Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Re_ Remittances needed (1).eml

Overview

General Information

Sample name:Re_ Remittances needed (1).eml
Analysis ID:1430571
MD5:c307adf0c0d4db6a92d2977aa224c46b
SHA1:80060d2ed5be1dfabff839fdba57230ed1817896
SHA256:e20012cca0b8c7ba8fe00d901ecb021530a9e1b4ae0b0da89e491bdd7d3985fe
Infos:

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Queries the volume information (name, serial number etc) of a device
Sigma detected: Office Autorun Keys Modification
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64_ra
  • OUTLOOK.EXE (PID: 6288 cmdline: "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Re_ Remittances needed (1).eml" MD5: 91A5292942864110ED734005B7E005C0)
    • ai.exe (PID: 6148 cmdline: "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "016F1EBA-115D-4877-9F9C-41459D6E8602" "7EAD5ED6-0459-4323-8199-461E7BAB052C" "6288" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD)
    • Acrobat.exe (PID: 2924 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\VPL6CO4Q\STONHARD INVOICES 103823-103838.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
      • AcroCEF.exe (PID: 5936 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
        • AcroCEF.exe (PID: 3224 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1744 --field-trial-handle=1592,i,13904569476606750348,1530364221901000283,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
    • Acrobat.exe (PID: 6892 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\VPL6CO4Q\STONHARD PACKING LISTS.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE, ProcessId: 6288, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Outlook\Addins\OneNote.OutlookAddin\1
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: global trafficHTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1Host: armmf.adobe.comConnection: keep-aliveAccept-Language: en-US,en;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, br
Source: unknownTCP traffic detected without corresponding DNS query: 23.62.216.143
Source: unknownTCP traffic detected without corresponding DNS query: 23.62.216.143
Source: unknownTCP traffic detected without corresponding DNS query: 23.62.216.143
Source: unknownTCP traffic detected without corresponding DNS query: 23.62.216.143
Source: unknownTCP traffic detected without corresponding DNS query: 23.62.216.143
Source: unknownTCP traffic detected without corresponding DNS query: 23.62.216.143
Source: unknownTCP traffic detected without corresponding DNS query: 23.62.216.143
Source: unknownTCP traffic detected without corresponding DNS query: 23.62.216.143
Source: unknownTCP traffic detected without corresponding DNS query: 23.62.216.143
Source: unknownTCP traffic detected without corresponding DNS query: 23.62.216.143
Source: unknownTCP traffic detected without corresponding DNS query: 23.62.216.143
Source: global trafficHTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1Host: armmf.adobe.comConnection: keep-aliveAccept-Language: en-US,en;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, br
Source: 56965894-3c7d-444a-a784-ac78ae7f64c1.tmp.14.dr, 16371014-b5ca-4efb-876c-dcae9763750a.tmp.14.drString found in binary or memory: https://chrome.cloudflare-dns.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: classification engineClassification label: clean1.winEML@26/71@0/1
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\Documents\Outlook Files\~Outlook Data File - NoEmail.pst.tmpJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile created: C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20240423T2215510482-6288.etlJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Re_ Remittances needed (1).eml"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "016F1EBA-115D-4877-9F9C-41459D6E8602" "7EAD5ED6-0459-4323-8199-461E7BAB052C" "6288" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\VPL6CO4Q\STONHARD INVOICES 103823-103838.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\VPL6CO4Q\STONHARD PACKING LISTS.pdf"
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1744 --field-trial-handle=1592,i,13904569476606750348,1530364221901000283,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe "C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "016F1EBA-115D-4877-9F9C-41459D6E8602" "7EAD5ED6-0459-4323-8199-461E7BAB052C" "6288" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\VPL6CO4Q\STONHARD INVOICES 103823-103838.pdf"Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\VPL6CO4Q\STONHARD PACKING LISTS.pdf"Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1744 --field-trial-handle=1592,i,13904569476606750348,1530364221901000283,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: c2r64.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: userenv.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\ClickToRun\REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}\InprocServer32Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEWindow found: window name: SysTabControl32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\CommonJump to behavior
Source: Re_ Remittances needed (1).emlStatic file information: File size 8612270 > 1048576
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEFile Volume queried: C:\Windows\SysWOW64 FullSizeInformationJump to behavior
Source: Re_ Remittances needed (1).emlBinary or memory string: lLqemuGE7pgI/W34Rm6KsVaRnxk5OFl9n0jCcP4gcfGiNO3ziSNHPLdUmNGerk69wMu5gRvoR/t/
Source: Re_ Remittances needed (1).emlBinary or memory string: Jj01FHMVnoTuNcwPsqaN3t5g2Vzr/mLFFqieC0B6uMBVoiFjyfnElaF+u2l+HgFS4068vv7jCX//
Source: Re_ Remittances needed (1).emlBinary or memory string: OU/XhLMtD9l5dqZXjy/4pDTQn6FPJ/2ZjFnKOmufFUgXutvMcIEw6xsbMmp1UQpneeIfp60lwZWl
Source: Re_ Remittances needed (1).emlBinary or memory string: ad/wgWjfDzW47m/WLwr8MdQTwl4o8SeFv+Ems9S13RvER8P6TDcQeMuy8W+JPFNlpRi8D6R4L1vx
Source: Re_ Remittances needed (1).emlBinary or memory string: We0D+uCRjjXf9m5XPg81/tGd7XWdcd0sGCd4gQfEvumoC/9miiWhIjweqlEzqkCyR2f0ug0vMCin
Source: Re_ Remittances needed (1).emlBinary or memory string: AGdehBQEmUPHJM+e4FeEclLNrWhQwuPd75blZ5YuhHejXliNvXA2cMPhoGbI2AJapZHL26ZHLnwn
Source: Re_ Remittances needed (1).emlBinary or memory string: k0bn7k1yEK0SZL83HHZTYokqLkTFJ6aavmCI1737JsigjY/VLfTH6frnluM8I+OPTc+CuXVZr35j
Source: Re_ Remittances needed (1).emlBinary or memory string: cJIKbJROWVQfPIkOdhfrusLyPF0E4S1LqEmuZlNZ6131NBrq7p+eGqxE3C1EYtJJhx23oRvEj4Nx
Source: Re_ Remittances needed (1).emlBinary or memory string: gWKiHGFsyeiSsEWtzK/Y8/Nkwwm7Zr8mz+V7b55ayN1LUvuaTC7Yt73Ns+iu+Fs0EiFxm7DzAb2W
Source: Re_ Remittances needed (1).emlBinary or memory string: RPUx6/CpWqns2yjIiQ/BOiR3nV1QyzerPVmcI6J9Qeo7h87Nkp3r5vMTxSqT001HMe8uJ2nyniBt
Source: Re_ Remittances needed (1).emlBinary or memory string: PzeM8KmpyzR58ImqemUd60OpqU2N8hPGxjcDh3nknOwSclnro+khrivNaTuLfeF9pdx0EOmlp8U2
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXEProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeQueries volume information: C:\Program Files (x86)\Microsoft Office\root\Office16\AI\WordCombinedFloatieLreOnline.onnx VolumeInformationJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive12
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS14
System Information Discovery
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1430571 Sample: Re_ Remittances needed (1).eml Startdate: 23/04/2024 Architecture: WINDOWS Score: 1 7 OUTLOOK.EXE 513 135 2->7         started        process3 9 Acrobat.exe 67 7->9         started        11 Acrobat.exe 41 7->11         started        13 ai.exe 7->13         started        process4 15 AcroCEF.exe 80 9->15         started        process5 17 AcroCEF.exe 6 15->17         started        dnsIp6 20 23.62.216.143, 443, 49718 GTT-BACKBONEGTTDE United States 17->20

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://chrome.cloudflare-dns.com0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://chrome.cloudflare-dns.com56965894-3c7d-444a-a784-ac78ae7f64c1.tmp.14.dr, 16371014-b5ca-4efb-876c-dcae9763750a.tmp.14.drfalse
  • URL Reputation: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
23.62.216.143
unknownUnited States
3257GTT-BACKBONEGTTDEfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1430571
Start date and time:2024-04-23 22:15:15 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 6m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:20
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Re_ Remittances needed (1).eml
Detection:CLEAN
Classification:clean1.winEML@26/71@0/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .eml
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 52.113.194.132, 52.182.143.214, 52.109.4.7, 184.31.60.185, 52.5.13.197, 52.202.204.11, 54.227.187.23, 23.22.254.206, 172.64.41.3, 162.159.61.3, 23.209.188.132, 23.209.188.149, 23.209.188.152, 23.209.188.143, 23.6.117.24, 23.6.117.26
  • Excluded domains from analysis (whitelisted): ecs.office.com, e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, fs.microsoft.com, us1.odcsm1.live.com.akadns.net, odc.officeapps.live.com, slscr.update.microsoft.com, acroipm2.adobe.com.edgesuite.net, p13n.adobe.io, s-0005-office.config.skype.com, acroipm2.adobe.com, mobile.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, ecs-office.s-0005.s-msedge.net, eus2-azsc-000.odc.officeapps.live.com, s-0005.s-msedge.net, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, onedscolprdcus19.centralus.cloudapp.azure.com, osiprod-eus2-bronze-azsc-000.eastus2.cloudapp.azure.com, ecs.office.trafficmanager.net, geo2.adobe.com, mobile.events.data.trafficmanager.net, prod.odcsm1.live.com.akadns.net
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtQueryAttributesFile calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtSetInformationFile calls found.
  • Report size getting too big, too many NtSetValueKey calls found.
  • VT rate limit hit for: Re_ Remittances needed (1).eml
TimeTypeDescription
22:16:26API Interceptor1x Sleep call for process: Acrobat.exe modified
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
GTT-BACKBONEGTTDEFE8sC55u4j.elfGet hashmaliciousMiraiBrowse
  • 62.50.4.183
ZOHH8muwjh.elfGet hashmaliciousMiraiBrowse
  • 194.183.117.247
enEQvjUlGl.elfGet hashmaliciousMiraiBrowse
  • 81.31.17.51
Yui1pUgieI.elfGet hashmaliciousMiraiBrowse
  • 195.81.19.29
https://webex-install.comGet hashmaliciousNetSupport RATBrowse
  • 23.203.101.20
VOlsbvDoA0.elfGet hashmaliciousMiraiBrowse
  • 151.171.24.157
994LJMbRxE.elfGet hashmaliciousMiraiBrowse
  • 66.7.159.79
5DkGWDuyYR.elfGet hashmaliciousMiraiBrowse
  • 77.67.63.236
xQwEu422am.elfGet hashmaliciousMiraiBrowse
  • 212.222.239.85
No context
No context
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:ASCII text
Category:dropped
Size (bytes):287
Entropy (8bit):5.179103463869439
Encrypted:false
SSDEEP:6:V1LXkX1L+q2PRN2nKuAl9OmbnIFUt8q1LXx1Zmw+q1LXnLVkwORN2nKuAl9Ombjd:XUovaHAahFUt8YB1/+YB5JHAaSJ
MD5:E1135970F09E4C46C0E9D4BF4420D3D4
SHA1:1918B778A9846745F924A576E55FB0AF1CF0A738
SHA-256:772087E1D3E6667B2C3506695DD3A1DDF4CD1A8E5D5F1F2FD54D8F636CE5C860
SHA-512:5E75718953B19D92B97BA634B11585BF2D08DFD36E4A9339C0432BF7A57AF39F72BC60211D1925463253E9EB58CC3C54E86DE569C07DC75D6379E444E5D62000
Malicious:false
Reputation:low
Preview:2024/04/23-22:16:12.287 7a8 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/04/23-22:16:12.288 7a8 Recovering log #3.2024/04/23-22:16:12.288 7a8 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:ASCII text
Category:dropped
Size (bytes):287
Entropy (8bit):5.179103463869439
Encrypted:false
SSDEEP:6:V1LXkX1L+q2PRN2nKuAl9OmbnIFUt8q1LXx1Zmw+q1LXnLVkwORN2nKuAl9Ombjd:XUovaHAahFUt8YB1/+YB5JHAaSJ
MD5:E1135970F09E4C46C0E9D4BF4420D3D4
SHA1:1918B778A9846745F924A576E55FB0AF1CF0A738
SHA-256:772087E1D3E6667B2C3506695DD3A1DDF4CD1A8E5D5F1F2FD54D8F636CE5C860
SHA-512:5E75718953B19D92B97BA634B11585BF2D08DFD36E4A9339C0432BF7A57AF39F72BC60211D1925463253E9EB58CC3C54E86DE569C07DC75D6379E444E5D62000
Malicious:false
Reputation:low
Preview:2024/04/23-22:16:12.287 7a8 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/04/23-22:16:12.288 7a8 Recovering log #3.2024/04/23-22:16:12.288 7a8 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:ASCII text
Category:dropped
Size (bytes):331
Entropy (8bit):5.145247074685193
Encrypted:false
SSDEEP:6:V1LeM+q2PRN2nKuAl9Ombzo2jMGIFUt8q1LU6Zmw+q1LUlMVkwORN2nKuAl9OmbX:XeM+vaHAa8uFUt8YU6/+YUlMV5JHAa8z
MD5:E1A6D88F3874FE6F766C8F791B878082
SHA1:9FDEB0A25E7E22355D1C7446B7E1561C045050C9
SHA-256:375E95C87CD6B2F082A1E10902703737F95E55CD0AE7BF325494021CD0A32B17
SHA-512:9B9B44890AEB81F0A120346D96E4B3BC34420AA757925598466118E0AC0C73D4ED978B117F0D635751AC338716EC1885BFEC8260EE17A7F3DC7F35C619C87ECD
Malicious:false
Reputation:low
Preview:2024/04/23-22:16:12.178 c6c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/04/23-22:16:12.183 c6c Recovering log #3.2024/04/23-22:16:12.183 c6c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:ASCII text
Category:dropped
Size (bytes):331
Entropy (8bit):5.145247074685193
Encrypted:false
SSDEEP:6:V1LeM+q2PRN2nKuAl9Ombzo2jMGIFUt8q1LU6Zmw+q1LUlMVkwORN2nKuAl9OmbX:XeM+vaHAa8uFUt8YU6/+YUlMV5JHAa8z
MD5:E1A6D88F3874FE6F766C8F791B878082
SHA1:9FDEB0A25E7E22355D1C7446B7E1561C045050C9
SHA-256:375E95C87CD6B2F082A1E10902703737F95E55CD0AE7BF325494021CD0A32B17
SHA-512:9B9B44890AEB81F0A120346D96E4B3BC34420AA757925598466118E0AC0C73D4ED978B117F0D635751AC338716EC1885BFEC8260EE17A7F3DC7F35C619C87ECD
Malicious:false
Reputation:low
Preview:2024/04/23-22:16:12.178 c6c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/04/23-22:16:12.183 c6c Recovering log #3.2024/04/23-22:16:12.183 c6c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:JSON data
Category:modified
Size (bytes):403
Entropy (8bit):4.988966985215822
Encrypted:false
SSDEEP:12:YHO8sqZoIksBdOg2H52Zcaq3QYiubrP7E4T3y:YXskJdMHog3QYhbz7nby
MD5:E1F57D1DFEB3E8AB7A0A7E9BE5DFDCF3
SHA1:8C4DAF0F55DF85B20D92C9671DAC4D8A0ED72191
SHA-256:9B80B40CD39D417ABDDCF42DEE82F5084EC23894590B0E9D280906578FC62934
SHA-512:372017BBAA4A72D02BF7EC613C93D6DD201A2E5F8DD1057235E4DA6963E3FBBF7D611196D87508C2F8C6AE67EBC24F2D04BD696B5C7BF71CD8E69A5DEE192E8A
Malicious:false
Reputation:low
Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13358463380975289","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":109114},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:JSON data
Category:dropped
Size (bytes):403
Entropy (8bit):4.953858338552356
Encrypted:false
SSDEEP:12:YHO8sq/WLksBdOg2H9caq3QYiubrP7E4T3y:YXsRJdMHM3QYhbz7nby
MD5:4C313FE514B5F4E7E89329630909F8DC
SHA1:916EED77EC8C9DC90C64FF1E5CC9D04D4674EE56
SHA-256:1EE7C151EF264F91FCDCCB6644F62DC33E27A4E829DAAB748DA1DE4426400873
SHA-512:1726CAFCBA0121691DFA87A7298E6610BC4C7FD900867FD1B1710811E764918585E56788E08B7CA2CEE001F5DFD110E1BE6F6BBD7C2A7B7E2FC87D3DED210205
Malicious:false
Reputation:moderate, very likely benign file
Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341145152835463","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":144284},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:JSON data
Category:dropped
Size (bytes):403
Entropy (8bit):4.953858338552356
Encrypted:false
SSDEEP:12:YHO8sq/WLksBdOg2H9caq3QYiubrP7E4T3y:YXsRJdMHM3QYhbz7nby
MD5:4C313FE514B5F4E7E89329630909F8DC
SHA1:916EED77EC8C9DC90C64FF1E5CC9D04D4674EE56
SHA-256:1EE7C151EF264F91FCDCCB6644F62DC33E27A4E829DAAB748DA1DE4426400873
SHA-512:1726CAFCBA0121691DFA87A7298E6610BC4C7FD900867FD1B1710811E764918585E56788E08B7CA2CEE001F5DFD110E1BE6F6BBD7C2A7B7E2FC87D3DED210205
Malicious:false
Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341145152835463","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":144284},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:JSON data
Category:dropped
Size (bytes):403
Entropy (8bit):4.953858338552356
Encrypted:false
SSDEEP:12:YHO8sq/WLksBdOg2H9caq3QYiubrP7E4T3y:YXsRJdMHM3QYhbz7nby
MD5:4C313FE514B5F4E7E89329630909F8DC
SHA1:916EED77EC8C9DC90C64FF1E5CC9D04D4674EE56
SHA-256:1EE7C151EF264F91FCDCCB6644F62DC33E27A4E829DAAB748DA1DE4426400873
SHA-512:1726CAFCBA0121691DFA87A7298E6610BC4C7FD900867FD1B1710811E764918585E56788E08B7CA2CEE001F5DFD110E1BE6F6BBD7C2A7B7E2FC87D3DED210205
Malicious:false
Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13341145152835463","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":144284},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.16","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:data
Category:dropped
Size (bytes):4591
Entropy (8bit):5.231144125377006
Encrypted:false
SSDEEP:96:OLSw0bSwIAnrRqLX2rSq1OUxu/0OZ0xRBTxekN8xeYNlEL+gy:OLT0bTIeYa51Ogu/0OZARBT8kN88YNll
MD5:B841E7C76DEA78D327B228EC13A9CE19
SHA1:9F178630A983B4415A413FF12954F887101B6F7F
SHA-256:6DBA1CBF5F8CBEAEF0F920336433F2FF6D07F3C7A917598EBBAA78E6A5426FD2
SHA-512:0F7A930ACD28CBD33776828CF4E5F0D1D57E5142D70FCC3D94F69BDBB418B2B2222B4E1BC08C01F7A0A27B5777CACFDC2A1DEE3657285205883BCDC5B3053269
Malicious:false
Preview:*...#................version.1..namespace-e...o................next-map-id.1.Pnamespace-1d95df23_a38f_44a8_b732_4e62dd896a16-https://rna-resource.acrobat.com/.0y.S_r................next-map-id.2.Snamespace-2a884c18_b39c_4e3d_942f_252e530ca4bd-https://rna-v2-resource.acrobat.com/.16.X:r................next-map-id.3.Snamespace-2e78bfda_7188_4688_a4aa_1ff81b6e5eaa-https://rna-v2-resource.acrobat.com/.2.P.@o................next-map-id.4.Pnamespace-09c119c2_97bc_4467_8f67_f92472c9e5dc-https://rna-resource.acrobat.com/.346.+^...............Pnamespace-1d95df23_a38f_44a8_b732_4e62dd896a16-https://rna-resource.acrobat.com/....^...............Pnamespace-09c119c2_97bc_4467_8f67_f92472c9e5dc-https://rna-resource.acrobat.com/..?&a...............Snamespace-2a884c18_b39c_4e3d_942f_252e530ca4bd-https://rna-v2-resource.acrobat.com/_...a...............Snamespace-2e78bfda_7188_4688_a4aa_1ff81b6e5eaa-https://rna-v2-resource.acrobat.com/...o................next-map-id.5.Pnamespace-07af9ee9_2076_4f12_94b5_
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:ASCII text
Category:dropped
Size (bytes):319
Entropy (8bit):5.152820331948281
Encrypted:false
SSDEEP:6:V1LRReMM+q2PRN2nKuAl9OmbzNMxIFUt8q1LR1Zmw+q1LRvMVkwORN2nKuAl9Omk:XRbM+vaHAa8jFUt8YR1/+YRvMV5JHAab
MD5:843AD9F57CE97B7059289F7952AD87E2
SHA1:D1B66703DC36C010AF24394D432AA82F6F572412
SHA-256:BA829660B2D5314E94F46CA75722311E315911EA06E9ABB9F5C88EE53A183D36
SHA-512:1365AB9700D23973D9A3F9E615997F4D02BBEAE095A94C257C557DF2E3CFBADE632D5DDA43963A7EAE7E490301CD6BA7B3235D34BDB93CAD8F2D4A61B0E779B3
Malicious:false
Preview:2024/04/23-22:16:12.427 c6c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/04/23-22:16:12.453 c6c Recovering log #3.2024/04/23-22:16:12.456 c6c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:ASCII text
Category:dropped
Size (bytes):319
Entropy (8bit):5.152820331948281
Encrypted:false
SSDEEP:6:V1LRReMM+q2PRN2nKuAl9OmbzNMxIFUt8q1LR1Zmw+q1LRvMVkwORN2nKuAl9Omk:XRbM+vaHAa8jFUt8YR1/+YRvMV5JHAab
MD5:843AD9F57CE97B7059289F7952AD87E2
SHA1:D1B66703DC36C010AF24394D432AA82F6F572412
SHA-256:BA829660B2D5314E94F46CA75722311E315911EA06E9ABB9F5C88EE53A183D36
SHA-512:1365AB9700D23973D9A3F9E615997F4D02BBEAE095A94C257C557DF2E3CFBADE632D5DDA43963A7EAE7E490301CD6BA7B3235D34BDB93CAD8F2D4A61B0E779B3
Malicious:false
Preview:2024/04/23-22:16:12.427 c6c Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/04/23-22:16:12.453 c6c Recovering log #3.2024/04/23-22:16:12.456 c6c Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
Category:dropped
Size (bytes):65110
Entropy (8bit):0.951335569312826
Encrypted:false
SSDEEP:96:+6YceL/abfKL2tflJaPJqQaaDDJkKPhi9VE+dGi6x0poVM3Nx0szmFg:+ZceQfWAUJ3yKPhQVEx/xbV8Nx0szmFg
MD5:CAB46CEDFCEF68415444F5F78C6A769B
SHA1:85D94122115D658FD88FAB9A83915C7452F78F2E
SHA-256:30F43253422B409774C3186FD16C9DA67666C380B8DD23920463B92EF885DA48
SHA-512:B3E96D984C6293308A201D2342D49645E4497A5FC59F974F3F4A6428AF840088208860E936D79AC50E931597B84698B18EBCE52C9062F03CAF1EEF18421C0F3D
Malicious:false
Preview:BMV.......6...(...k...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:PC bitmap, Windows 3.x format, 107 x -152 x 32, cbSize 65110, bits offset 54
Category:dropped
Size (bytes):65110
Entropy (8bit):3.1962457506601587
Encrypted:false
SSDEEP:768:dgDwZDj8OW9owVs3ywNTfACJQmRpe6uhEMSH2m:WDwZIOW9oesXYS/2hdQ2m
MD5:3D3AB6873167A39D7892BDA1B6967A1E
SHA1:BBD9FCEF381AB7B96645ADBCE1F24BA137E9E1AE
SHA-256:B4BF8E3F1320ABE255156739A2F47F5739B6D9A7A97C17D70A18D00919264690
SHA-512:09DFFC040079EAAB9CEDDD08B35261B613981B8D53E6426FF72553297951256C34C848E6741172BEB73E47DEE19DAEDE51CE6247B267F0D25EAD89B4CD3F6D88
Malicious:false
Preview:BMV.......6...(...k...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 2, database pages 14, cookie 0x5, schema 4, UTF-8, version-valid-for 2
Category:dropped
Size (bytes):57344
Entropy (8bit):3.291927920232006
Encrypted:false
SSDEEP:192:vedRBvVui5V4R4dcQ5V4R4RtYWtEV2UUTTchqGp8F/7/z+FP:veBci5H5FY+EUUUTTcHqFzqFP
MD5:A4D5FECEFE05F21D6F81ACF4D9A788CF
SHA1:1A9AC236C80F2A2809F7DE374072E2FCCA5A775C
SHA-256:83BE4623D80FFB402FBDEC4125671DF532845A3828A1B378D99BD243A4FD8FF2
SHA-512:FF106C6B9E1EA4B1F3E3AB01FAEA21BA24A885E63DDF0C36EB0A8C3C89A9430FE676039C076C50D7C46DC4E809F6A7E35A4BFED64D9033FEBD6121AC547AA5E9
Malicious:false
Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:SQLite Rollback Journal
Category:dropped
Size (bytes):16928
Entropy (8bit):1.2141833623540268
Encrypted:false
SSDEEP:24:7+tUXqLi+zkrFsgIFsxX3pALXmnHpkDGjmcxBSkomXk+2m9RFTsyg+wmf9Mzm+Zb:7M8qLmFTIF3XmHjBoGGR+jMz+Lhh0
MD5:9D2D9F830339BE101DE4281032AA19E7
SHA1:B191BE86275D57B185271E62B0D32116FBD273C5
SHA-256:D5E98299C2C0D8E88E1B383444A3D80C20D448A44FCC7C5076C45382845F983C
SHA-512:28FC69A758ABFA6F9D3DED210E13EF63FF54608E4E301A85DE3257159E7E8187D2DC6C41F0D0D9BA5815E75C2EDD44FAB395303BCCF4C0E2BC6DE213AAD4F9D4
Malicious:false
Preview:.... .c................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:PostScript document text
Category:dropped
Size (bytes):185099
Entropy (8bit):5.182478651346149
Encrypted:false
SSDEEP:1536:JsVoWFMWQNk1KUQII5J5lZRT95tFiQibVJDS+Stu/3IVQBrp3Mv9df0CXLhNHqTM:bViyFXE07ZmandGCyN2mM7IgOP0gC
MD5:94185C5850C26B3C6FC24ABC385CDA58
SHA1:42F042285037B0C35BC4226D387F88C770AB5CAA
SHA-256:1D9979A98F7C4B3073BC03EE9D974CCE9FE265A1E2F8E9EE26A4A5528419E808
SHA-512:652657C00DD6AED1A132E1DFD0B97B8DF233CDC257DA8F75AC9F2428F2F7715186EA8B3B24F8350D409CC3D49AFDD36E904B077E28B4AD3E4D08B4DBD5714344
Malicious:false
Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Reg.FamilyName:Agency FB.StyleName:Regular.MenuName:Agency FB.StyleBits:0.WeightClass:400.WidthClass:3.AngleClass:0.FullName:Agency FB.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB.FileLength:58920.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Bold.FamilyName:Agency FB.StyleName:Bold.MenuName:Agency FB.StyleBits:2.WeightClass:700.WidthClass:3.AngleClass:0.FullName:Agency FB Bold.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB Bold.FileLength:60656.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB Bold.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Algerian.FamilyName:Algerian.StyleName:Regular.MenuName:Algerian.StyleBits:0.We
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:PostScript document text
Category:dropped
Size (bytes):185099
Entropy (8bit):5.182478651346149
Encrypted:false
SSDEEP:1536:JsVoWFMWQNk1KUQII5J5lZRT95tFiQibVJDS+Stu/3IVQBrp3Mv9df0CXLhNHqTM:bViyFXE07ZmandGCyN2mM7IgOP0gC
MD5:94185C5850C26B3C6FC24ABC385CDA58
SHA1:42F042285037B0C35BC4226D387F88C770AB5CAA
SHA-256:1D9979A98F7C4B3073BC03EE9D974CCE9FE265A1E2F8E9EE26A4A5528419E808
SHA-512:652657C00DD6AED1A132E1DFD0B97B8DF233CDC257DA8F75AC9F2428F2F7715186EA8B3B24F8350D409CC3D49AFDD36E904B077E28B4AD3E4D08B4DBD5714344
Malicious:false
Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Reg.FamilyName:Agency FB.StyleName:Regular.MenuName:Agency FB.StyleBits:0.WeightClass:400.WidthClass:3.AngleClass:0.FullName:Agency FB.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB.FileLength:58920.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:AgencyFB-Bold.FamilyName:Agency FB.StyleName:Bold.MenuName:Agency FB.StyleBits:2.WeightClass:700.WidthClass:3.AngleClass:0.FullName:Agency FB Bold.WritingScript:Roman.hasSVG:no.hasCOLR:no.VariableFontType:NonVariableFont.WinName:Agency FB Bold.FileLength:60656.NameArray:0,Win,1,Agency FB.NameArray:0,Mac,4,Agency FB Bold.NameArray:0,Win,1,Agency FB.%EndFont..%BeginFont.Handler:WinTTHandler.FontType:TrueType.FontName:Algerian.FamilyName:Algerian.StyleName:Regular.MenuName:Algerian.StyleBits:0.We
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):295
Entropy (8bit):5.369641978013755
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJM3g98kUwPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OGMbLUkee9
MD5:B90665DC2D9A6D4CDAD6D49376E85D63
SHA1:B99DCD31E542FE14D68FA4C2B153395A99678016
SHA-256:BC1EDAA5D93467C4AEE0C539CB4DA77D98A9BE5DE9B1298ACCB6BE03631153EA
SHA-512:E21C422649E8C7EE1EC88EC5A5D09A80D33891773C3FD748A2181D1811F53BF2A4CE5CB6461EA06CF28EDEE8F0846BBE2DAFBD87641130E7C618180D182D747D
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):294
Entropy (8bit):5.321661412179304
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJfBoTfXpnrPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OGWTfXcUkee9
MD5:9735BBBECCE9A6A4EC02DE4DB2A58AA0
SHA1:671537BA1A300CE51C71D2E26AD00DD327ECD3A7
SHA-256:9143702EFD4D335C94C92D95CC1A13E6F97C93963A7B77A65759E9E9DACF4EAE
SHA-512:11D2E3F2B5B68BC1D78D572D4942DDAED9D4AC60AF2ECD1FBA2FB2DE1ABF9A7E5CFB0C7F8CD42C47429AACE30DC0C2CAFD8C0DA348A68B06DDC7703C26E22FC3
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):294
Entropy (8bit):5.2996140121786635
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJfBD2G6UpnrPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OGR22cUkee9
MD5:772215DFE3BDD807F26B24C337E13252
SHA1:D52375AB9A4D0F08FE741E1DAF9BAA8199575612
SHA-256:E1A374B34F1DFCE6D92C8B0EFF0288D7991B7540EF4D55AE45F89D8EA6C0448C
SHA-512:F3432E907DDEDA359E8F8B852369B62A667C67B09DBBA0F0D35DCEA2740266D1FFADBD9EC2EE2FBB3FD2F964B98B4B3FD73A5424E43717E674A8C9207F9955A4
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):285
Entropy (8bit):5.358242468217788
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJfPmwrPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OGH56Ukee9
MD5:2FE6D93064EB8F55C286FC22E0A7A744
SHA1:D092C2CAA0CAFEAF6457AFCDA3DE4358EA0D1F44
SHA-256:BCD9CAB782BCA65ACDDD32928B148992542DE1B4EE1FA54D43D4945AA83F8FAE
SHA-512:04251E65894755BD6233BD88676E2C17403BCE1EDD96F6BA297CC5855740AE8051751EA3158B14F8A807E2D5A53EE4AFB2DC3B7940CC821114B5E054C4D00577
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):292
Entropy (8bit):5.319231293973994
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJfJWCtMdPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OGBS8Ukee9
MD5:8FC32C9EBC82C53E9479170D28862A82
SHA1:C0206908CD4C38FAD2A02FBA8FC5FFD461322E24
SHA-256:D3FFD323F1F20A73D535A4F32337F7B30481C99246FD3EEF66356EE8D722BA79
SHA-512:E06675A349E124E8CDB7F362277559B57F846ABEA6D006EAE4BF1D19F218E572AAC61AF0ADA30CA2AEC1887A9A5E1EF4D83ADAE6834992B384F229D362D5E390
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):289
Entropy (8bit):5.305607521807301
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJf8dPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OGU8Ukee9
MD5:A867B3FA40DEA40D8BC5BF42F84F0261
SHA1:41B30C3DDF12416461D551BF706DB8A29093CFC1
SHA-256:E73CADAC9FBBB89B65883D2F14E3D038C36AE16AC8AF0DE3660B7E2D03604686
SHA-512:97D4CB4942CBF997EBA3579E71F7B83D86E7EE8A61384E4DDF04CD785FB37E1AE8318B597A9CC84ABFDEE736334C75E463731BCB98F7606B90A2F0278EC1425E
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):292
Entropy (8bit):5.309092758596915
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJfQ1rPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OGY16Ukee9
MD5:DD356164BE59C3A0FBF08AD3CCCBF1CB
SHA1:2C4EEE81B4A0347CE858ECC7D436AE374FC32DC0
SHA-256:3993EE62CEA2054706719628401BB641E223719612D6676A4841C1867CAD6B4F
SHA-512:C89912983E5C2DE86DBE028BB9FAF5F2BE852BF81B3EFC954488C58032D76AB9496A795D9F32CAB7E1A0B7535C4AA7C4B8B45D980586D4DF3A3CDBFADBB7FCE2
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):289
Entropy (8bit):5.314074706486904
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJfFldPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OGz8Ukee9
MD5:5A6D78A2ECEB24EB4829154EA20D9C5C
SHA1:2CD0149B3CA931C877A792715209A301B64F6DE8
SHA-256:3D76DF739E1A67FF550EE7D98F0807B76B9BA67AF38FE7B4283747044F9BF589
SHA-512:A974DBC6C3FBB6E15B85E4A0B0B1860851E142C3D2BFAEDDDB2F0462EE830C544E14CAACAED83EF55A3B5D35212A640683CADD0E4E627984A430615AA361054A
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):1372
Entropy (8bit):5.7380946683968155
Encrypted:false
SSDEEP:24:Yv6X7ZdB2gUeKLgENRcbrZbq00iCCBrwJo++ns8ct4mFJNb:YvzgUeEgigrNt0wSJn+ns8cvFJR
MD5:44344A30945F9F2A6FB4F40DA25DFA62
SHA1:86C1D9E5E52C520C9F9B4CE1DD5FE24A6D42FD1D
SHA-256:EA6079729D84020B3BB296F83E1683B2D837FBE43089C96FDF67725438B4DA0B
SHA-512:0648518B8927E9011F9FE37C9F949FB3DAAA2E4ECFF4FED9B6C503045429A8655C96683021725862461799333E626123EBDD625C587B1CC8E004B25D8B1A77A9
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Home_LHP_Trial_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"79887_247329ActionBlock_0","campaignId":79887,"containerId":"1","controlGroupId":"","treatmentId":"acc56846-d570-4500-a26e-7f8cf2b4acad","variationId":"247329"},"containerId":1,"containerLabel":"JSON for DC_Reader_Home_LHP_Trial_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJUcnkgQWNyb2JhdCBQcm8ifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNSIsImZvbnRfc3R5bGUiOiIwIn0sImRlc2NyaXB0aW9uX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTMiLCJmb250X3N0eWxlIjoiLTEifSwidGl0bGUiOiJGcmVlIDctZGF5IHRyaWFsIiwiZGVzY3JpcHRpb24iOiJHZXQgdW5saW1pdGVkIGFjY2VzcyB0byBwcmVtaXVtIFBERiBhbmQgZS1zaWduaW5nIHRvb2xzLiIsImJ
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):289
Entropy (8bit):5.312504225722117
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJfYdPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OGg8Ukee9
MD5:D4E707C4878AF456A822FECC9C3D5FA0
SHA1:F7BBBBD7F624F470C2A25499AF8D6C51416CC58C
SHA-256:CFBE8E5C4B81C074E3F41EC57EEB28DE73AF02E984FDAE1587EB4574A0B706D6
SHA-512:5B8FF120FB4B91D733397DBF2F405355B1E877EFF1454DE23649B0953975CBC96E7D34DE2DF43FB300C059475B0DBF63068994B38122CD3F5CBF8FFE6EAA9CE8
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):1395
Entropy (8bit):5.771548901878504
Encrypted:false
SSDEEP:24:Yv6X7ZdB2gUVrLgEGOc93W2JeFmaR7CQzttgBcu141CjrWpHfRzVCV9FJNj:YvzgUVHgDv3W2aYQfgB5OUupHrQ9FJ1
MD5:5FDFD943E74FCFCBF78A0C90114CB0B5
SHA1:1421A2D7FC7A15ACCEB97B90EFD9F6BEEA033039
SHA-256:E9ECE9C6E045DC6AAC7559E341EBB4DCE3380D04E4AC7895B3AB1CD1B6B9918B
SHA-512:8CECDE94E795CED15714444435E721EC5B28B6BAE288AE4D97852D20266DCF7D8F7EAB047BBC9B9CA3E4965AD378D2B8D89FAD76C68EC2D8D48ECF5A912E2547
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_RHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"57802_176003ActionBlock_0","campaignId":57802,"containerId":"1","controlGroupId":"","treatmentId":"d0374f2d-08b2-49b9-9500-3392758c9e2e","variationId":"176003"},"containerId":1,"containerLabel":"JSON for Reader DC RHP Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctRGF5IFRyaWFsIiwiZ29fdXJsIjoiaHR0cHM6Ly9hY3JvYmF0LmFkb2JlLmNvbS9wcm94eS9wcmljaW5nL3VzL2VuL3NpZ24tZnJlZS10cmlhbC5odG1sP3RyYWNraW5naWQ9UEMxUFFMUVQmbXY9aW4tcHJvZHVjdCZtdjI9cmVhZGVyIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjEyIiwiZm9udF9zdHlsZSI6IjMifSwidGl0
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):291
Entropy (8bit):5.295965383700295
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJfbPtdPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OGDV8Ukee9
MD5:22CB729C2C0BE8D91ADEAD8C30C3AD5A
SHA1:F5465FDF1BB6DCDD83ACB7C93ABD8F9A612FEAD4
SHA-256:B9C44E3FF9346FBBA948DC856A05A29FC2B36D411731FA9B383CEFFE8E70D3BA
SHA-512:C963AFA57E41C7D6B80C05A288C5B3DF4561F49FF3D8A1E976BC119762CA168D1604B3DEBF00F6409648DA2D366983AE035A6855D04F2DEBC205A391983FBD55
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):287
Entropy (8bit):5.299815646757969
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJf21rPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OG+16Ukee9
MD5:54D1A517A4A3E4A4267F4F73B988BEE9
SHA1:58797E72ECD424410BB38DB95CFF95226786D995
SHA-256:F34B02C0A52A823A395AF993D5F230AD7FF01EA08724E63D358322AE92764163
SHA-512:C4DDBF306358E265949FCBA41183B48CE64F1A4F5B4A7199795BD612AFA5B0C59D2D08E6B4DB19B6BDE66C989AAA1C300DB41C0764C7058E8EB715D90F24D78E
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):289
Entropy (8bit):5.318733331439319
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJfbpatdPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OGVat8Ukee9
MD5:9CA32F8B82D2738179B9D0DC612860C3
SHA1:177078301FD27EB7A2417C673F1B91120E67F3DF
SHA-256:E6A1EE81ECC884889BEE0B76C60C348C0B702BB995E434BC49EE444C0C763C6E
SHA-512:A4EE5CB1F5FE560DCF746B49478C208F69A4B14FACD24B1A5368492B68000ED38D68FBEFA81130665297F15C76391D3D492EFBE2F514F7273BD6F2383748EDBA
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):286
Entropy (8bit):5.273743664395759
Encrypted:false
SSDEEP:6:YEQXJ2HX7V7dnhmQ2Ke5IRR4UhUR0Y9NCGxoAvJfshHHrPeUkwRe9:YvXKX7ZdB25WRuUhUZ9OGUUUkee9
MD5:1F173949B1FABD38B5EB5E64FA3AEC0C
SHA1:874A00B059279DC0E8750F6F65761CE472C37ED0
SHA-256:4A8BAD184CD36DB4518DB3D013C511E2CE8024BF901CB8BDFA7DC689648B636C
SHA-512:4A05FD7866B060F6130FAF87DB223E9578590FF7C574D91BE492FDA6182CD164589D64D7A3FDF0C3A9B188095AC825710241B59BCF53E4A7A51323FBF7F68321
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):782
Entropy (8bit):5.365820950546146
Encrypted:false
SSDEEP:12:YvXKX7ZdB25WRuUhUZ9OGTq16Ukee1+3CEJ1KXd15kcyKMQo7P70c0WM6ZB/uhWf:Yv6X7ZdB2gU8168CgEXX5kcIfANhi
MD5:5B453411077AB85643BD7C551320BAC4
SHA1:F62D8153B755FA7CB194A209683457E669DDC6BB
SHA-256:2750A867ACAA4B090F34600D2B92F53F03F2A61E9C3475F0ABAE721B63A0791C
SHA-512:A7105BAA637FADA1CB74D50E1E5DB55CAA7F2DD169537A3BEB9333A7EB6D852E4277010B2C1C5253AA364C07AC847C3702C0F05DC7F0494F8ACF8D439692B9FE
Malicious:false
Preview:{"analyticsData":{"responseGUID":"3384048d-aa87-4d31-933d-3a0b5152c1bc","sophiaUUID":"5E8BF9F5-1E3B-447C-A619-6054B1C06D0A"},"encodingScheme":true,"expirationDTS":1714080827400,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"Edit_InApp_Aug2020"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"20360_57769ActionBlock_0","campaignId":20360,"containerId":"1","controlGroupId":"","treatmentId":"3c07988a-9c54-409d-9d06-53885c9f21ec","variationId":"57769"},"containerId":1,"containerLabel":"JSON for switching in-app test","content":{"data":"eyJ1cHNlbGxleHBlcmltZW50Ijp7InRlc3RpZCI6IjEiLCJjb2hvcnQiOiJicm93c2VyIn19","dataType":"application\/json","encodingScheme":true},"endDTS":1735804679000,"startDTS":1713903377429}}}}
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:data
Category:dropped
Size (bytes):4
Entropy (8bit):0.8112781244591328
Encrypted:false
SSDEEP:3:e:e
MD5:DC84B0D741E5BEAE8070013ADDCC8C28
SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
Malicious:false
Preview:....
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:JSON data
Category:dropped
Size (bytes):2814
Entropy (8bit):5.131175204341189
Encrypted:false
SSDEEP:24:YL6I7yGeLsV98fMC2Uqdt2hhbnafsJaybYZ3Ubdo+cjDpIvj0S0SV5drf4///25S:YdOzIdhpruZKDG7bd8v0CvJN8+L9j3
MD5:250C151AEE3757A8A3061E05AD0F97B4
SHA1:F0E394E85E7481F4CB41EF29C560D42EE8528C49
SHA-256:6DE0F39DE11D7BD22DAE5E68E3BBE6A9D523413D9B2366CADF792F036ABFBA63
SHA-512:39856003A1220AAE6FC1A9467A50901FD8D9CCFE69AA372D499BA1C7CA024AA89C919EBCA06FE8AD287ED2E2F952AE1BEB8BAC925B9258E43851C78A6057E849
Malicious:false
Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"652cc31bea433b93d7c9bb83d23fd58b","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":289,"ts":1713903429000},{"id":"DC_Reader_RHP_Banner","info":{"dg":"9c9ee9150ce2240979f6d6e156331145","sid":"DC_Reader_RHP_Banner"},"mimeType":"file","size":1395,"ts":1713903376000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"025c65a6d0c3310244638691bfa623a8","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":1372,"ts":1713903376000},{"id":"Edit_InApp_Aug2020","info":{"dg":"4676e3e448ab63d0cd8f833c8e58650d","sid":"Edit_InApp_Aug2020"},"mimeType":"file","size":782,"ts":1713903376000},{"id":"DC_Reader_Disc_LHP_Retention","info":{"dg":"6893a7d00facfe672abc6c6cbcdd39fd","sid":"DC_Reader_Disc_LHP_Retention"},"mimeType":"file","size":292,"ts":1713903376000},{"id":"DC_Reader_More_LHP_Banner","info":{"dg":"77d17b7f1e9fec28725e1a3d1b335546","sid":"DC_Reader_More_LHP_Banner"},"mimeType":"file","size":289,"ts":1713903376000},
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
Category:dropped
Size (bytes):12288
Entropy (8bit):0.9879497487051128
Encrypted:false
SSDEEP:24:TLHRx/XYKQvGJF7urs67Y9QmQ6QeDCaIcLESiAieLCaF:TVl2GL7ms67YXtr4cI8R
MD5:540BFBD1D6D2F5CA7634C35A608BF633
SHA1:9620B10A7A00083E07C1177723C583E24E167191
SHA-256:520CEF90E189F966788821D6FCC7B910023A6753E291E9AF18A168C83A95707D
SHA-512:A2105F9AE91DAA6AB34526481D9343DA7F9F7D88FBB83B8E692972F7DB5F92101AEAC1AA24CEB22AB6384C1AA821C6980CDC35139E02BACE3BF0F62A1EAAB76D
Malicious:false
Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:SQLite Rollback Journal
Category:dropped
Size (bytes):8720
Entropy (8bit):1.345061665378389
Encrypted:false
SSDEEP:24:7+t5EASY9QmQ6QeDCa7cLESiAi0mY9QevqLBx/XYKQvGJF7ursG:7MGlYXtrLcI8KYnvqll2GL7msG
MD5:12E1E2F369F0E17C55AEB61C04C96BF2
SHA1:1BAB51F991B6DBC5BA645145137BDB5119ECA9AD
SHA-256:5C3318BD934AC4CB8845C7824F4E6EE4099F2F42404DAC63617582D08D8098CC
SHA-512:A8786BE3184BD167F359CEFB79D259D30860FD28143C43B62F1DCF95235F7F547D5B379130472555182A0B74BA97491D944F1B02FD425572A691FF8851EC3A83
Malicious:false
Preview:.... .c.....>.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j...#..#.#.#.#.#.#.#.#.7.7........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:data
Category:dropped
Size (bytes):231348
Entropy (8bit):4.391320105529435
Encrypted:false
SSDEEP:1536:8DYLIigscbP11HLsFgs09NcAz79ysQqt2CTyAqoQ7trcm0FvEk2yyKy5FxQp53uY:5Ngx9qgrmiGu24qoQBrt0FvFmVwezyQ8
MD5:D78983013EF21B91BFF13A02DC4B3431
SHA1:D8BE52B1774AB8CEC7A9C8A702E4CA8103365FBA
SHA-256:BE397CA5255AC18997F162C547C157524BEF79CEFABBB398C3A2336AA832A9EE
SHA-512:9909BF9386E30F0056BFE3933135DC14E81F25BFD0E58E08245F7E96C3017027E331016E131A600E1EE63699C36EEF5A65775563CAA48FFA8D9DF4205D248A9E
Malicious:false
Preview:TH02...... .Pp..........SM01X...,...p...............IPM.Activity...........h...............h............H..hd.O...........h............H..h\cal ...pDat...h.Yw.0.....O....h..............h........_`.j...h...@...I.lw...h....H...8..j...0....T...............d.........2h...............k..{.......B...!h.............. hV........O...#h....8.........$h........8....."h........8.....'h..f...........1h...<.........0h....4....j../h....h......jH..h....p...d.O...-h .........O...+h;......X.O......... ...... ..............F7..............FIPM.Activity....Form....Standard....Journal Entry...IPM.Microsoft.FolderDesign.FormsDescription................F.k..........1122110020000000....Microsoft...This form is used to create journal entries.........kf...... ..........&...........(.......(... ...@.....................................................................................................................fffffffff........wwwwwwww.p....pp..............p...............pw..............pw..DDDDO..
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:XML 1.0 document, ASCII text, with very long lines (1869), with no line terminators
Category:dropped
Size (bytes):1869
Entropy (8bit):5.084744172901397
Encrypted:false
SSDEEP:48:cGGdyUdyjdSyrudnzyZSyrenzyMJdyBkSyrdnzyr1nzyvASy/dyO:eEUEjdbqd2Zb622Embx2R2vAb/EO
MD5:6A7C7FFFC11D9D7A1DD1AACFAFDF57B1
SHA1:8C3FEA75ECDCF90FFDD64505B4B7D163A565D3C8
SHA-256:445F335A51E0D006D0F36B01D066C93F90E31AD515B05DD9627B73F651F76553
SHA-512:F52B262AF72BB7036CC437D721129A819B8724763D03A2E97286F3454E71B1F2689F7EEC83B77C2072C3DA9492EB2829713B3DFD4C01563EF03D58D82D7CEC3E
Malicious:false
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?><root><version>1</version><Count>12</Count><Resource><Id>Aptos_26215680</Id><LAT>2024-04-23T20:15:53Z</LAT><key>29939506207.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos_45876480</Id><LAT>2023-10-06T09:25:29Z</LAT><key>27160079615.ttf</key><folder>Aptos</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_26215424</Id><LAT>2023-10-06T09:25:29Z</LAT><key>31558910439.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Display_26215680</Id><LAT>2023-10-06T09:25:29Z</LAT><key>23001069669.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos Narrow_45876224</Id><LAT>2023-10-06T09:25:29Z</LAT><key>24153076628.ttf</key><folder>Aptos Narrow</folder><type>4</type></Resource><Resource><Id>Aptos Display_45876480</Id><LAT>2023-10-06T09:25:29Z</LAT><key>30264859306.ttf</key><folder>Aptos Display</folder><type>4</type></Resource><Resource><Id>Aptos_
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:data
Category:dropped
Size (bytes):32768
Entropy (8bit):0.04591939678467531
Encrypted:false
SSDEEP:3:Gtlxtjl2AfCBDgol1lxtjl2AfCBD4/t1R9//8l1lvlll1lllwlvlllglbelDbllb:GtWhBDg41WhBD4/F9X01PH4l942wU
MD5:6A69246CCE78119729279CD6ABBA7EBA
SHA1:A9D3FB2C29EFC1D284AEFA04FA591663BE3624F7
SHA-256:C7734266635AE6DCF6E72866A59B0ED579EE31897AF0A68CD0506A141CB1F502
SHA-512:F3994ADA752605FE8D541B05358A3156AF511D98D23EAA26FB907816B1C338E6AB5D977D5475806BF277320D072FD94B847DE91EFA2CE0161FDBDDA74B638857
Malicious:false
Preview:..-.......................0...;..8.3..L.1...P2M..-.......................0...;..8.3..L.1...P2M........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:SQLite Write-Ahead Log, version 3007000
Category:dropped
Size (bytes):49472
Entropy (8bit):0.4845005057117993
Encrypted:false
SSDEEP:48:cWXQ1N4zsUll7DYM0zO8VFDYMVBO8VFDYML:fA3ufll4jjVGMjVGC
MD5:6407288D6791DB3EE6CD86BF6CC76D23
SHA1:D3C8E7626FCE15F302AE22634781D749D9D4BDAE
SHA-256:D73E0010A132C343A4CD1E113436D333663BA44BBBCC16C596EDE8A058C756D1
SHA-512:343AADDAF827870006575C05C0DD97DDA17C8835661C5D777100A707EA592EDF885A4A00D8BC9206820678661F674E4DE10BC176BE490F18D6BBC4C6B944B1E1
Malicious:false
Preview:7....-............8.3..Ly...}.............8.3..LQ..^....SQLite format 3......@ .......................................................................... .............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:PNG image data, 588 x 165, 8-bit/color RGBA, non-interlaced
Category:dropped
Size (bytes):12194
Entropy (8bit):7.912430453345284
Encrypted:false
SSDEEP:192:scoXEqzSSCTv8dFHrpiE7I6orW5UB141ThCz9oTE2fsOylpDhv/d4NKSaHLmLkpy:ZoXD42F1/horWy/41hs9KE2fsOylrvFA
MD5:F2D413429DB255480AF2E63F8E23EFF4
SHA1:0339A2A3F323464D57C87D31E7ECEFB0ACBE3B6E
SHA-256:243553E111B099A6612B9DA4DAADAB8CFA65D5A6006D94CED26DC51AE6B6362C
SHA-512:7057539D9FB816F51E1F39ED0CAB07343F62A7C2957CB2EF6D8C13A5BBD5EB7BD6CA85F106443C0B64C51030AEA3CE0F3D8423B8C2A1DFFBA2F60465914DF3B7
Malicious:false
Preview:.PNG........IHDR...L.................sRGB.........gAMA......a.....pHYs..........o.d../7IDATx^.........4Q..".........A_.b........h,..K....&..],AEb/(.H."M.....uX..=..s.=..........>..u./^.f.Y.y..i....i.E.\..].&M\.:u.-B.!.../..&X.b..W.!..bc.`...V.!..bc.n...B.!.....B.!D..LB.!..)H0.!..B. .$..B......B.!D..LB.!..)H0.!..B. .$..B......B.!D..LB.!..)H0.!..B. .$..B......B.!D..LB.!..)H0.!..B......V...+.%+..E+.RQ..{..U...D)..B.!.C.....5k.k..k.i.:..n.E.c..i...Un..n....x.....en....A.z.I...y.F..f.]...]..2..!...p.V0-......}7s.[.py.6..Mm:5um;5s.....!..B.N.^*..pS.}...n.....K.`n..<v....,7...n.U..!..B..(+.4w.b...s.7_~.-]..-...&}:.}....`NE.V.!.."...L.V.q.*E..JA.p^..y3...?...0Z#Di.9s.;..c.......Bd.>rG.q..9rd.f.q..qB.....V.X...;7e.w%s.-]..M.l..>a~..8.7._...p@.E.d:..y.-.,.. Zh..W]uU.&?l ...Y.Q;p...K..G9...1d.V...k.R..K. .|^y.w.m..#F....W...k..{...t.IQ.M...|....&..g....}..h.....z.........SO.,.F...v....W...e....2o.0...4h...j.....65..v........~..
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:PDF document, version 1.4
Category:dropped
Size (bytes):2129650
Entropy (8bit):7.955202401773931
Encrypted:false
SSDEEP:49152:H8AeEzoFjYW+W38FxBkLgCSD4F2wTpYZPAEy3rTC/+MMz:c/djYW+Wy3x4F2wTGnyrT0hQ
MD5:90DB2523EF6470FCF8A1FFE2ABDEF1A6
SHA1:4F9D4602940B7860AA37282072E3284E6B14241D
SHA-256:0B64CF73AEBA582064E7629793E90A435BF36A91E31B449592C1D3321FBC0435
SHA-512:C21EDF31FFD50E18EED28AB0A68255FE872844A1A82EB07ABAC8E46DCDE25AE78A17B57288FDE5EBBFCABBD2AE8F3ECEF5D3A90ED5CAD21AEDE9F64CF54CDE89
Malicious:false
Preview:%PDF-1.4.%......1 0 obj.<< ./Creator (Canon SC1011)./CreationDate (D:20240131114036-05'00')./Producer (\376\377\000A\000d\000o\000b\000e\000 \000P\000S\000L\000 \0001\000.\000\.3\000e\000 \000f\000o\000r\000 \000C\000a\000n\000o\000n\000\000).>> .endobj.2 0 obj.<< ./Pages 3 0 R ./Type /Catalog ./OutputIntents 14 0 R ./Metadata 15 0 R .>> .endobj.4 0 obj.<< /Width 74 /Height 106 /BitsPerComponent 8 /ColorSpace /DeviceGray ./Filter /DCTDecode /Length 3540 >> .stream........JFIF..............Exif..MM.*.................z.....................................(...........1...........2.......................i..............Canon.................2024:01:31 11:40:36...........0221................................0100.....................J...........j......2024:01:31 11:40:36......C.......................................................................j.J.........................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxy
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):26
Entropy (8bit):3.95006375643621
Encrypted:false
SSDEEP:3:gAWY3n:qY3n
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
Malicious:false
Preview:[ZoneTransfer]..ZoneId=3..
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:PDF document, version 1.4
Category:dropped
Size (bytes):2129650
Entropy (8bit):7.955202401773931
Encrypted:false
SSDEEP:49152:H8AeEzoFjYW+W38FxBkLgCSD4F2wTpYZPAEy3rTC/+MMz:c/djYW+Wy3x4F2wTGnyrT0hQ
MD5:90DB2523EF6470FCF8A1FFE2ABDEF1A6
SHA1:4F9D4602940B7860AA37282072E3284E6B14241D
SHA-256:0B64CF73AEBA582064E7629793E90A435BF36A91E31B449592C1D3321FBC0435
SHA-512:C21EDF31FFD50E18EED28AB0A68255FE872844A1A82EB07ABAC8E46DCDE25AE78A17B57288FDE5EBBFCABBD2AE8F3ECEF5D3A90ED5CAD21AEDE9F64CF54CDE89
Malicious:false
Preview:%PDF-1.4.%......1 0 obj.<< ./Creator (Canon SC1011)./CreationDate (D:20240131114036-05'00')./Producer (\376\377\000A\000d\000o\000b\000e\000 \000P\000S\000L\000 \0001\000.\000\.3\000e\000 \000f\000o\000r\000 \000C\000a\000n\000o\000n\000\000).>> .endobj.2 0 obj.<< ./Pages 3 0 R ./Type /Catalog ./OutputIntents 14 0 R ./Metadata 15 0 R .>> .endobj.4 0 obj.<< /Width 74 /Height 106 /BitsPerComponent 8 /ColorSpace /DeviceGray ./Filter /DCTDecode /Length 3540 >> .stream........JFIF..............Exif..MM.*.................z.....................................(...........1...........2.......................i..............Canon.................2024:01:31 11:40:36...........0221................................0100.....................J...........j......2024:01:31 11:40:36......C.......................................................................j.J.........................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxy
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):26
Entropy (8bit):3.95006375643621
Encrypted:false
SSDEEP:3:gAWY3n:qY3n
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
Malicious:false
Preview:[ZoneTransfer]..ZoneId=3..
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:PDF document, version 1.4
Category:dropped
Size (bytes):4141546
Entropy (8bit):7.975919448156699
Encrypted:false
SSDEEP:98304:Rg+rEe+DgC/hjaJI+aObwfu39cjT0Vj5aheGxXiKK:Nr1+Dfh1+aOcfa9PVgcGxyp
MD5:DD5FB475BBF951210204ABEB13A2B6E0
SHA1:39449A474B649DF072E7D013EC8862E3E3620B3A
SHA-256:322006B7030CAA316A551662DCA66D3F18AAE7242E2E4D55C01F7CD55722DF55
SHA-512:F9D78A7C535073F764F5F4B3DB3440BDFC33E051ACC7C23B24CB5859C99979EEA1C7F050D91F2FD5CA39582ED51E94A3ED52AD797DF3AA38BDC8B060363F37FE
Malicious:false
Preview:%PDF-1.4.%......1 0 obj.<< ./Creator (Canon SC1011)./CreationDate (D:20240131113905-05'00')./Producer (\376\377\000A\000d\000o\000b\000e\000 \000P\000S\000L\000 \0001\000.\000\.3\000e\000 \000f\000o\000r\000 \000C\000a\000n\000o\000n\000\000).>> .endobj.2 0 obj.<< ./Pages 3 0 R ./Type /Catalog ./OutputIntents 14 0 R ./Metadata 15 0 R .>> .endobj.4 0 obj.<< /Width 74 /Height 106 /BitsPerComponent 8 /ColorSpace /DeviceGray ./Filter /DCTDecode /Length 8239 >> .stream........JFIF..............Exif..MM.*.................z.....................................(...........1...........2.......................i..............Canon.................2024:01:31 11:39:05...........0221................................0100.....................J...........j......2024:01:31 11:39:05......C.......................................................................j.J.........................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxy
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):26
Entropy (8bit):3.95006375643621
Encrypted:false
SSDEEP:3:gAWY3n:qY3n
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
Malicious:false
Preview:[ZoneTransfer]..ZoneId=3..
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:PDF document, version 1.4
Category:dropped
Size (bytes):4141546
Entropy (8bit):7.975919448156699
Encrypted:false
SSDEEP:98304:Rg+rEe+DgC/hjaJI+aObwfu39cjT0Vj5aheGxXiKK:Nr1+Dfh1+aOcfa9PVgcGxyp
MD5:DD5FB475BBF951210204ABEB13A2B6E0
SHA1:39449A474B649DF072E7D013EC8862E3E3620B3A
SHA-256:322006B7030CAA316A551662DCA66D3F18AAE7242E2E4D55C01F7CD55722DF55
SHA-512:F9D78A7C535073F764F5F4B3DB3440BDFC33E051ACC7C23B24CB5859C99979EEA1C7F050D91F2FD5CA39582ED51E94A3ED52AD797DF3AA38BDC8B060363F37FE
Malicious:false
Preview:%PDF-1.4.%......1 0 obj.<< ./Creator (Canon SC1011)./CreationDate (D:20240131113905-05'00')./Producer (\376\377\000A\000d\000o\000b\000e\000 \000P\000S\000L\000 \0001\000.\000\.3\000e\000 \000f\000o\000r\000 \000C\000a\000n\000o\000n\000\000).>> .endobj.2 0 obj.<< ./Pages 3 0 R ./Type /Catalog ./OutputIntents 14 0 R ./Metadata 15 0 R .>> .endobj.4 0 obj.<< /Width 74 /Height 106 /BitsPerComponent 8 /ColorSpace /DeviceGray ./Filter /DCTDecode /Length 8239 >> .stream........JFIF..............Exif..MM.*.................z.....................................(...........1...........2.......................i..............Canon.................2024:01:31 11:39:05...........0221................................0100.....................J...........j......2024:01:31 11:39:05......C.......................................................................j.J.........................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxy
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):26
Entropy (8bit):3.95006375643621
Encrypted:false
SSDEEP:3:gAWY3n:qY3n
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
Malicious:false
Preview:[ZoneTransfer]..ZoneId=3..
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:data
Category:dropped
Size (bytes):8888
Entropy (8bit):3.0364351891796395
Encrypted:false
SSDEEP:96:rJXPDEIpdPK4NNNNNbWEH444bVfVL2FGQF4pslb8KnxorCI44h5VfViI:rV7SYladLNpsYKKhd
MD5:6880A2C89790305EA54A96AD2FBBBB0B
SHA1:1E26B81ADA2852A6431E563922209076D13D2918
SHA-256:89102ED1F0C72B19C1006DD7B16A28C92A3434C279F1A643314D0EE488D32E19
SHA-512:DFEDA4C4FA8DA9009C6420F7E836C3938B0AD29215C0393DD08EB2612BA920C998BDBEDA4B793ECC915218EE25E9E134CCFB464761E925096739FE259640361F
Malicious:false
Preview:....H.e.r.e. .a.r.e. .t.h.e. .m.i.s.s.i.n.g. .i.n.v.o.i.c.e.s. .f.r.o.m. .J.a.n.u.a.r.y.....A.d.a.m.........O.n. .M.o.n.,. .A.p.r. .2.2.,. .2.0.2.4. .a.t. .1.1.:.2.6./ A.M. .E.d.u.a.r.d.o. .V.e.g.a. .<.H.Y.P.E.R.L.I.N.K. .".m.a.i.l.t.o.:.e.d.u.a.r.d.o...v.e.g.a.@.s.t.o.n.h.a.r.d...c.o.m."...........................................................................................................................................................................................................................................\...h...l...........Z...^...d...h...........h...L...P...............B...\...~...............................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:ASCII text, with very long lines (28782), with CRLF line terminators
Category:dropped
Size (bytes):20971520
Entropy (8bit):0.1607836547315506
Encrypted:false
SSDEEP:1536:kXlxu7qVTNVOPgVCwLBIXDmKoTH7dU+8cVjz74Ed5iBMZ:97yHOPCd193
MD5:665CB387CD93B89FB3F45A8F0DA36E58
SHA1:D5E8F60F1AB084D87B07E46701C25E56FC73FFCE
SHA-256:F47331B7915707B391407C9FE5C51E6EB5469774C37301D38FAD70E8A4118329
SHA-512:F8B29FE2B4FBFF9D4643A508D59E60392D85D75102D4880B0F40962F6DE263E2AFA7265876AAB7C54CA66EA94EC6F2CD7A55AF2F6252F60F79DA370FA48595EC
Malicious:false
Preview:Timestamp.Process.TID.Area.Category.EventID.Level.Message.Correlation..04/23/2024 20:15:51.766.OUTLOOK (0x1890).0x188C.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.GDIAssistant.HandleCallback","Flags":30962256044949761,"InternalSequenceNumber":26,"Time":"2024-04-23T20:15:51.766Z","Contract":"Office.System.Activity","Activity.CV":"lwwgE8nxwUmbQ2091vPocA.4.11","Activity.Duration":18,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.GdiFamilyName":"","Data.CloudFontStatus":6,"Data.CloudFontTypes":256}...04/23/2024 20:15:51.797.OUTLOOK (0x1890).0x188C.Microsoft Outlook.Telemetry Event.b7vzq.Medium.SendEvent {"EventName":"Office.Text.ResourceClient.Deserialize","Flags":30962256044949761,"InternalSequenceNumber":28,"Time":"2024-04-23T20:15:51.797Z","Contract":"Office.System.Activity","Activity.CV":"lwwgE8nxwUmbQ2091vPocA.4.12","Activity.Duration":26803,"Activity.Count":1,"Activity.AggMode":0,"Activity.Success":true,"Data.JsonFileMajor
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:data
Category:dropped
Size (bytes):20971520
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3::
MD5:8F4E33F3DC3E414FF94E5FB6905CBA8C
SHA1:9674344C90C2F0646F0B78026E127C9B86E3AD77
SHA-256:CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC
SHA-512:7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB
Malicious:false
Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):246
Entropy (8bit):3.51161293806784
Encrypted:false
SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8rkIlj2Yle:Qw946cPbiOxDlbYnuRKij/w
MD5:D112CBFDD0CD25AE677CB43032355FC9
SHA1:A5C1986019F655146B04488D553AB9EF6A3CAF8B
SHA-256:5693306308CCD9A20CBA9806D6E0085F4479284EA3716226C14EA0BC208DC110
SHA-512:C57EB1E88F13AC4B3F2D7EF3B6DE7175E0BF1BC1603097DDF0F04907608B16F9F368116FF4E3194C7F83E980A5D2E25FB552F27BC06A314F801D897F736230E7
Malicious:false
Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.3./.0.4./.2.0.2.4. . .2.2.:.1.6.:.1.6. .=.=.=.....
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:data
Category:dropped
Size (bytes):106496
Entropy (8bit):4.519292961568789
Encrypted:false
SSDEEP:768:kmRDVtOHl7BGIvbz4EII9O5F+UZkT1XjIXlOrW4WCWhWXOaaF:ot4E79O5nZkhIXlikF
MD5:8EE3D798580F17C3710BA365DAE197FE
SHA1:087F591285E3920E1945F0CCDA29B3C72C61BF08
SHA-256:08C63BA0FE66C8CA14C1381638505BB44CDC55A51441BBAE08905822925A12A1
SHA-512:23C2536072016A6C3AF612D22B31228A11422E1F997DD570A2329710B6F79F6D6868E73D09AFB4DB3C63BDD064FDFDA4047E88FE1DE2FB3F2B3BAA9559CCCF74
Malicious:false
Preview:............................................................................`............[......................eJ..............Zb..2.......................................@.t.z.r.e.s...d.l.l.,.-.3.2.2.......................................................@.t.z.r.e.s...d.l.l.,.-.3.2.1............................................................l...Y...........[..............v.2._.O.U.T.L.O.O.K.:.1.8.9.0.:.3.1.d.d.2.8.1.9.f.b.5.8.4.2.b.4.8.b.1.b.2.9.a.1.8.8.9.2.1.d.f.5...C.:.\.U.s.e.r.s.\.c.a.l.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.O.u.t.l.o.o.k. .L.o.g.g.i.n.g.\.O.U.T.L.O.O.K._.1.6._.0._.1.6.8.2.7._.2.0.1.3.0.-.2.0.2.4.0.4.2.3.T.2.2.1.5.5.1.0.4.8.2.-.6.2.8.8...e.t.l.......P.P.........v..............................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:ASCII text, with very long lines (393)
Category:dropped
Size (bytes):16525
Entropy (8bit):5.353642815103214
Encrypted:false
SSDEEP:384:tbxtsuP+XEWJJQbnR8L31M7HeltV+KYm3wsa2KjF4ODkr/O8r2IUHUHMWwEyZRN2:aPL
MD5:91F06491552FC977E9E8AF47786EE7C1
SHA1:8FEB27904897FFCC2BE1A985D479D7F75F11CEFC
SHA-256:06582F9F48220653B0CB355A53A9B145DA049C536D00095C57FCB3E941BA90BB
SHA-512:A63E6E0D25B88EBB6602885AB8E91167D37267B24516A11F7492F48876D3DDCAE44FFC386E146F3CF6EB4FA6AF251602143F254687B17FCFE6F00783095C5082
Malicious:false
Preview:SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:072+0200 ThreadID=6404 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:073+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=ec4bacf2-5410-40d4-850b-5ac338f864f3.1696585143072 Timestamp=2023-10-06T11:39:03:073+0200 ThreadID=6404 Component=ngl-lib_NglAppLib Description="SetConfig:
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:ASCII text, with very long lines (393), with CRLF line terminators
Category:dropped
Size (bytes):15114
Entropy (8bit):5.35732370293905
Encrypted:false
SSDEEP:384:MNXQvF6dSfyRvZQOj5CJn2bvchvsUsjeKubUL/hpglUTS3uWUV29q98B6E8veOax:NN
MD5:8D8E5E18383C6DED3D05A970BB594047
SHA1:339912260FB7256B6AB71A4C94BE81D1DEAA1637
SHA-256:84AC7D45353686DAAD8F3EB0E6A868109938A01CFD86653790D6D6FBE0F7C4CB
SHA-512:9B513415903A26BF2AFC584E177808C72DD17872AB3A39E1E86265E5D26631465BB022B2ED9B275C21B2F2044C841C88CEFE2EECCCA5E4C483B919D18E2FF031
Malicious:false
Preview:SessionID=c60cdcca-04d8-48d1-8f52-ce1e3bb62a3b.1713903370682 Timestamp=2024-04-23T22:16:10:682+0200 ThreadID=2464 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=c60cdcca-04d8-48d1-8f52-ce1e3bb62a3b.1713903370682 Timestamp=2024-04-23T22:16:10:695+0200 ThreadID=2464 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=c60cdcca-04d8-48d1-8f52-ce1e3bb62a3b.1713903370682 Timestamp=2024-04-23T22:16:10:695+0200 ThreadID=2464 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=c60cdcca-04d8-48d1-8f52-ce1e3bb62a3b.1713903370682 Timestamp=2024-04-23T22:16:10:695+0200 ThreadID=2464 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=c60cdcca-04d8-48d1-8f52-ce1e3bb62a3b.1713903370682 Timestamp=2024-04-23T22:16:10:703+0200 ThreadID=2464 Component=ngl-lib_NglAppLib Description="SetConf
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):29752
Entropy (8bit):5.41581841147018
Encrypted:false
SSDEEP:192:0cbgIhPcbocbAIlncb2cbwI/RcbNcbQIVvcbOcbIItjcbh:fhWlA/TVItA
MD5:EDCE71C0A1BAB76AA9C88E867DA7C705
SHA1:7A077334E681BD65634C1A09D0669EF3A00709E4
SHA-256:FFB9B95CB9639464EDC7F732E7CF46438DCA946F3FD8CF0399A74923D2CC7CC9
SHA-512:53EE3C3BA2FEE50757D2A6348719670C76C127399227BC998ADB954161614920B8BC382078E0EB50192B0EC998EDDC8627A60DD36A5FD68ABE27DAD7AAA3FDDE
Malicious:false
Preview:06-10-2023 10:08:42:.---2---..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ***************************************..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : Starting NGL..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..06-10-2023 10:08:42:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..06-10-2023 10:08:42:.Closing File..06-10-
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
Category:dropped
Size (bytes):386528
Entropy (8bit):7.9736851559892425
Encrypted:false
SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
MD5:5C48B0AD2FEF800949466AE872E1F1E2
SHA1:337D617AE142815EDDACB48484628C1F16692A2F
SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
Malicious:false
Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
Category:dropped
Size (bytes):758601
Entropy (8bit):7.98639316555857
Encrypted:false
SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
MD5:3A49135134665364308390AC398006F1
SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
Malicious:false
Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
Category:dropped
Size (bytes):386528
Entropy (8bit):7.9736851559892425
Encrypted:false
SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
MD5:5C48B0AD2FEF800949466AE872E1F1E2
SHA1:337D617AE142815EDDACB48484628C1F16692A2F
SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
Malicious:false
Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
Category:dropped
Size (bytes):758601
Entropy (8bit):7.98639316555857
Encrypted:false
SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
MD5:3A49135134665364308390AC398006F1
SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
Malicious:false
Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
Category:dropped
Size (bytes):386528
Entropy (8bit):7.9736851559892425
Encrypted:false
SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
MD5:5C48B0AD2FEF800949466AE872E1F1E2
SHA1:337D617AE142815EDDACB48484628C1F16692A2F
SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
Malicious:false
Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
Category:dropped
Size (bytes):758601
Entropy (8bit):7.98639316555857
Encrypted:false
SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
MD5:3A49135134665364308390AC398006F1
SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
Malicious:false
Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 42290
Category:dropped
Size (bytes):1407294
Entropy (8bit):7.97605879016224
Encrypted:false
SSDEEP:24576:NtKdpy6mlind9j2kvhsfFXpAXDgrFBU2/R07tOWL07oYGZQeYIGNPB:Ta3mlind9i4ufFXpAXkrfUs0kWLxYGZQ
MD5:DEF321E04EC4FBB953CBC6F27CD0FBDC
SHA1:97D56ACC0F395E6252B92C6DAB0B301F25473FDA
SHA-256:A78C038B2D62BFD7BA229DAEA891991187779DD7B2963F272BE8FE3EE866266A
SHA-512:1BB66A1000BF8BF047F67163BA1913823913E76EDF022514D900FCA2E98EA880BA68A628CE574BE5D5A6680A735036E4E851D6DF9F5209CE468FCBDDD5F61CC5
Malicious:false
Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 42290
Category:dropped
Size (bytes):1419751
Entropy (8bit):7.976496077007677
Encrypted:false
SSDEEP:24576:/rKdpy6mlind9j2kvhsfFXpAXDgrFBU2/R07tOWL57oYGZQeYIGNPB:Ta3mlind9i4ufFXpAXkrfUs0kWLqYGZQ
MD5:C12D53CA8B8A9B6D6E32D0AF9F588219
SHA1:27E44493733E3B80A2B71774CC8CBADC9E113D52
SHA-256:B9E3D41AE701C771D95E113F54207D431E379F4A013DDF98D9D69F49961C486F
SHA-512:185B3E9A283DAE9D79BB581231E153229673F73957A63B88ED387370F04DEB86660C0C95765E2B984768CA3C076CB1D0BCB84802C293CFE288F1849703674BA9
Malicious:false
Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:data
Category:dropped
Size (bytes):1998578
Entropy (8bit):7.952621591916662
Encrypted:false
SSDEEP:49152:JeEzoFjYW+W38FxBkLgCSD4F2wTpYZPAEy3rTC/+MMz:sdjYW+Wy3x4F2wTGnyrT0hQ
MD5:DB04B5749B278BD722909FA92E7F6456
SHA1:A35BBE53E494F542A539314648C528B8B3440964
SHA-256:4A27E3E5A84F3E47842ABB9A08334E045F794F4EFA330A2F97FC0977B70AFA70
SHA-512:936772E7CBB385CF520134B1FE03B965A06A53E13FFBB3A8D3A112C937242D344C77BD51415FE1A14873B66AC338B15261F1C5AFA02397D95E626ACA2A1061FD
Malicious:false
Preview:..\J..E../..6.....EE.2....h.o.........b.4.^?.p.`;...=wJ...D..&....q...)...x......P>..G.ts.........\#0Y5zF.J........Vk...S......5i..s...S<@u....3<.{..v...$@...[..>......K O...[...Scq.......9......g4..l.*I...2.......fv).R.e.S....*e.+~>...]..l.4....8JTb=n.@5.w..~.Ds.D..WP"..8A..^]+..../...^5.Q.WML..E.....Z.g..L..~..a...o....k.....{^....;..U...D.....g..u:d.S+D....7x....B...-1+.)..(.Z}D..E}B=....g.1.h..j(w.2&.I.sD?..nk,.....y....l!...!........X.0d...vw`.{..Z...Vq.....w....o...?Z...D......^.Y$...}/.......|......k7..L.h..3_.....I"...K..~x.....!X....F._f.Z^.).@#.M(..).0......>.v.zZ...T.......M5.g.....c..5p..z..&..c,wB..'....o...|...nFb....<..t..n..5.l}.e.e..22d;k1.8=.v.=.Z\?.W{]...[B..@.V..o....~..Gb..3WI.`..d C=7.?..<.....5.....B...........5c....l+~i../W...M.!.J....p..X.sH...T.nL=..5....j.f...b.)..gu....oeP.........`...'..-.uO.Ia..K.....%=.......r.n.?\.CF.{~.O.....Q.!\<...B.o.U.{Pz....b.........b.L5.p0..s..k.L...8......-...eQP...DBD.[...
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:data
Category:dropped
Size (bytes):4010474
Entropy (8bit):7.974631109577798
Encrypted:false
SSDEEP:98304:W+rEe+DgC/hjaJI+aObwfu39cjT0Vj5aheGxXiKK:tr1+Dfh1+aOcfa9PVgcGxyp
MD5:E11212B8A068DAE73A41B45FC33AF805
SHA1:DAE14A37A5BA7BDE6F5BC9995D17C6442149A58B
SHA-256:AAA43951132CD82E6224E869159AB84F80D6CD016A3F4B16CDF6C3A91CB07626
SHA-512:BDD62FCEC86EC8AB9DE9AC99BB259868513F0DD264F507C10D2AB0F61BA1AE88AB09AB40B4C84D93996002FAB9CB2B4E03265F296AA9AAA766FD4BC1659A19FA
Malicious:false
Preview:..Hj.$..Ky...].'i.....$F..A}..>$s.\..e.@..5`.a....ckz........&~......Jq...6...JO>8cuNq2..7.........]`.I......5...}5..#t.4....X.P'K.Yl.Y.#.pLd.A.a.WBt..,...B..l5..E.an.w..7...D.#Z.1{."P?N..^....8z).kZ._.i..g. q..Jej^..M.m..]..\\..TI0Y.|l9Q.M..&.....ZB|;...cz"N.r...G....r..".....ta.X.9i[A#.1.n.a....cS*.).....h...[......*..3.;..y'.d}....@.[k..b(.J..C.H.&.........M.T......Lp...*g.....f/3..l.U.......^.....'`._..L.P..ut..E.6E....G..[.k.....:j[n.n.X3.).6R.#.......'.).M.#.kVW$.xO..E....{..F.QS.O.<.p....gkGhBt..?a....v..~L..-aR...ue.u.~d*p.|.[..Q\..?$.y../..1....w.r...>..K......Fz3...t-N`..X.c.m..i/....O\..o.j@...fu.z..|.YI...lk.&.o..-......J.d...5..5.(....A.X...v...=..C-...%...-..k.q.*.Of........]_3...XO.0..Z.W...[&'F.r5..s....4M3[V\2.t...K$.4.q.....&\....M..Dy.=.S...#.../Tr..q(...T.0E.Y.......L.A).S.B.R5e.B`%4..vl.......sv..B..(..'.e.....1.c....YTOy..!>]-.z.g..."..<....@........ +..]5k.:......(...\.......7.}.."/......@m...........wU..;.7....K.
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:data
Category:dropped
Size (bytes):30
Entropy (8bit):1.2389205950315936
Encrypted:false
SSDEEP:3:ak/X:a
MD5:E065ED9E0BA27CE9AA01B2E6DCE176D6
SHA1:8EC18FEC23AC624BEA7E64A6701E8E796134E0F9
SHA-256:DA8972E0ED195C72876583AF6A2366689942472ECEB405D435431A90FD0C7869
SHA-512:9395E798F791005F6EE92319B520019750A6ECAD795E268B98DF69C7F3A87EABA79C1D173FA0C1558C42431581108809319AA5BC5634E1447CEA5F2F89D4683D
Malicious:false
Preview:..............................
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:Microsoft Outlook email folder (>=2003)
Category:dropped
Size (bytes):8397824
Entropy (8bit):6.840370859225262
Encrypted:false
SSDEEP:196608:Ln4lkM/96V5jan05mWTgPmloPuxffOWueQUTClHE:klkMOlxmOu4oI3TfCO
MD5:AB1FA0D247E7D50064F90EBFC0EFE740
SHA1:D01F380A84AE883F9FAAE866FBACE3774940D52C
SHA-256:BB9452F3B3C6EA1293C13A29BF6BEDE2633CB7BD750EC02A477940534CE8E0AE
SHA-512:5F0BB77C018B99BDE51E681F5A630CB6139283262DE1B117E012BC20182C67BFDDAFD297C6D76EDF1665C7D521B27E4B4CE0D5DC2D2E6D1707BA8C9EC925D9A4
Malicious:false
Preview:!BDN..R.SM......\........S......i.......`................@...........@...@...................................@...........................................................................$.......D|.....................d........be.....h.........e..........................................................................................................................................................................................................................................................................................i..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
File Type:data
Category:dropped
Size (bytes):6422528
Entropy (8bit):7.952823290860113
Encrypted:false
SSDEEP:196608:4HyVqXZcP8en3YKYKq1aOb8HyVqXZcP8en3YKYKq1:nVtP85ZFcCVtP85ZF
MD5:7CEC575E72E9D177EDA26F0A8178A6A6
SHA1:9787EBE3EB2861B4D230CC1C334E1E670115CD45
SHA-256:E039898240D0AB57E05D0A2BA616A7EABCE8FE4B410175AC217A9C53F50DEB6A
SHA-512:3114E32FDB4A03DC71232CFDF6563D2B24C78FFD9B4221AF600A6424548643687598EF18B7875518B09C7E915A7BE6FDDFEAB1C0B1B3F3644216EA545D6A94AE
Malicious:false
Preview:.`.N0...............(x............e...........#......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................,....e.....P.}.0...............(x...........$a...........#.........................................................................................................................................................................................................................................................................................................................................................................................................
File type:ASCII text, with CRLF line terminators
Entropy (8bit):6.04511251464117
TrID:
    File name:Re_ Remittances needed (1).eml
    File size:8'612'270 bytes
    MD5:c307adf0c0d4db6a92d2977aa224c46b
    SHA1:80060d2ed5be1dfabff839fdba57230ed1817896
    SHA256:e20012cca0b8c7ba8fe00d901ecb021530a9e1b4ae0b0da89e491bdd7d3985fe
    SHA512:d72ed6c5e99737eff5bd64111b2794e94ce784df6da3ac62f1b94cde64496799f16296c0f4f6cff9dcf0c20de34be5a82da253477f97fb1436d00e4400ccc7d4
    SSDEEP:49152:NRcE1ZTUfW0/dF7bikKkNnfDo93eff9bl8U0WZzeESEdwPsfpKjQxwTpqU560qqI:E
    TLSH:92861227F84F16D74F2490B7DF477C04BCA872630DA135B17F8981BC94EE16A868963A
    File Content Preview:Authentication-Results: relay.mimecast.com;...dkim=pass header.d=gmail.com header.s=20230601 header.b=K1VMqid+;...dmarc=pass (policy=none) header.from=gmail.com;...spf=pass (relay.mimecast.com: domain of transportaa.montreal@gmail.com designates 209.85.16
    Subject:Re: Remittances needed
    From:Transport A&A Adam <transportaa.montreal@gmail.com>
    To:Eduardo Vega <eduardo.vega@stonhard.com>
    Cc:
    BCC:
    Date:Mon, 22 Apr 2024 11:27:05 -0400
    Communications:
    • Here are the missing invoices from January. Adam On Mon, Apr 22, 2024 at 11:26AM Eduardo Vega <eduardo.vega@stonhard.com> wrote: > Hi Adam, > Thank you for letting us know that, we are going to make a shot pay for > our next ACH payment. > > And I just realized that our firewall blocked that email of January 31st , > could you please resend the invoices of Jan 31st to me? > > Best regards! > ------------------------------ > *De:* Transport A&A Adam <transportaa.montreal@gmail.com> > *Enviado:* lunes, 22 de abril de 2024 9:06 > *Para:* Eduardo Vega <eduardo.vega@stonhard.com> > *Asunto:* Re: Remittances needed > > Caution: This email originated from an external source. Do not click links > or open attachments unless you recognize the sender and know the content is > safe. > > Hi Eduardo, thanks for getting back to me so quickly! > There seems to be an overpayment of $325 on the April 18th payment. > Invoice 103950 was paid in full but then a second payment was made towards > that same invoice for $325. I've added it as a credit so please short pay > your next invoice by that amount. > Also to note is that there is a batch of invoices from January that > haven't been paid. Please see the attached statement and let me know if you > need any backups. > Thanks, Adam > Transport A&A > > > > On Mon, Apr 22, 2024 at 9:35AM Eduardo Vega <eduardo.vega@stonhard.com> > wrote: > > Hi Adam, > > Attached are both of them, I think the remittance of April 18th was sent > last Friday, Could you please confirm? > > > Best regards > Eduardo Vega > > ------------------------------ > *De:* Transport A&A Adam <transportaa.montreal@gmail.com> > *Enviado:* viernes, 19 de abril de 2024 12:45 > *Para:* Eduardo Vega <eduardo.vega@stonhard.com> > *Asunto:* Remittances needed > > Caution: This email originated from an external source. Do not click links > or open attachments unless you recognize the sender and know the content is > safe. > > Hey Eduardo, I'm looking for two remittances please. one for a payment > made on March 28th, $5201.49 and another made on April 18th for $7566.78. > Can you look into this for me and get back when you have a chance? > Thanks, Adam > Transport A&A > > > > >
    Attachments:
    • STONHARD INVOICES 103823-103838.pdf
    • STONHARD PACKING LISTS.pdf
    Key Value
    Authentication-Resultsrelay.mimecast.com; dkim=pass header.d=gmail.com header.s=20230601 header.b=K1VMqid+; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (relay.mimecast.com: domain of transportaa.montreal@gmail.com designates 209.85.167.43 as permitted sender) smtp.mailfrom=transportaa.montreal@gmail.com
    Receivedby mail-lf1-f43.google.com with SMTP id 2adb3069b0e04-51ab4ee9df8so4264677e87.1 for <eduardo.vega@stonhard.com>; Mon, 22 Apr 2024 08:35:36 -0700 (PDT)
    X-MC-UniqueCeNoRPXuPRi97QZsAQPdgg-1
    DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1713800134; x=1714404934; darn=stonhard.com; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=EPQbbsbonDSPQ8KCUWfgqP3fmpwktCw7Mgububbcgc4=; b=K1VMqid+rYCZ6T/Ti0Lhv5MPb1zNV+HIU9SrJXD6aXlD0DaRsvWYLPDUwf0gelnhEJ tVMZfwj8oqDnqtQAXk+6UlXKZLX0HFSZpO2S82rU+42pCGXQdCNo24HWFKSBNypYzCZb HoSahAj7ANTBuxjRU6Ri0Ia84tiiJAvksT7LYIaMvQmi7G6GfY1KSiiHjibqWm58Whka TRHUWP3F2QvT2q/YEThAXwlCLBDt7kMQp7oLYx3c+8uEbspkI4dL82ouq+cULDkeXe25 DBIr3AJdf2ZaRpzQv7NrKw5utJAYbs9OK/1GKxF2wOI9REVSYG965LmmwHZRd9uQQIhj eLsw==
    X-Google-DKIM-Signaturev=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1713800134; x=1714404934; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=EPQbbsbonDSPQ8KCUWfgqP3fmpwktCw7Mgububbcgc4=; b=UzW8HSbFy/Jha7ZG+4xNHJU6IyzRnwhpNYlf+ysOg1W2iakno6kqnW+d41owtKM4UP 4HlxG8BpRQl0e6JAy8tZtHyLsNPDQEjQd4MupTkoCTi8QiPQe+WLZDYymHsHlQC1NhM8 vMfkwLQiKmXyYlYfQ/a+NfWxe4tD9AEWruX23hG5iRjdrhxwnivH70UH88g8Qf3xC/cu Ggucr4S8DDQlTI1oXZbhPpTuQiF78ARBS9VFe9le63GhYj78GrICBPLU8xMoowCLB66G 8eMv9ItAjIV/9TdMoit7jQqmB540QY9uulApJ/L3YMZW0iZV7ft8NUlk1OTA/KkQPMkU OVfg==
    X-Gm-Message-StateAOJu0YzdCectEVEmtQmJgSqd4Svppxl+yQi5StDHkWfUS+ikrfzYLYzk dNHDlpSCU95D5EkoyEE4fhnAXgosHC2I883HTvHgHs9p7Akq38csUheTVrE6xPZIRWZpxvoIyrp sisqbf2UkOt76hvl07Hzs0F5S83g4qg==
    X-Google-Smtp-SourceAGHT+IG7QX05MZ6iQOnt0ybxTvuuJP79exWpvi5PemfEiwWbCVJdgTee0dmaSACFCsyqmZ6ALqfZY2mHP441PQpRJ1Y=
    X-Receivedby 2002:a05:6512:31c9:b0:516:cc31:dbf0 with SMTP id j9-20020a05651231c900b00516cc31dbf0mr10169403lfe.17.1713800133040; Mon, 22 Apr 2024 08:35:33 -0700 (PDT)
    MIME-Version1.0
    References<CAOaCQ_BANNvArkxw+CL7NGKjj5kp2GF8c2EA3qjHDUavQ-a7wA@mail.gmail.com> <PH0PR18MB4591A9D266F238A655C984E6FB122@PH0PR18MB4591.namprd18.prod.outlook.com> <CAOaCQ_Dqtc4cHD8q-BMwaPfr0Zbzk-kimzJcN3Ecy51UTJBxLw@mail.gmail.com> <PH0PR18MB45914B5DCCE4D4150B349783FB122@PH0PR18MB4591.namprd18.prod.outlook.com>
    In-Reply-To<PH0PR18MB45914B5DCCE4D4150B349783FB122@PH0PR18MB4591.namprd18.prod.outlook.com>
    FromTransport A&A Adam <transportaa.montreal@gmail.com>
    DateMon, 22 Apr 2024 11:27:05 -0400
    Message-ID<CAOaCQ_A2ChOMdxU42zeG2M9OFQjPLO5N76sqXE=nC4WBsOz-0g@mail.gmail.com>
    SubjectRe: Remittances needed
    ToEduardo Vega <eduardo.vega@stonhard.com>
    X-Mimecast-Spam-Score-4
    Content-Typemultipart/mixed; boundary="00000000000025e9d40616b13052"

    Icon Hash:46070c0a8e0c67d6
    TimestampSource PortDest PortSource IPDest IP
    Apr 23, 2024 22:16:21.796297073 CEST49718443192.168.2.1623.62.216.143
    Apr 23, 2024 22:16:21.796334028 CEST4434971823.62.216.143192.168.2.16
    Apr 23, 2024 22:16:21.796435118 CEST49718443192.168.2.1623.62.216.143
    Apr 23, 2024 22:16:21.796669006 CEST49718443192.168.2.1623.62.216.143
    Apr 23, 2024 22:16:21.796683073 CEST4434971823.62.216.143192.168.2.16
    Apr 23, 2024 22:16:22.119997978 CEST4434971823.62.216.143192.168.2.16
    Apr 23, 2024 22:16:22.120299101 CEST49718443192.168.2.1623.62.216.143
    Apr 23, 2024 22:16:22.120315075 CEST4434971823.62.216.143192.168.2.16
    Apr 23, 2024 22:16:22.121767998 CEST4434971823.62.216.143192.168.2.16
    Apr 23, 2024 22:16:22.121841908 CEST49718443192.168.2.1623.62.216.143
    Apr 23, 2024 22:16:22.123917103 CEST49718443192.168.2.1623.62.216.143
    Apr 23, 2024 22:16:22.123996019 CEST4434971823.62.216.143192.168.2.16
    Apr 23, 2024 22:16:22.124092102 CEST49718443192.168.2.1623.62.216.143
    Apr 23, 2024 22:16:22.168159008 CEST4434971823.62.216.143192.168.2.16
    Apr 23, 2024 22:16:22.173250914 CEST49718443192.168.2.1623.62.216.143
    Apr 23, 2024 22:16:22.173259974 CEST4434971823.62.216.143192.168.2.16
    Apr 23, 2024 22:16:22.220242977 CEST49718443192.168.2.1623.62.216.143
    Apr 23, 2024 22:16:22.229275942 CEST4434971823.62.216.143192.168.2.16
    Apr 23, 2024 22:16:22.229350090 CEST4434971823.62.216.143192.168.2.16
    Apr 23, 2024 22:16:22.229438066 CEST49718443192.168.2.1623.62.216.143
    Apr 23, 2024 22:16:22.230896950 CEST49718443192.168.2.1623.62.216.143
    Apr 23, 2024 22:16:22.230909109 CEST4434971823.62.216.143192.168.2.16
    • armmf.adobe.com
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.164971823.62.216.1434433224C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
    TimestampBytes transferredDirectionData
    2024-04-23 20:16:22 UTC390OUTGET /onboarding/smskillreader.txt HTTP/1.1
    Host: armmf.adobe.com
    Connection: keep-alive
    Accept-Language: en-US,en;q=0.9
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36
    Sec-Fetch-Site: same-origin
    Sec-Fetch-Mode: no-cors
    Sec-Fetch-Dest: empty
    Accept-Encoding: gzip, deflate, br
    2024-04-23 20:16:22 UTC247INHTTP/1.1 200 OK
    Server: Apache
    Last-Modified: Mon, 01 May 2023 15:02:33 GMT
    ETag: "78-5faa31cce96da"
    Accept-Ranges: bytes
    Content-Length: 120
    Content-Type: text/plain; charset=UTF-8
    Date: Tue, 23 Apr 2024 20:16:22 GMT
    Connection: close
    2024-04-23 20:16:22 UTC120INData Raw: 46 69 6c 65 20 74 68 61 74 20 61 63 74 73 20 6c 69 6b 65 20 61 20 4b 69 6c 6c 20 73 77 69 74 63 68 20 66 6f 72 20 53 4d 53 20 66 75 6e 63 74 69 6f 6e 61 6c 69 74 79 20 69 6e 20 52 65 61 64 65 72 2e 20 44 65 6c 65 74 65 20 74 68 69 73 20 66 69 6c 65 20 74 6f 20 65 6e 61 62 6c 65 20 74 68 65 20 6b 69 6c 6c 20 73 77 69 74 63 68 20 69 6e 20 52 65 61 64 65 72 2e
    Data Ascii: File that acts like a Kill switch for SMS functionality in Reader. Delete this file to enable the kill switch in Reader.


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:22:15:51
    Start date:23/04/2024
    Path:C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" /eml "C:\Users\user\Desktop\Re_ Remittances needed (1).eml"
    Imagebase:0x20000
    File size:34'446'744 bytes
    MD5 hash:91A5292942864110ED734005B7E005C0
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:false

    Target ID:2
    Start time:22:15:52
    Start date:23/04/2024
    Path:C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe" "016F1EBA-115D-4877-9F9C-41459D6E8602" "7EAD5ED6-0459-4323-8199-461E7BAB052C" "6288" "C:\Program Files (x86)\Microsoft Office\Root\Office16\OUTLOOK.EXE" "WordCombinedFloatieLreOnline.onnx"
    Imagebase:0x7ff7570c0000
    File size:710'048 bytes
    MD5 hash:EC652BEDD90E089D9406AFED89A8A8BD
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:false

    Target ID:11
    Start time:22:16:06
    Start date:23/04/2024
    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\VPL6CO4Q\STONHARD INVOICES 103823-103838.pdf"
    Imagebase:0x7ff741c50000
    File size:5'641'176 bytes
    MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:false

    Target ID:12
    Start time:22:16:07
    Start date:23/04/2024
    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
    Imagebase:0x7ff679db0000
    File size:3'581'912 bytes
    MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:false

    Target ID:13
    Start time:22:16:11
    Start date:23/04/2024
    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\VPL6CO4Q\STONHARD PACKING LISTS.pdf"
    Imagebase:0x7ff741c50000
    File size:5'641'176 bytes
    MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:14
    Start time:22:16:12
    Start date:23/04/2024
    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1744 --field-trial-handle=1592,i,13904569476606750348,1530364221901000283,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
    Imagebase:0x7ff679db0000
    File size:3'581'912 bytes
    MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:false

    No disassembly