [
                    "The email content appears to be corrupted or deliberately obfuscated with random punctuation and numbers",
                    "The sender email domain (saison-hoken.co.jp) appears suspicious and doesn't match the content context",
                    "The subject line is empty, which is unusual for legitimate business communication"
                ],
                "phishing": true,
                "confidence": 9
            }
            Is this email content a phishing attempt? Please respond only in valid JSON format:
                Email content converted to JSON:
            {
                "date": "Mon, 28 Oct 2024 13:37:20 +0300", 
                "subject": "    ", 
                "communications": [
                    " !      .       .  .     .       :     , . , 83,   ,         , . , 83,  !      .       .  .     .       :     , . , 83,   ,         , . , 83,  !      .       .  .     . !      .       .  .     .       :     , . , 83,   ,  ,                 , . , 83,      , . , 83,  "
                ], 
                "from": "     <m-fukuhara_i2833@saison-hoken.co.jp>", 
                "to": "Olena Kobryn <o.kobryn@gms-worldwide.com>"
            }
            URL: Email Model: claude-3-haiku-20240307
            ```json
            {
              "contains_trigger_text": true,
              "trigger_text": "      :     , , 83, ",
              "prominent_button_name": "unknown",
              "text_input_field_labels": [
                " ,",
                "  ",
                "  ",
                "    , . , 83, "
              ],
              "pdf_icon_visible": false,
              "has_visible_captcha": false,
              "has_urgent_text": false,
              "has_visible_qrcode": false
            }
            URL: Email Model: claude-3-haiku-20240307
            ```json
            {
              "brands": []
            }
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):0
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:
            MD5:BFB652DBCF7E7643997EA239E4C30E13
            SHA1:965006C5B966C8269A3352B969FEBDBD1E52B06C
            SHA-256:6C86AE678E80908CB89DB837E4BE16BB563E5CAE0025985018900E254B2A243E
            SHA-512:34216B4A37BB78BCE2A4FDE7489E30F9DEABE8132EBBB7727FDACA1981A7C2AE6D045D5588DA8480003EA3844B962F3B0F8844638C5D4AAC22205F3C01D19B8A
            Malicious:false
            Reputation:unknown
            Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13374672651117743","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":240083},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):403
            Entropy (8bit):4.986430275609588
            Encrypted:false
            SSDEEP:
            MD5:BFB652DBCF7E7643997EA239E4C30E13
            SHA1:965006C5B966C8269A3352B969FEBDBD1E52B06C
            SHA-256:6C86AE678E80908CB89DB837E4BE16BB563E5CAE0025985018900E254B2A243E
            SHA-512:34216B4A37BB78BCE2A4FDE7489E30F9DEABE8132EBBB7727FDACA1981A7C2AE6D045D5588DA8480003EA3844B962F3B0F8844638C5D4AAC22205F3C01D19B8A
            Malicious:false
            Reputation:unknown
            Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13374672651117743","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":240083},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:PC bitmap, Windows 3.x format, 117 x -152 x 32, cbSize 71190, bits offset 54
            Category:dropped
            Size (bytes):71190
            Entropy (8bit):1.2769780725047335
            Encrypted:false
            SSDEEP:
            MD5:B0AD94BA4858E9C35115D01D9D3E885B
            SHA1:E36592A4F7BE7BEB21FC09EECEDFCA26A867470B
            SHA-256:BC0AB4503C3FF4328A2FBDB8E401C6FCACA8ED1E306D016F2549B49A3C5E74A3
            SHA-512:9539ACA624A65DA527CC8F6DEE89D238E9C0A81859EC2B17DE624A730F123AD07A2EF1C9C51A44D27BD76789EAEC2FD023CF547FE1D4B00542195E20EE3B9915
            Malicious:false
            Reputation:unknown
            Preview:BM........6...(...u...h..... .............................................................................pF..pF..pF..qF..rF..rF..rF..rF..rG..rG..tG..uI..uI..tH..tH..uG..vH..wI..wI..wI..wI..wI..wI..wJ..xJ..zJ..zJ..zJ..zJ..yI..yJ..{J..{J..{J..|K..|K..|K..|K..|K..|K..|K..|K..}K..~K..~K..~K..}K..|L..|L..|K..|K..|K..|K..|K..|K..|K..{J..{J..{J..yI..yI..zJ..zJ..zJ..yJ..wJ..wI..wI..wI..wI..wI..wI..wH..vG..vG..tH..tH..uI..uI..uH..uH..sG..rG..rF..rF..rF..rF..rF..pF..pF..pF..........................................................................................................pF..pF..pF..qF..rF..rF..rF..rF..rG..sG..uH..uI..uI..tH..uG..vG..vH..wI..wI..wI..wI..wI..wI..wJ..xJ..zJ..zJ..yI..yI..yJ..{J..{J..|K..|K..|K..|K..|K..|K..|K..}K..}K..}K..}K..~K..~K..~K..}K..}K..}K..}K..|K..|K..|K..|K..|K..|K..|K..|K..{J..{J..yI..yI..zJ..zJ..yJ..yJ..wJ..wI..wI..wI..wI..wI..wH..vH..vG..vG..vG..tH..uI..uH..uH..sG..rG..rF..rF..rF..rF..rF..pF..pF..pF................................................................
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 2, database pages 14, cookie 0x5, schema 4, UTF-8, version-valid-for 2
            Category:dropped
            Size (bytes):57344
            Entropy (8bit):3.291927920232006
            Encrypted:false
            SSDEEP:
            MD5:A4D5FECEFE05F21D6F81ACF4D9A788CF
            SHA1:1A9AC236C80F2A2809F7DE374072E2FCCA5A775C
            SHA-256:83BE4623D80FFB402FBDEC4125671DF532845A3828A1B378D99BD243A4FD8FF2
            SHA-512:FF106C6B9E1EA4B1F3E3AB01FAEA21BA24A885E63DDF0C36EB0A8C3C89A9430FE676039C076C50D7C46DC4E809F6A7E35A4BFED64D9033FEBD6121AC547AA5E9
            Malicious:false
            Reputation:unknown
            Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:SQLite Rollback Journal
            Category:dropped
            Size (bytes):16928
            Entropy (8bit):1.2149186419550373
            Encrypted:false
            SSDEEP:
            MD5:CDB2298BF2392D28186A41526CF1F02B
            SHA1:973FB0568D914C4381F9879EC25DDAD32AF5338E
            SHA-256:B4635785BCEFEC5A3D6F6737034036E12B87B966F1EAC74280D5C93B6AAE0271
            SHA-512:E18833B598CA05E7D69E53D3134516CE97BEFC103618D0FEE493E4FD486188B4038543E1A6AFA99F5036627BD195EBADA6EC3F8F1209F67EEB193CA3A5908F17
            Malicious:false
            Reputation:unknown
            Preview:.... .c.....!h..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
            File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
            Category:dropped
            Size (bytes):71954
            Entropy (8bit):7.996617769952133
            Encrypted:true
            SSDEEP:
            MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
            SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
            SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
            SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
            Malicious:false
            Reputation:unknown
            Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
            File Type:data
            Category:modified
            Size (bytes):328
            Entropy (8bit):3.140290524202369
            Encrypted:false
            SSDEEP:
            MD5:4EF4F1EEEC66309CD20A33A9E948E2E9
            SHA1:7CBC1401C5F0D1C95D2AF265F84E120B56851651
            SHA-256:8888FF5382A6C4F7DFDA1E37CAFC092747301825DE403FDC411CB30CFCF15A69
            SHA-512:D6301A904053A82A855CA527E6AE4E74658B382E2009124995F00486E43CE7ADE98E2C5D2C134C19D84A9230A8F9E03B3B0C61956748ED157A84A4566377A221
            Malicious:false
            Reputation:unknown
            Preview:p...... .........r.W')..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):295
            Entropy (8bit):5.377000791558501
            Encrypted:false
            SSDEEP:
            MD5:6FA608C91555E34752701D00D1E80EDC
            SHA1:589B35B65C328EB7EDF65494757318A8D64F6BFB
            SHA-256:D16A13C0DE0AEB7DF3C03680E33A598494C90FD96C8D51E86B5CC07581625CAF
            SHA-512:EA19F1D9B160F8F2AAC8E095BD26A08D05CB31DEB8FE86935019981F75D7686DAB33570633983D4DEE0F39EDAE6B93C03C1B6432589F4FC5420CDA06D29CE420
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):294
            Entropy (8bit):5.3256705717457695
            Encrypted:false
            SSDEEP:
            MD5:DB2A438D1E7DE96D3709C95D94347A81
            SHA1:D2F4A1D796DE406CA263F9770CD8B748DC89CE15
            SHA-256:3E7DA37E1B83B1A102F186CAF821C277904D0905681C012A1B393C8FB4A5F3EB
            SHA-512:CBCEAC187E0BD07D8414260BBFBEE1C04BE9FC6B907A8F072EDC1CF585258A76200FEA8676155BE4C5F64746A1B9899818BDD54B43FDB58A84C17A2D074E2AF9
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):294
            Entropy (8bit):5.3048683197149735
            Encrypted:false
            SSDEEP:
            MD5:BAC8EA31B447831E6FCA74999635C3EB
            SHA1:477B259ECE043DF5B7F9672482806A6E724718AD
            SHA-256:81AB4C0F8EBEB812E9942335DF66F5F0AEA532A168344FA46B0F07A78DB69D87
            SHA-512:582A2C55B237180D8BEB09ED6DAE94CC35BF5B3AC724D57B82F158444E1CE4D90C2C618457E27A94089CEA65554E99DECF625116683276B92F10A8CD2A998C29
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):285
            Entropy (8bit):5.365859485746559
            Encrypted:false
            SSDEEP:
            MD5:980ACAF308E92CE07F080E7092B989A7
            SHA1:77112671DC9D881EFEA36EF00A7F4B906450E7A2
            SHA-256:B1EFF18637464402D6753DCE66F0B6ABE6F7120B1FCCB8B581DC1C13332B54BC
            SHA-512:E8B6A50A4C41CC259F97A702CDDF82BA7D0DE16CC763B3A93E328634F6E11620C631F26D712DAA3A2AD7BB2ECE4A9672A67655C7C242737E479C253581A87526
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):1055
            Entropy (8bit):5.662433303512702
            Encrypted:false
            SSDEEP:
            MD5:56D2FE7EAFD0F1EA39F27E2DA75DF583
            SHA1:D560B954E3671A21EED4EDB1F164E31F202840B6
            SHA-256:BD7A80470F6D0BA4ABA5BC8B9C94E3000B3ED535F89076E752DC46E2517FB15F
            SHA-512:74F0D0CB921A82976B3BDBEC1BAB8ED7903787DEDA7DCDBEA5619F68AE6C5CAD5143293D861B645FBE356680F08EAEF8715E85657FA4795F8CB240C6115E552F
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"92038_285529ActionBlock_1","campaignId":92038,"containerId":"1","controlGroupId":"","treatmentId":"eb1a4bce-8215-46f1-b44c-154b21a85d60","variationId":"285529"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkV4cG9ydCBQREZzIHRvIE1pY3Jvc29mdCBXb3JkIGFuZCBFeGNlbC4ifSwidGNhdElkIjpudWxsfQ==","dataType":"application\/json","encodingScheme":tr
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):1050
            Entropy (8bit):5.656710691380238
            Encrypted:false
            SSDEEP:
            MD5:E28122C737F7EB5FBB1320A9DF1FFE45
            SHA1:0454CC1A62B3C4FDA9253C51CF4792CB8609D56E
            SHA-256:82B06118562E1AFC872F27FCB5172EACE050E97C618BA584B6D0CF3C73DDCDDA
            SHA-512:A6079B7D97DC080B19253045BB355F5EB5995AE3005618E5F4931B17768ED9996B86C5BE45645C1346EE6FA82C34E8BB9221E659FB68D711C758DA29976D0B9B
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Disc_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85534_264855ActionBlock_0","campaignId":85534,"containerId":"1","controlGroupId":"","treatmentId":"0924134e-3c59-4f53-b731-add558c56fec","variationId":"264855"},"containerId":1,"containerLabel":"JSON for DC_Reader_Disc_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkNvbnZlcnQsIGVkaXQgYW5kIGUtc2lnblxuZm9ybXMgJiBhZ3JlZW1lbnRzLiJ9LCJ0Y2F0SWQiOm51bGx9","dataType":"application\/json","encodingScheme":true},"
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):292
            Entropy (8bit):5.317194758323744
            Encrypted:false
            SSDEEP:
            MD5:2A222B290D6A7216FB52DE10C084FB5B
            SHA1:EEDABB08E02797B2DDD2F45127A94495D5A0B754
            SHA-256:E28E184DD85F9C8FFA49C33EFEC86C978F9ED18DBA7A5823EBAEDDAD3B1E4F91
            SHA-512:BC4BEAD56E7BDBEC2544EA5C75BCFEABD00880249B469CEC8AE663E091874A3957D979E6BDBF816068E0A1609E2589023CA8D67E45EBBAFD61F4D5FE608D0EBE
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):1038
            Entropy (8bit):5.650178633669406
            Encrypted:false
            SSDEEP:
            MD5:BF284D560454C39DAC792C092CB1E4E5
            SHA1:CDCF6FA52644ABD9EF6692E4DBD1625DE6598204
            SHA-256:6B39FAF5E823CA26070134728C3F331F93AA4A8202D023724B6E81A318EC7918
            SHA-512:028FE8F9D6125F3889B92A59EDFFCD7FF72FEFFADB2DBC98CEFF111FC4B2F9D5914E8BA73447E03462147CA0EA27E6898271A8C9C17878BA2AE385EFC104E4EA
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Edit_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85534_264855ActionBlock_1","campaignId":85534,"containerId":"1","controlGroupId":"","treatmentId":"49d2f713-7aa9-44db-aa50-0a7a22add459","variationId":"264855"},"containerId":1,"containerLabel":"JSON for DC_Reader_Edit_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVkaXQgdGV4dCwgaW1hZ2VzLCBwYWdlcywgYW5kIG1vcmUuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"application\/json","encodingScheme":true},"endDTS":1744
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):1164
            Entropy (8bit):5.700196509776901
            Encrypted:false
            SSDEEP:
            MD5:B81B7D77BD3A3FD6D2FF6C7DFF044DDD
            SHA1:2D704DF334208072EF3C72FB3EDDFA5623CE0748
            SHA-256:C13879933783B1F010420E294D87AAE12AE9212BFC35491F54A89CF7A002B7FC
            SHA-512:069712F9F643CDFFBD53372C1E6EA6F287EAAD8CB3BE8F3DB41918253225D860E63030121089115818648795D4A29E009B09918035FAE005731E2388835BBDF9
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Home_LHP_Trial_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"85531_264848ActionBlock_0","campaignId":85531,"containerId":"1","controlGroupId":"","treatmentId":"ee1a7497-76e7-43c2-bb63-9a0551e11d73","variationId":"264848"},"containerId":1,"containerLabel":"JSON for DC_Reader_Home_LHP_Trial_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IlRyeSBBY3JvYmF0IFBybyJ9LCJ1aSI6eyJ0aXRsZV9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE1cHgiLCJmb250X3N0eWxlIjoiMCJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjEzcHgiLCJmb250X3N0eWxlIjoiLTEifSwidGl0bGUiOiJGcmVlIHRyaWFsIiwiZGVzY3JpcHRpb24iOiJHZXQgdW5saW1pdGVkIGFjY2VzcyB0b1xucHJlbWl1bSBQREYgYW5kIGUtc2lnbmluZ1xudG9vbHMuIn0sImJhbm5lcl9zdHlsaW5nIjo
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):289
            Entropy (8bit):5.319634475123771
            Encrypted:false
            SSDEEP:
            MD5:E1B154C9593657746710C9A21D5B4AE3
            SHA1:7FF622D279CA94877B8C258F58D15E68D235A842
            SHA-256:7EF362C2D9F446EFF819FDB7BA9CF11C7BBACF0F6DB1DFA7C39177951276B9AD
            SHA-512:4EE625F1C1295729C5E2BC0E5DC34284C0D0D51369302BAED0F82B5DD18D3E96F6EAC09575B084E662BFC079041DF65047483019AA37ECFC56C909A2DAF25C97
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):1395
            Entropy (8bit):5.772225521726803
            Encrypted:false
            SSDEEP:
            MD5:5DB4A39239E6A6B1783640B95AAFCDEC
            SHA1:C34FB4C0916ED8643A74A24D060E152480BCBB7A
            SHA-256:0445F1306B5C2704D649CD9217CBB2602C44D1F954B7E817FF8327E9B1F6230B
            SHA-512:0288ED789A23A3B7040F74C010C5A2F3DF7725465D3F2DA69786F56A54DC9E059D49FFF57F83118F589E3E6217B8312155481666D29CD989F6CAB16F896FA401
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_RHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"57802_176003ActionBlock_0","campaignId":57802,"containerId":"1","controlGroupId":"","treatmentId":"d0374f2d-08b2-49b9-9500-3392758c9e2e","variationId":"176003"},"containerId":1,"containerLabel":"JSON for Reader DC RHP Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctRGF5IFRyaWFsIiwiZ29fdXJsIjoiaHR0cHM6Ly9hY3JvYmF0LmFkb2JlLmNvbS9wcm94eS9wcmljaW5nL3VzL2VuL3NpZ24tZnJlZS10cmlhbC5odG1sP3RyYWNraW5naWQ9UEMxUFFMUVQmbXY9aW4tcHJvZHVjdCZtdjI9cmVhZGVyIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjEyIiwiZm9udF9zdHlsZSI6IjMifSwidGl0
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):291
            Entropy (8bit):5.303046627951423
            Encrypted:false
            SSDEEP:
            MD5:447E9D815608B72EE0DEB1E1D47C1ACC
            SHA1:20C2114AB615CCDD291BD14BFC8F026CEEA67D95
            SHA-256:54D2D6A9D9C4E772A3D611C473D116D970C119D4D615649D86CE92E50049A119
            SHA-512:37708A1E166CA5791E21769F5A69457E115FCF198B96FA1A1DF9E35584BB2AABE52CFF2C448988E069DAD2E33F79CBF8167E3240A8FE445C7EDAC09318D6EE08
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):287
            Entropy (8bit):5.306995584308763
            Encrypted:false
            SSDEEP:
            MD5:26DFE7B44E634E916DBC79B960D45434
            SHA1:6CFD6932A195CB28C97096612A5F3F2BBB00B866
            SHA-256:2594C265D281ECC917B2CE591C7DD06F0B2819C0BDDAAA38EC0911FDE745ABE9
            SHA-512:765E7C36FE1FB825183CD38C6626A98DB30B1E4AAAC4346C8058CF81B83CECA6B1CB4717EA2572ED6ED1370AD2669D9516D855B850F47A2668471273E16A6172
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):1026
            Entropy (8bit):5.630063238265703
            Encrypted:false
            SSDEEP:
            MD5:6E367975E8B129B576E50D96860FCDDD
            SHA1:F55B95C4AD41CE791F4E1DE7790EFA1CF88EA598
            SHA-256:FE2C7A05C69568009F181CB73137C04E469A179A0F5B14A02B2C890091EE277A
            SHA-512:ADE7B92DF90866D633E45183E53774FD55072BE80FA4FC62989670283B873CCD939C1F72DD9F5B209F266D726AA915F70E1D5C4BA6EE07E1C14D65F3E5A98633
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"92038_285529ActionBlock_0","campaignId":92038,"containerId":"1","controlGroupId":"","treatmentId":"6291f52b-6cb0-4d31-bc46-37ce85e9eb25","variationId":"285529"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVhc2lseSBmaWxsIGFuZCBzaWduIFBERnMuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"application\/json","encodingScheme":true},"endDTS":1751323379000,"s
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):286
            Entropy (8bit):5.282108854020402
            Encrypted:false
            SSDEEP:
            MD5:445482C4449683E44665FEB786FEAF15
            SHA1:E30AA8A1863B2DA0C6398A88287F3AE82192026E
            SHA-256:0458893808015CA68EF0BA81AF82643AAB4669D7781641C3DF54B8062E4693E4
            SHA-512:86D827E12323AC0956BD8F18F2D065AE6B7BBF7DB406A8F87810D5D37957FF36FF5564FB97135CE9A63466A92601214907EBFCA675EC6D8D916CF1490A0EDE77
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):782
            Entropy (8bit):5.363823531787766
            Encrypted:false
            SSDEEP:
            MD5:609E1C33D348AB0EC451F781E4EFFEB1
            SHA1:09476BC8111EBD466969398F74596CF22170603E
            SHA-256:1D29986C5D9B0A8066D1523FEB02FA35C22B60D685C5D48F8DC21AAE651208A3
            SHA-512:5FA7EF17EDE15597F328EBED32A30CDCB43EE14639128E678E8B8E0F6BCE4C3589D5A0A9E386B21CEC46E0C25D308EA16F3FD27DDD77275CFCB6304C7017848E
            Malicious:false
            Reputation:unknown
            Preview:{"analyticsData":{"responseGUID":"12f7969a-e720-43a5-89da-d002572ff329","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1730287806965,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"Edit_InApp_Aug2020"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"20360_57769ActionBlock_0","campaignId":20360,"containerId":"1","controlGroupId":"","treatmentId":"3c07988a-9c54-409d-9d06-53885c9f21ec","variationId":"57769"},"containerId":1,"containerLabel":"JSON for switching in-app test","content":{"data":"eyJ1cHNlbGxleHBlcmltZW50Ijp7InRlc3RpZCI6IjEiLCJjb2hvcnQiOiJicm93c2VyIn19","dataType":"application\/json","encodingScheme":true},"endDTS":1735804679000,"startDTS":1730112652016}}}}
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:data
            Category:dropped
            Size (bytes):4
            Entropy (8bit):0.8112781244591328
            Encrypted:false
            SSDEEP:
            MD5:DC84B0D741E5BEAE8070013ADDCC8C28
            SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
            SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
            SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
            Malicious:false
            Reputation:unknown
            Preview:....
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):2818
            Entropy (8bit):5.129715857493764
            Encrypted:false
            SSDEEP:
            MD5:E7FDA1369367583781C9053AC10A555A
            SHA1:C78E32447E67BA8087F4E28573BBD09C1E32CADA
            SHA-256:0E878F9A5A90793763B5AA877F5D5A178EA3BEBF2896386F3DA27D8605A3D931
            SHA-512:AE09E8EB6F7879944CB5368FA61AFCD67E36CC1B9758B245CEFFF1611AB0E9B5929454541389250DEA5E14EA3FE83E054CAC480AD00392A793FCEA225F84931C
            Malicious:false
            Reputation:unknown
            Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"fd29e60282bd6225c408341cf27de4a7","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":1050,"ts":1730112651000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"434e7c1138da9896691c423e3e9c5d11","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":1164,"ts":1730112651000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"0c77984f4d506787160ea6ce025fa5c5","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1026,"ts":1730112651000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"fd9d8d600bcb16385fedaca6ea5c930c","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1055,"ts":1730112651000},{"id":"DC_Reader_Edit_LHP_Banner","info":{"dg":"4ea838766d3979c3921c3ae2c57b9ce3","sid":"DC_Reader_Edit_LHP_Banner"},"mimeType":"file","size":1038,"ts":1730112651000},{"id":"DC_Reader_RHP_Banner","info":{"dg":"9c6758e0e995ffedbab9ca55c3ee0380","sid":"DC_Reader_RHP_Banner"},"mimeType":"file","size":1395,"t
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
            Category:dropped
            Size (bytes):12288
            Entropy (8bit):0.9874055847295397
            Encrypted:false
            SSDEEP:
            MD5:0F80A72F18C7695653B62F8AC1E80763
            SHA1:8049A02C3963BFE47EED9449B231196133EDDC85
            SHA-256:83F304A365CC245C055333754601B3313AAFB4F9BD0EB476F9B35E0DBAA5B490
            SHA-512:5495B254DCC4A4F116F0CD049BAB8629EB511AB3D92800F4004074DCEFA5E46F83600AA80D6F521660512A095C59245DD7A7D963B712A0335899B75804563DC1
            Malicious:false
            Reputation:unknown
            Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:SQLite Rollback Journal
            Category:dropped
            Size (bytes):8720
            Entropy (8bit):1.343412984217358
            Encrypted:false
            SSDEEP:
            MD5:2FD372824BEEE0A4A5EF72490319E454
            SHA1:3C675DABBA03E9C61BE7FF071CC95DFF8682CE6B
            SHA-256:06C7CF56FEEB79968BCFC0A8C6CA2625271865914F09C7BBFD9B8C5251A18E5D
            SHA-512:CF8693E950DDC2F60E435D7B56876BD34721CE4CAC76634FB3483D1FFCA86A40E887C0DE32AE62C40DA285DFDDCE1ACEEF1F7FFD33F39AF261B0D5FE7939A2F7
            Malicious:false
            Reputation:unknown
            Preview:.... .c.....K,........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j...#..#.#.#.#.#.#.#.#.7.7........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
            File Type:data
            Category:dropped
            Size (bytes):231348
            Entropy (8bit):4.390523185347053
            Encrypted:false
            SSDEEP:
            MD5:A018AB65A149D027D102E0E7780A8899
            SHA1:F9523657351C8FA4F8F2C4FCAB86C0226587A5C5
            SHA-256:B64DBB6443B3900C925FA660B37544FC0A65ACB1868EB078730EA94C09A394E7
            SHA-512:6E907FDFD5B6EECAAEB872B35D538F5C7E3D8BFC634F66661573AD0081F46CB8EEC628F5C1F70D77DC4B9595E6FAB75863A2F2D06C24991A4DA54C9BD73BCC41
            Malicious:false
            Reputation:unknown
            Preview:TH02...... .@.S/')......SM01X...,...`]E/')..........IPM.Activity...........h...............h............H..h..O...........h.........'s.H..h\cal ...pDat...h.B..0...X.O....h?..z...........h........_`Pk...hc..z@...I.lw...h....H...8.Uk...0....T...............d.........2h...............k..............!h.............. h..4;....p.O...#h....8.........$h.'s.....8....."h.'r......&r...'h..Y...........1h?..z<.........0h....4....Uk../h....h.....UkH..h....p.....O...-h .........O...+h...z.....O................. ..............F7..............FIPM.Activity....Form....Standard....Journal Entry...IPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000.GwwMicrosoft...This form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):180288
            Entropy (8bit):5.290999063042214
            Encrypted:false
            SSDEEP:
            MD5:DBA8887167ABD513EB0E11EF4CF87125
            SHA1:D2B9306C446E0FAFA863F5AA073C513130438045
            SHA-256:300D680BB024F93CAAC681DC02D854E280DE93FAD425B47A7944E2C34494914C
            SHA-512:5D0D3AEE692D36559F90FC9F0ACE5B945247E0C4398DE8F2C1FEB471BAA0CE247926F960DADEA62412021EFDD553340DC55C3DFB537A6CF608AD9170DA85E152
            Malicious:false
            Reputation:unknown
            Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2024-10-28T10:50:41">.. Build: 16.0.18222.40125-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://word-edit.officeapps.live.com/we/rrdiscovery.ashx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[
            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
            File Type:PDF document, version 1.7, 1 pages
            Category:dropped
            Size (bytes):0
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:
            MD5:8571EE1BEF58356A6C982672504C6CFF
            SHA1:6FAC3BC00A0538456DE664681191D16225D4F5CB
            SHA-256:1DDA1BE638070E2E638311945D1DF6515E6CDDC1C73CA471164E371209C5FFBC
            SHA-512:E081DB03700D445A817769ABF34289BDFAD5303C72849D3A21E6CB5FEA64D235265CFABA8916FE31E9B770FA8FF8EF03275FEF922A06B6C126A46BD908AE664F
            Malicious:false
            Reputation:unknown
            Preview:%PDF-1.7..%......1 0 obj..<</Type/Catalog/Pages 2 0 R/Lang(en) /StructTreeRoot 19 0 R/MarkInfo<</Marked true>>/Metadata 54 0 R/ViewerPreferences 55 0 R>>..endobj..2 0 obj..<</Type/Pages/Count 1/Kids[ 3 0 R] >>..endobj..3 0 obj..<</Type/Page/Parent 2 0 R/Resources<</Font<</F1 5 0 R/F2 9 0 R/F3 15 0 R>>/ExtGState<</GS7 7 0 R/GS8 8 0 R>>/XObject<</Image17 17 0 R>>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 14 0 R] /MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<</Type/Group/S/Transparency/CS/DeviceRGB>>/Tabs/S/StructParents 0>>..endobj..4 0 obj..<</Filter/FlateDecode/Length 500>>..stream..x...Qk.0..........H..N. H..t..5){.{.#.S.-c..g.i......Y.......p.k...hx]]MA.?.65..7...yJ0.V.,.../...^......z....,.b87`......0..`.Qi$`......]...?.....m.,....wX~*..d.R.0.....MO.>.2.1.......7.D./".n.Q_@&v...D.b.*.}.q.*.h.wp{.Q".C/..Ee.8r..D#.........V"7..2.fi`%.<..?..Z5g..Y..t.f:.Q{K....x.G.9....b#...6...L...^.{...L.Uz..p....G+......6..{.\.1l.W.o[....d...@+[$....ji.8$.o.4..S.J..G..H..)..
            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
            File Type:PDF document, version 1.7, 1 pages
            Category:dropped
            Size (bytes):91323
            Entropy (8bit):7.886210240865788
            Encrypted:false
            SSDEEP:
            MD5:8571EE1BEF58356A6C982672504C6CFF
            SHA1:6FAC3BC00A0538456DE664681191D16225D4F5CB
            SHA-256:1DDA1BE638070E2E638311945D1DF6515E6CDDC1C73CA471164E371209C5FFBC
            SHA-512:E081DB03700D445A817769ABF34289BDFAD5303C72849D3A21E6CB5FEA64D235265CFABA8916FE31E9B770FA8FF8EF03275FEF922A06B6C126A46BD908AE664F
            Malicious:false
            Reputation:unknown
            Preview:%PDF-1.7..%......1 0 obj..<</Type/Catalog/Pages 2 0 R/Lang(en) /StructTreeRoot 19 0 R/MarkInfo<</Marked true>>/Metadata 54 0 R/ViewerPreferences 55 0 R>>..endobj..2 0 obj..<</Type/Pages/Count 1/Kids[ 3 0 R] >>..endobj..3 0 obj..<</Type/Page/Parent 2 0 R/Resources<</Font<</F1 5 0 R/F2 9 0 R/F3 15 0 R>>/ExtGState<</GS7 7 0 R/GS8 8 0 R>>/XObject<</Image17 17 0 R>>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 14 0 R] /MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<</Type/Group/S/Transparency/CS/DeviceRGB>>/Tabs/S/StructParents 0>>..endobj..4 0 obj..<</Filter/FlateDecode/Length 500>>..stream..x...Qk.0..........H..N. H..t..5){.{.#.S.-c..g.i......Y.......p.k...hx]]MA.?.65..7...yJ0.V.,.../...^......z....,.b87`......0..`.Qi$`......]...?.....m.,....wX~*..d.R.0.....MO.>.2.1.......7.D./".n.Q_@&v...D.b.*.}.q.*.h.wp{.Q".C/..Ee.8r..D#.........V"7..2.fi`%.<..?..Z5g..Y..t.f:.Q{K....x.G.9....b#...6...L...^.{...L.Uz..p....G+......6..{.\.1l.W.o[....d...@+[$....ji.8$.o.4..S.J..G..H..)..
            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:
            MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
            SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
            SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
            SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
            Malicious:false
            Reputation:unknown
            Preview:[ZoneTransfer]..ZoneId=3..
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):246
            Entropy (8bit):3.524398495091119
            Encrypted:false
            SSDEEP:
            MD5:5362123623C48A1C0AB03DF95D2DC017
            SHA1:C930664259D8EA2C2890911343A014E7A1DDC42B
            SHA-256:9E1C3168EA835AD7D3C8F053855AF38B03E09921C52D73E7B48A63D4509CEF70
            SHA-512:797616B3CF396EFE8E566885EC5164B585BE38D1C3DCC6B4BAE7DB82046BD3A02C753F38E292D75700A04DAABB6EBAA9774A32B36ED41C527C00FDD7E77D11B4
            Malicious:false
            Reputation:unknown
            Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.8./.1.0./.2.0.2.4. . .0.6.:.5.0.:.5.2. .=.=.=.....
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:ASCII text, with very long lines (393)
            Category:dropped
            Size (bytes):16525
            Entropy (8bit):5.353642815103214
            Encrypted:false
            SSDEEP:
            MD5:91F06491552FC977E9E8AF47786EE7C1
            SHA1:8FEB27904897FFCC2BE1A985D479D7F75F11CEFC
            SHA-256:06582F9F48220653B0CB355A53A9B145DA049C536D00095C57FCB3E941BA90BB
            SHA-512:A63E6E0D25B88EBB6602885AB8E91167D37267B24516A11F7492F48876D3DDCAE44FFC386E146F3CF6EB4FA6AF251602143F254687B17FCFE6F00783095C5082
            Malicious:false
            Reputation:unknown
            Preview:SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:073+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:073+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="SetConfig:
            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):29752
            Entropy (8bit):5.42132365850791
            Encrypted:false
            SSDEEP:
            MD5:59340CAA84E9E0132F62BBA2A1A01FA1
            SHA1:901700668D49EFB029CB5DB59354B7ACFDC63542
            SHA-256:AA79E468C0A81B518CB08E99D7999DE133025FD214C48749D78133B0017B129D
            SHA-512:A78AA11770B65D5806CD4AFC034ECD70C30648369AD1CD40D974EBB4979AA9C9509F25D39820952685CFC8E104E27FA9A88D39ED12E80A2A1613F9516100C248
            Malicious:false
            Reputation:unknown
            Preview:06-10-2023 10:08:42:.---2---..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : Starting NGL..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..06-10-2023 10:08:42:.Closing File..06-10-
            Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
            File Type:data
            Category:modified
            Size (bytes):30
            Entropy (8bit):1.2389205950315936
            Encrypted:false
            SSDEEP:
            MD5:DF40CEFDDC5DDDB9187B17A5247C2E18
            SHA1:BB9CAE657400074C0ED866C86D4F1DF70D943FC6
            SHA-256:72DA721D77D4375492006AB66024965D4CFF3E6EFF52D5F4FDD09774568A7C25
            SHA-512:9A586E66738399EC491C6E54D3D21CC43F8EC287098891115E7AD1A20DCC3437CBA3D92BF66563288EE5B238798F26DD8B896C3D0C6596056FFF5902E7DB3E35
            Malicious:false
            Reputation:unknown
            Preview:..............................
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 09:50:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2673
            Entropy (8bit):3.977301877178196
            Encrypted:false
            SSDEEP:
            MD5:15E14595F5446197E26B1137C9AA6907
            SHA1:A29A444A18CF58FEBB818F845D76F3C28E5DF15D
            SHA-256:A82B9B34531DF84303D988D67795E60534026B929E25FD7190C94C8EB2748753
            SHA-512:8122A8C301070304F0126F370E14CE4D0499CCC94B55336E3DBC319F1D346CF9EC075654F9A85D767D555736456561D8C9BFF0167A9A51B0F62816E2B538695E
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,......RA')..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I\YJV....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\YYV....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V\YYV....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V\YYV..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V\YZV...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 09:50:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2675
            Entropy (8bit):3.991506244837756
            Encrypted:false
            SSDEEP:
            MD5:32803EAB212BC367172A47C140C37207
            SHA1:9D832D8016D243D3720B1717D08D015C27FADD44
            SHA-256:A804B658A8D4DD2749AD7CE4A0FC4349964C1AE801D1C5D0043DF2D84706F986
            SHA-512:4E0A44EADA51C31A0BE5CA9A5505D401E0475166B856D0A91DFE3D877D0466C2F7BB60F4F6732530665DAD1A4A1CE093A8AE29F38616253DDFDADD6A81FB90EC
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,....o.EA')..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I\YJV....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\YYV....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V\YYV....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V\YYV..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V\YZV...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2689
            Entropy (8bit):4.002961230781809
            Encrypted:false
            SSDEEP:
            MD5:D6948BE17D7541DDBE70BF48467CEB65
            SHA1:E367FD052255F2D1481C04AD6DAAD9F6B8AC3280
            SHA-256:9C9CEA14F267188B8295AB30FDD9105ABF64032402ED6BB46C1F89439FBA6238
            SHA-512:B658B98EA44A9B0ACA070F91C746E527E5A660F5A6D8A4D0CDACB82BF40E028B7DF9ABE43B0431D245177A93F769B5DC65FF4C1086F01DB93BC045146E87DC80
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I\YJV....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\YYV....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V\YYV....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V\YYV..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 09:50:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.9907072631335008
            Encrypted:false
            SSDEEP:
            MD5:80BD030F000541D29AF9B9AD1C292893
            SHA1:5B5F8F268B96CF1F6A3EE82889E2617A365FC880
            SHA-256:3CC8FD008AE0934FEFBCCFC2174601EED6FFC6EC97BFD74573C89D02697A73D4
            SHA-512:33172579F76B78BF42F9323EEE4E7A87C3844BBE626488652BC83FC5401670B8B6377D6CB0FA8DB05E28D220A19C112EAFA4AC4B80A7C3AF199F1295DE773A82
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....1?A')..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I\YJV....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\YYV....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V\YYV....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V\YYV..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V\YZV...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 09:50:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.9812674520383604
            Encrypted:false
            SSDEEP:
            MD5:2AF58D3A01476F43241902F90C880D3F
            SHA1:F9E77000351DE337AFEF0864C99C3C6BC9D780F2
            SHA-256:77544B9F3B5ED218155FCBEAF3163C46962B6022071C911DEF33180D2668D897
            SHA-512:08CAC16367F3324A0D682E34F4CEDB826A605FA07198AD5600A2ED6093B2BF09646ADACAE1109BF3C7A337BE734C66D9DFB0CC59B283536BD531ADD9D8C97594
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,....].LA')..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I\YJV....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\YYV....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V\YYV....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V\YYV..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V\YZV...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 09:50:51 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2679
            Entropy (8bit):3.988593530452984
            Encrypted:false
            SSDEEP:
            MD5:53731B3760CC5619427BE44637E6E331
            SHA1:B019C39CEF665A2B16474B168A34C27E95071C95
            SHA-256:3D1774356EF854C66EB7070F63D01D71CC77900D729E5CF2891ED573D63AFF8A
            SHA-512:A0A44376B3A2FEDCB868F96A35901A8F764C1438B3907C7625A07C1332943366B7BF59BEC018F688F67EDCAF62B75166AEC61EECD0E1C93FC1A0DE132AADFB54
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....5A')..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.I\YJV....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V\YYV....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V\YYV....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V\YYV..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V\YZV...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i....................C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:RAR archive data, v5
            Category:dropped
            Size (bytes):0
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:
            MD5:05485E052E268E157F4BAD133CA89A8D
            SHA1:06BBA91CA443C631F321D684CD64C394B2007339
            SHA-256:EBE2C00C7B5A791BAF19A714A0AFC11CC1002BF72A3D2B2B10D3CB3695EAF053
            SHA-512:AF350AE62D29BCE5D6CC30BE0B9433F41CBA8FF56408E1665D9699F770C9170BBAFF26484CE39D7615BFE94801F54A9749CF987C0B7352B9C9AA8236CBC90606
            Malicious:false
            Reputation:unknown
            Preview:Rar!........................U................. 'o^....vdps_tax_gov_ua_0739220983/........... ..... .......... .......... .......zip....Rr..(..PK........@.\Y............Y.............. ..... .......... .......... ....../PK..........\YW.\.n...n.................. ..... .......... .......... ....../........... ..... .......... .......... .......pdf.rarRar!......_C!.......b..A.k....f.E..d..z..syy......9..i..Y.R$e..X...?.!.^Q.k..O..t=...q.I#...HB.O..l(.(...tW...;cw.k...J.eT.....Z..6.......L...........s.=..|.....:TP*!:..`M......i..]W..a2..}.[.N....J......K.....W.[.y.SQ...u....1P4...|.l!,.P=._......AP..P.J....\...3Sd.C..G7..t..j..o...F...S..P...rPI..<./.-F......}=....&e.?t.}..eDS..=>F.....w..".S.-..c..,c..r.L..q@r.R......Vn..T1<..{..;..,..(+w...S.{.W..w..V%...+`...uR'.ph@.D..d>..!.p..}n..Mx$.T_3~a..
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:RAR archive data, v5
            Category:dropped
            Size (bytes):15968
            Entropy (8bit):7.978773919768122
            Encrypted:false
            SSDEEP:
            MD5:05485E052E268E157F4BAD133CA89A8D
            SHA1:06BBA91CA443C631F321D684CD64C394B2007339
            SHA-256:EBE2C00C7B5A791BAF19A714A0AFC11CC1002BF72A3D2B2B10D3CB3695EAF053
            SHA-512:AF350AE62D29BCE5D6CC30BE0B9433F41CBA8FF56408E1665D9699F770C9170BBAFF26484CE39D7615BFE94801F54A9749CF987C0B7352B9C9AA8236CBC90606
            Malicious:false
            Reputation:unknown
            Preview:Rar!........................U................. 'o^....vdps_tax_gov_ua_0739220983/........... ..... .......... .......... .......zip....Rr..(..PK........@.\Y............Y.............. ..... .......... .......... ....../PK..........\YW.\.n...n.................. ..... .......... .......... ....../........... ..... .......... .......... .......pdf.rarRar!......_C!.......b..A.k....f.E..d..z..syy......9..i..Y.R$e..X...?.!.^Q.k..O..t=...q.I#...HB.O..l(.(...tW...;cw.k...J.eT.....Z..6.......L...........s.=..|.....:TP*!:..`M......i..]W..a2..}.[.N....J......K.....W.[.y.SQ...u....1P4...|.l!,.P=._......AP..P.J....\...3Sd.C..G7..t..j..o...F...S..P...rPI..<./.-F......}=....&e.?t.}..eDS..=>F.....w..".S.-..c..,c..r.L..q@r.R......Vn..T1<..{..;..,..(+w...S.{.W..w..V%...+`...uR'.ph@.D..d>..!.p..}n..Mx$.T_3~a..
            File type:RFC 822 mail, ASCII text, with very long lines (2049), with CRLF line terminators
            Entropy (8bit):6.083483449150425
            TrID:
            • E-Mail message (Var. 5) (54515/1) 100.00%
            File name:phish_alert_sp2_2.0.0.0.eml
            File size:136'021 bytes
            MD5:9bd574b882b28af5c9beab3daee6e57d
            SHA1:222da480e782f8f2d03df51e627f02f2ba9fb5b3
            SHA256:a96f33f9e0730c47457241b6fb829f46c67b13282123af107678cab592d63a7a
            SHA512:db682241a74a1bf0c9f98c200b2a1eeac76a997dbcc2f22783ebee72948b1cd84b13618fcdd8beb5fc09bfb7eaa52f0ade4f5ead53c91a7af696690f96a6b91f
            SSDEEP:3072:S9jFD12MY2NqmLhKRJi0rQ7UFN5fkhG/iltMH/8jfnH2gC:S972MY2VLhKRJjIhGMMH/D
            TLSH:70D3C027DD770D4693021BFB02CEA6C9A43FB75942DF20FE12B6AB63E065562D2C8701
            File Content Preview:Received: from DB8P189MB0716.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:12f::7).. by AM8P189MB1394.EURP189.PROD.OUTLOOK.COM with HTTPS; Mon, 28 Oct 2024.. 10:39:19 +0000..Received: from AS9PR06CA0287.eurprd06.prod.outlook.com.. (2603:10a6:20b:45a::21) by DB8P
            Subject:
            From: <m-fukuhara_i2833@saison-hoken.co.jp>
            To:Olena Kobryn <o.kobryn@gms-worldwide.com>
            Cc:
            BCC:
            Date:Mon, 28 Oct 2024 13:37:20 +0300
            Communications:
            • ! . . . . : , . , 83, , , . , 83, ! . . . . : , . , 83, , , . , 83, ! . . . . ! . . . . : , . , 83, , , , . , 83, , . , 83,
            Attachments:
            • _21337429345.pdf
            Key Value
            Receivedfrom unknown (HELO 212.8.252.56) (m-fukuhara?i2833@saison-hoken.co.jp@197.250.15.208) by dc28.etius.jp (119.245.204.209) with ESMTPA; 28 Oct 2024 19:37:27 +0900
            Authentication-Resultsspf=pass (sender IP is 119.245.204.209) smtp.mailfrom=saison-hoken.co.jp; dkim=none (message not signed) header.d=none;dmarc=bestguesspass action=none header.from=saison-hoken.co.jp;compauth=pass reason=109
            Received-SpfPass (protection.outlook.com: domain of saison-hoken.co.jp designates 119.245.204.209 as permitted sender) receiver=protection.outlook.com; client-ip=119.245.204.209; helo=saison-hoken.co.jp; pr=C
            X-Vade-Trackerscore=0, verdict=clean, state=0 spamcause=gggruggvucftvghtrhhoucdtuddrgeeftddrvdejkedgudejucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecupffvvffrveenuceurghilhhouhhtmecufedttdenucenucfjughrpefkrhfhvffuffggtgesmhdtreertddtjeenucfhrhhomhepvfhomhgrpiihkhcupihomhgvphcuvfipgihohhhoueippicuoehmqdhfuhhkuhhhrghrrggpihdvkeeffeesshgrihhsohhnqdhhohhkvghnrdgtohdrjhhpqeenucggtffrrghtthgvrhhnpefftdejfedtteeuvddujeefveeggedugeevieeihedtieduveegudduieeitdeiudenucfkphepudeljedrvdehtddrudehrddvtdekpddvuddvrdekrddvhedvrdehieenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepihhnvghtpeduleejrddvhedtrdduhedrvddtkedphhgvlhhopedvuddvrdekrddvhedvrdehiedpmhgrihhlfhhrohhmpehmqdhfuhhkuhhhrghrrggpihdvkeeffeesshgrihhsohhnqdhhohhkvghnrdgtohdrjhhppdhnsggprhgtphhtthhopedupdhrtghpthhtohepohdrkhhosghrhihnsehgmhhsqdifohhrlhgufihiuggvrdgtohhmpdhmohguvgepshhmthhpohhuth
            Message-Id<00eea70c96ab818e3d97de7672b78fac8496@saison-hoken.co.jp>
            Reply-To <m-fukuhara_i2833@saison-hoken.co.jp>
            From <m-fukuhara_i2833@saison-hoken.co.jp>
            ToOlena Kobryn <o.kobryn@gms-worldwide.com>
            Subject
            DateMon, 28 Oct 2024 13:37:20 +0300
            MIME-Version1.0
            Content-Typemultipart/mixed; boundary="----sinikael-?=_1-17301120116220.8441386438834804"
            Return-Pathm-fukuhara_i2833@saison-hoken.co.jp
            X-Ms-Exchange-Organization-Expirationstarttime28 Oct 2024 10:37:35.1699 (UTC)
            X-Ms-Exchange-Organization-ExpirationstarttimereasonOriginalSubmit
            X-Ms-Exchange-Organization-Expirationinterval1:00:00:00.0000000
            X-Ms-Exchange-Organization-ExpirationintervalreasonOriginalSubmit
            X-Ms-Exchange-Organization-Network-Message-Id 4d24fab7-0f6d-45a4-3118-08dcf73c8933
            X-Eopattributedmessage0
            X-Eoptenantattributedmessageb257b72a-b83c-4005-915b-ce5ce92eaad2:0
            X-Ms-Exchange-Organization-MessagedirectionalityIncoming
            X-Ms-PublictraffictypeEmail
            X-Ms-Traffictypediagnostic AMS0EPF000001AB:EE_|DB8P189MB0716:EE_|AM8P189MB1394:EE_
            X-Ms-Exchange-Organization-Authsource AMS0EPF000001AB.eurprd05.prod.outlook.com
            X-Ms-Exchange-Organization-AuthasAnonymous
            X-Ms-Office365-Filtering-Correlation-Id 4d24fab7-0f6d-45a4-3118-08dcf73c8933
            X-Ms-Exchange-AtpmessagepropertiesSA|SL
            X-Ms-Exchange-Organization-Scl1
            X-Microsoft-AntispamBCL:0;ARA:13230040|8096899003;
            X-Forefront-Antispam-Report CIP:119.245.204.209;CTRY:JP;LANG:uk;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:saison-hoken.co.jp;PTR:saison-hoken.co.jp;CAT:NONE;SFS:(13230040)(8096899003);DIR:INB;
            X-Ms-Exchange-Crosstenant-Originalarrivaltime28 Oct 2024 10:37:34.2637 (UTC)
            X-Ms-Exchange-Crosstenant-Network-Message-Id 4d24fab7-0f6d-45a4-3118-08dcf73c8933
            X-Ms-Exchange-Crosstenant-Idb257b72a-b83c-4005-915b-ce5ce92eaad2
            X-Ms-Exchange-Crosstenant-Authsource AMS0EPF000001AB.eurprd05.prod.outlook.com
            X-Ms-Exchange-Crosstenant-AuthasAnonymous
            X-Ms-Exchange-Crosstenant-FromentityheaderInternet
            X-Ms-Exchange-Transport-CrosstenantheadersstampedDB8P189MB0716
            X-Ms-Exchange-Transport-Endtoendlatency00:01:45.1789142
            X-Ms-Exchange-Processed-By-Bccfoldering15.20.8093.014
            X-Microsoft-Antispam-Mailbox-Delivery ucf:0;jmr:0;auth:0;dest:I;ENG:(910001)(944506478)(944626604)(920097)(930097)(140003)(1420198);
            X-Microsoft-Antispam-Message-Info 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
            Content-Transfer-Encoding7bit

            Icon Hash:46070c0a8e0c67d6