Windows
Analysis Report
Request for Quotations and specifications.pdf.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Request for Quotations and specifications.pdf.exe (PID: 6764 cmdline:
"C:\Users\ user\Deskt op\Request for Quota tions and specificat ions.pdf.e xe" MD5: A27B87004E36C99C5AE138960F632287) - holy.exe (PID: 3032 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\RarSFX 0\holy.exe " MD5: F072A1E438C9D2453EE1B74027D07DD2) - RegAsm.exe (PID: 2156 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Reg Asm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13) - Acrobat.exe (PID: 4080 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\Acrobat .exe" "C:\ Users\user \AppData\L ocal\Temp\ RarSFX0\im g.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - AcroCEF.exe (PID: 6540 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ba ckgroundco lor=167772 15 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - AcroCEF.exe (PID: 4280 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --log-seve rity=disab le --user- agent-prod uct="Reade rServices/ 23.6.20320 Chrome/10 5.0.0.0" - -lang=en-U S --log-fi le="C:\Pro gram Files \Adobe\Acr obat DC\Ac robat\acro cef_1\debu g.log" --m ojo-platfo rm-channel -handle=20 56 --field -trial-han dle=1664,i ,100224185 5316498167 4,79231538 2548436847 9,131072 - -disable-f eatures=Ba ckForwardC ache,Calcu lateNative WinOcclusi on,WinUseB rowserSpel lChecker / prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
- cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "8030768790:AAFwJTXJb6rGHC9gtdsn8NQ4WDL395xAhlE", "Telegram Chatid": "698123469"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MassLogger | Yara detected MassLogger RAT | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
JoeSecurity_MassLogger | Yara detected MassLogger RAT | Joe Security | ||
Click to see the 17 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MassLogger | Yara detected MassLogger RAT | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth |
| |
Click to see the 20 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-12T09:02:13.293315+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.8 | 49704 | 193.122.6.168 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link |
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Location Tracking |
---|
Source: | DNS query: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00007FF663C6B190 | |
Source: | Code function: | 0_2_00007FF663C540BC | |
Source: | Code function: | 0_2_00007FF663C7FCA0 |
Source: | Code function: | 2_2_02B50B98 | |
Source: | Code function: | 3_2_01735358 | |
Source: | Code function: | 3_2_01734F08 | |
Source: | Code function: | 3_2_01735367 | |
Source: | Code function: | 3_2_017356AF |
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | .Net Code: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF663C4C2F0 |
Source: | Code function: | 0_2_00007FF663C63484 | |
Source: | Code function: | 0_2_00007FF663C5A4AC | |
Source: | Code function: | 0_2_00007FF663C6B190 | |
Source: | Code function: | 0_2_00007FF663C54928 | |
Source: | Code function: | 0_2_00007FF663C4F930 | |
Source: | Code function: | 0_2_00007FF663C70754 | |
Source: | Code function: | 0_2_00007FF663C61F20 | |
Source: | Code function: | 0_2_00007FF663C6CE88 | |
Source: | Code function: | 0_2_00007FF663C45E24 | |
Source: | Code function: | 0_2_00007FF663C5B534 | |
Source: | Code function: | 0_2_00007FF663C653F0 | |
Source: | Code function: | 0_2_00007FF663C4A310 | |
Source: | Code function: | 0_2_00007FF663C4C2F0 | |
Source: | Code function: | 0_2_00007FF663C47288 | |
Source: | Code function: | 0_2_00007FF663C5126C | |
Source: | Code function: | 0_2_00007FF663C621D0 | |
Source: | Code function: | 0_2_00007FF663C5F180 | |
Source: | Code function: | 0_2_00007FF663C7C838 | |
Source: | Code function: | 0_2_00007FF663C44840 | |
Source: | Code function: | 0_2_00007FF663C476C0 | |
Source: | Code function: | 0_2_00007FF663C82550 | |
Source: | Code function: | 0_2_00007FF663C78C1C | |
Source: | Code function: | 0_2_00007FF663C5BB90 | |
Source: | Code function: | 0_2_00007FF663C64B98 | |
Source: | Code function: | 0_2_00007FF663C55B60 | |
Source: | Code function: | 0_2_00007FF663C85AF8 | |
Source: | Code function: | 0_2_00007FF663C7FA94 | |
Source: | Code function: | 0_2_00007FF663C62AB0 | |
Source: | Code function: | 0_2_00007FF663C41AA4 | |
Source: | Code function: | 0_2_00007FF663C51A48 | |
Source: | Code function: | 0_2_00007FF663C789A0 | |
Source: | Code function: | 0_2_00007FF663C5C96C | |
Source: | Code function: | 0_2_00007FF663C63964 | |
Source: | Code function: | 0_2_00007FF663C82080 | |
Source: | Code function: | 0_2_00007FF663C5AF18 | |
Source: | Code function: | 0_2_00007FF663C68DF4 | |
Source: | Code function: | 0_2_00007FF663C70754 | |
Source: | Code function: | 0_2_00007FF663C62D58 | |
Source: | Code function: | 2_2_02B532DF | |
Source: | Code function: | 2_2_02B50B98 | |
Source: | Code function: | 2_2_02B50B80 | |
Source: | Code function: | 3_2_0173C168 | |
Source: | Code function: | 3_2_0173CA58 | |
Source: | Code function: | 3_2_01732DD1 | |
Source: | Code function: | 3_2_01734F08 | |
Source: | Code function: | 3_2_01737E68 | |
Source: | Code function: | 3_2_0173B9E0 | |
Source: | Code function: | 3_2_01737E63 | |
Source: | Code function: | 3_2_01734EF8 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | Code function: | 0_2_00007FF663C4B6D8 |
Source: | Code function: | 0_2_00007FF663C68624 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF663C85167 | |
Source: | Code function: | 0_2_00007FF663C85157 | |
Source: | Code function: | 3_2_0173F281 | |
Source: | Code function: | 3_2_017364FA |
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | Code function: | 0_2_00007FF663C6B190 | |
Source: | Code function: | 0_2_00007FF663C540BC | |
Source: | Code function: | 0_2_00007FF663C7FCA0 |
Source: | Code function: | 0_2_00007FF663C716A4 |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 3_2_0173C168 |
Source: | Code function: | 0_2_00007FF663C73170 |
Source: | Code function: | 0_2_00007FF663C80D20 |
Source: | Process token adjusted: | Jump to behavior |
Source: | Code function: | 0_2_00007FF663C72510 | |
Source: | Code function: | 0_2_00007FF663C73354 | |
Source: | Code function: | 0_2_00007FF663C73170 | |
Source: | Code function: | 0_2_00007FF663C776D8 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Code function: | 0_2_00007FF663C6B190 |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00007FF663C858E0 |
Source: | Code function: | 0_2_00007FF663C6A2CC |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00007FF663C70754 |
Source: | Code function: | 0_2_00007FF663C551A4 |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 Exploitation for Privilege Escalation | 1 Disable or Modify Tools | 1 OS Credential Dumping | 1 System Time Discovery | Remote Services | 11 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | 1 Input Capture | 2 File and Directory Discovery | Remote Desktop Protocol | 1 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 311 Process Injection | 13 Obfuscated Files or Information | Security Account Manager | 36 System Information Discovery | SMB/Windows Admin Shares | 1 Email Collection | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 12 Software Packing | NTDS | 121 Security Software Discovery | Distributed Component Object Model | 1 Input Capture | 13 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Timestomp | LSA Secrets | 1 Process Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 31 Virtualization/Sandbox Evasion | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 11 Masquerading | DCSync | 1 System Network Configuration Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 31 Virtualization/Sandbox Evasion | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 311 Process Injection | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
44% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1306767 | ||
100% | Joe Sandbox ML | |||
46% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.210.172 | true | false | high | |
reallyfreegeoip.org | 104.21.67.152 | true | false | high | |
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | 217.20.58.98 | true | false | high | |
checkip.dyndns.com | 193.122.6.168 | true | false | high | |
x1.i.lencr.org | unknown | unknown | false | high | |
checkip.dyndns.org | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.67.152 | reallyfreegeoip.org | United States | 13335 | CLOUDFLARENETUS | false | |
193.122.6.168 | checkip.dyndns.com | United States | 31898 | ORACLE-BMC-31898US | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1573553 |
Start date and time: | 2024-12-12 09:01:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Request for Quotations and specifications.pdf.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@20/52@3/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 88.221.168.141, 50.16.47.176, 34.237.241.83, 54.224.241.105, 18.213.11.84, 172.64.41.3, 162.159.61.3, 23.195.61.56, 217.20.58.98, 2.19.126.143, 2.19.126.149, 88.221.168.226, 3.233.129.217, 23.47.168.24, 20.109.210.53, 13.107.246.63
- Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, fs.microsoft.com, e8652.dscx.akamaiedge.net, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com, p13n.adobe.io, acroipm2.adobe.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, armmf.adobe.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, geo2.adobe.com, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
Time | Type | Description |
---|---|---|
03:02:22 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.67.152 | Get hash | malicious | Snake Keylogger | Browse | ||
Get hash | malicious | Snake Keylogger | Browse | |||
Get hash | malicious | MassLogger RAT | Browse | |||
Get hash | malicious | MassLogger RAT | Browse | |||
Get hash | malicious | MassLogger RAT | Browse | |||
Get hash | malicious | GuLoader, MassLogger RAT | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | GuLoader, MassLogger RAT | Browse | |||
Get hash | malicious | GuLoader, MassLogger RAT | Browse | |||
Get hash | malicious | MassLogger RAT | Browse | |||
193.122.6.168 | Get hash | malicious | MassLogger RAT | Browse |
| |
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
bg.microsoft.map.fastly.net | Get hash | malicious | RedLine | Browse |
| |
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | DanaBot | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | Captcha Phish, HTMLPhisher | Browse |
| ||
Get hash | malicious | PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | ScreenConnect Tool, Phisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
reallyfreegeoip.org | Get hash | malicious | Snake Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Captcha Phish | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT, VenomRAT | Browse |
| ||
Get hash | malicious | Credential Flusher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ORACLE-BMC-31898US | Get hash | malicious | Snake Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | RedLine | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Cobalt Strike, HTMLPhisher, LummaC Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
54328bd36c14bd82ddaa0c04b25ed9ad | Get hash | malicious | Snake Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
|
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 291 |
Entropy (8bit): | 5.181304424598763 |
Encrypted: | false |
SSDEEP: | 6:77dA34q2PCHhJ2nKuAl9OmbnIFUt8O7cXZmw+O7cFkwOCHhJ2nKuAl9OmbjLJ:7RxvBHAahFUt8Oc/+Oc56HAaSJ |
MD5: | D85ED64B07983BE8688C4DEAD280E745 |
SHA1: | 04EC8570EFA6A4103C1C0EE8E3BA7C9623C1BAC9 |
SHA-256: | EEC529551EBF964FCA857C91E11EF0DD6EBD5831DA62027C61C88DFE86826E4E |
SHA-512: | 0D2367B1FC68F8E96572A48273B6E09037EF0EA969AA55A8079D66058BC6346A9B47371DC189117D0BCDB204349918B7EC1F54C71BDD8011B0CA89708023040E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 291 |
Entropy (8bit): | 5.181304424598763 |
Encrypted: | false |
SSDEEP: | 6:77dA34q2PCHhJ2nKuAl9OmbnIFUt8O7cXZmw+O7cFkwOCHhJ2nKuAl9OmbjLJ:7RxvBHAahFUt8Oc/+Oc56HAaSJ |
MD5: | D85ED64B07983BE8688C4DEAD280E745 |
SHA1: | 04EC8570EFA6A4103C1C0EE8E3BA7C9623C1BAC9 |
SHA-256: | EEC529551EBF964FCA857C91E11EF0DD6EBD5831DA62027C61C88DFE86826E4E |
SHA-512: | 0D2367B1FC68F8E96572A48273B6E09037EF0EA969AA55A8079D66058BC6346A9B47371DC189117D0BCDB204349918B7EC1F54C71BDD8011B0CA89708023040E |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 335 |
Entropy (8bit): | 5.146259478446161 |
Encrypted: | false |
SSDEEP: | 6:771UGFwDM+q2PCHhJ2nKuAl9Ombzo2jMGIFUt8O7PGtgZmw+O7BtDMVkwOCHhJ2g:7OGFwDM+vBHAa8uFUt8OzGtg/+OrDMVH |
MD5: | 26F7F7B9A588C37097A22BC77E6B58B8 |
SHA1: | 76E6EC967A4C8052CFD3F2E5E98B1291A1686C53 |
SHA-256: | 788FE710E565314F78A32393231B124CCD6ADC37FFCCEE7CF430486C2E0CF633 |
SHA-512: | 839DB3057DE91FB53C417766ACB4195B9D2E221D251D39DAA045C2E2F3E8E42AAD0295D5870294AF599272E2AD4D27ABAB76A87A035FCA57D113DE38B9375114 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 335 |
Entropy (8bit): | 5.146259478446161 |
Encrypted: | false |
SSDEEP: | 6:771UGFwDM+q2PCHhJ2nKuAl9Ombzo2jMGIFUt8O7PGtgZmw+O7BtDMVkwOCHhJ2g:7OGFwDM+vBHAa8uFUt8OzGtg/+OrDMVH |
MD5: | 26F7F7B9A588C37097A22BC77E6B58B8 |
SHA1: | 76E6EC967A4C8052CFD3F2E5E98B1291A1686C53 |
SHA-256: | 788FE710E565314F78A32393231B124CCD6ADC37FFCCEE7CF430486C2E0CF633 |
SHA-512: | 839DB3057DE91FB53C417766ACB4195B9D2E221D251D39DAA045C2E2F3E8E42AAD0295D5870294AF599272E2AD4D27ABAB76A87A035FCA57D113DE38B9375114 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\6f92ea5c-18dd-4cc0-ab65-a44ed8a54101.tmp
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | modified |
Size (bytes): | 475 |
Entropy (8bit): | 4.967105522201735 |
Encrypted: | false |
SSDEEP: | 12:YH/um3RA8sqy6hsBdOg2HZcaq3QYiub6P7E4TX:Y2sRds5dMHg3QYhbS7n7 |
MD5: | ECBE2AC4933ED1F5867218A82FB523C1 |
SHA1: | D5D63D4F6903DD3AE723B206B4DC52E300B56C72 |
SHA-256: | 7EB8D75B8351EF4EE2727AEE50EFB01C57596DB69648DF387530D03E3AA2979F |
SHA-512: | B7219139A73F4DCA98A61522A814B6FBB085337F76118B93A9BFE93653C7FC88467035385A04AA0BBB0839DF8DD01738EFFA1BB283D48BA30F40F92E2ED901CA |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 475 |
Entropy (8bit): | 4.963247713778661 |
Encrypted: | false |
SSDEEP: | 12:YH/um3RA8sqRYSsBdOg2HEcaq3QYiub6P7E4TX:Y2sRds9dMHX3QYhbS7n7 |
MD5: | D46529E824E6E834D0D750C5560C136C |
SHA1: | E6597929E439E6AF24CE7249F0D303987F0760BF |
SHA-256: | 818753A5C6D3C843FBA032CCB1B1681F6226C17B388A1E3052774B1DD8809C72 |
SHA-512: | CE939B02393B7F46CE528527A40DCB56023CF6682B664D5685354CDA51388EE603FCAF018A428EFB08AD5800B68847F6F512B05F6D772E435507EE32BCEA0963 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State~RF51281f.TMP (copy)
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 475 |
Entropy (8bit): | 4.963247713778661 |
Encrypted: | false |
SSDEEP: | 12:YH/um3RA8sqRYSsBdOg2HEcaq3QYiub6P7E4TX:Y2sRds9dMHX3QYhbS7n7 |
MD5: | D46529E824E6E834D0D750C5560C136C |
SHA1: | E6597929E439E6AF24CE7249F0D303987F0760BF |
SHA-256: | 818753A5C6D3C843FBA032CCB1B1681F6226C17B388A1E3052774B1DD8809C72 |
SHA-512: | CE939B02393B7F46CE528527A40DCB56023CF6682B664D5685354CDA51388EE603FCAF018A428EFB08AD5800B68847F6F512B05F6D772E435507EE32BCEA0963 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\d20d1d51-da8e-4dd3-9417-ec0e167c0487.tmp
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 475 |
Entropy (8bit): | 4.963247713778661 |
Encrypted: | false |
SSDEEP: | 12:YH/um3RA8sqRYSsBdOg2HEcaq3QYiub6P7E4TX:Y2sRds9dMHX3QYhbS7n7 |
MD5: | D46529E824E6E834D0D750C5560C136C |
SHA1: | E6597929E439E6AF24CE7249F0D303987F0760BF |
SHA-256: | 818753A5C6D3C843FBA032CCB1B1681F6226C17B388A1E3052774B1DD8809C72 |
SHA-512: | CE939B02393B7F46CE528527A40DCB56023CF6682B664D5685354CDA51388EE603FCAF018A428EFB08AD5800B68847F6F512B05F6D772E435507EE32BCEA0963 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3878 |
Entropy (8bit): | 5.2387156039527305 |
Encrypted: | false |
SSDEEP: | 96:S4bz5vsZ4CzSAsfTxiVud4TxY0CIOr3MCWO3VxBaw+bptkOgT:S43C4mS7fFi0KFYDjr3LWO3V3aw+bpta |
MD5: | 04BF9E82C0A7DF6718B01EF6505EE965 |
SHA1: | 115234CB65260D95678BD3E312B0B11F10F918C4 |
SHA-256: | F5A0881AAF95AF89D21946CBECEBBF56D8D30573AAE6FFD5000C4C8416017F2B |
SHA-512: | C03ED1D0B68C8CBD7A58B6FC4095F86FE6C3B3DDD64BAC3B53418B22CFAC3BA93C8F0FD3ACD3756F8149B8925AF39A0DC295A7FCC6EDD55102066524EF141942 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 323 |
Entropy (8bit): | 5.114710806812602 |
Encrypted: | false |
SSDEEP: | 6:77wjDOwDM+q2PCHhJ2nKuAl9OmbzNMxIFUt8O7wj4DpgZmw+O7wjvDMVkwOCHhJS:7sjKwDM+vBHAa8jFUt8Osj4Dpg/+Osjn |
MD5: | 47C171FF4D37B1C3BE9BBAD5922681F6 |
SHA1: | C7379CF576B05130D7A3BF1CEA13093A03A06B3E |
SHA-256: | F046F8D359C3A912E740DF720F47A2BB5A5E172D6A6D1DC1CF07E230EDC1ABC9 |
SHA-512: | 69BB255C17EA9B54A4ACB60DF904B14D76E6E86A31D0FA746FA66E4044904CE6B4D93629BD9C4FB6C8A3388F70B80C9CAB7F75333FB9BABB4703905DC4B0E272 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 323 |
Entropy (8bit): | 5.114710806812602 |
Encrypted: | false |
SSDEEP: | 6:77wjDOwDM+q2PCHhJ2nKuAl9OmbzNMxIFUt8O7wj4DpgZmw+O7wjvDMVkwOCHhJS:7sjKwDM+vBHAa8jFUt8Osj4Dpg/+Osjn |
MD5: | 47C171FF4D37B1C3BE9BBAD5922681F6 |
SHA1: | C7379CF576B05130D7A3BF1CEA13093A03A06B3E |
SHA-256: | F046F8D359C3A912E740DF720F47A2BB5A5E172D6A6D1DC1CF07E230EDC1ABC9 |
SHA-512: | 69BB255C17EA9B54A4ACB60DF904B14D76E6E86A31D0FA746FA66E4044904CE6B4D93629BD9C4FB6C8A3388F70B80C9CAB7F75333FB9BABB4703905DC4B0E272 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1391 |
Entropy (8bit): | 7.705940075877404 |
Encrypted: | false |
SSDEEP: | 24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1 |
MD5: | 0CD2F9E0DA1773E9ED864DA5E370E74E |
SHA1: | CABD2A79A1076A31F21D253635CB039D4329A5E8 |
SHA-256: | 96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6 |
SHA-512: | 3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71954 |
Entropy (8bit): | 7.996617769952133 |
Encrypted: | true |
SSDEEP: | 1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ |
MD5: | 49AEBF8CBD62D92AC215B2923FB1B9F5 |
SHA1: | 1723BE06719828DDA65AD804298D0431F6AFF976 |
SHA-256: | B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F |
SHA-512: | BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 192 |
Entropy (8bit): | 2.732136534099205 |
Encrypted: | false |
SSDEEP: | 3:kkFklPpKRVltfllXlE/HT8km/tNNX8RolJuRdxLlGB9lQRYwpDdt:kKFRVleT8hNMa8RdWBwRd |
MD5: | 6DB939E24BB1CBAB2C78D621FBA09596 |
SHA1: | 4804F5302FF84040B84C00611F3640DFF92930F7 |
SHA-256: | F86BAC126CB3E5657165B2AA7D60769705F0F26507582C54429F15F368140FDF |
SHA-512: | 8C4815926F56B72CC270DF071DDB0F8EECF5A75ABAC2FDE1C1EEDB955C7E8AFEBDC183A9675D184591ACA51A65E2ADDC1D8FB09F506D0B877FF5AF14D60BE353 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | modified |
Size (bytes): | 328 |
Entropy (8bit): | 3.1391791584200512 |
Encrypted: | false |
SSDEEP: | 6:kKlLllL9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:NLaDnLNkPlE99SNxAhUe/3 |
MD5: | C46B6544AB7C6A3DC9E0A041462CE824 |
SHA1: | 1184C969510A1AF0C6E825054F4EB28E91D150ED |
SHA-256: | FB6FD304651EC464334E7CAE320195AD74EB873A8BBB3AF4C02EF6BC72DCABBE |
SHA-512: | 72C06E25BE903545B804868377F2CECCD95E4C7E53E2F73318F2C9D730FE07888DB0E15B90F56CF54715434E2395ED6DF452766E64EB976B4D70A3ED5B835CBB |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1233 |
Entropy (8bit): | 5.233980037532449 |
Encrypted: | false |
SSDEEP: | 24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap |
MD5: | 8BA9D8BEBA42C23A5DB405994B54903F |
SHA1: | FC1B1646EC8A7015F492AA17ADF9712B54858361 |
SHA-256: | 862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C |
SHA-512: | 26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1233 |
Entropy (8bit): | 5.233980037532449 |
Encrypted: | false |
SSDEEP: | 24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap |
MD5: | 8BA9D8BEBA42C23A5DB405994B54903F |
SHA1: | FC1B1646EC8A7015F492AA17ADF9712B54858361 |
SHA-256: | 862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C |
SHA-512: | 26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1233 |
Entropy (8bit): | 5.233980037532449 |
Encrypted: | false |
SSDEEP: | 24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap |
MD5: | 8BA9D8BEBA42C23A5DB405994B54903F |
SHA1: | FC1B1646EC8A7015F492AA17ADF9712B54858361 |
SHA-256: | 862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C |
SHA-512: | 26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 10880 |
Entropy (8bit): | 5.214360287289079 |
Encrypted: | false |
SSDEEP: | 192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp |
MD5: | B60EE534029885BD6DECA42D1263BDC0 |
SHA1: | 4E801BA6CA503BDAE7E54B7DB65BE641F7C23375 |
SHA-256: | B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856 |
SHA-512: | 52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 10880 |
Entropy (8bit): | 5.214360287289079 |
Encrypted: | false |
SSDEEP: | 192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp |
MD5: | B60EE534029885BD6DECA42D1263BDC0 |
SHA1: | 4E801BA6CA503BDAE7E54B7DB65BE641F7C23375 |
SHA-256: | B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856 |
SHA-512: | 52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 295 |
Entropy (8bit): | 5.348547761738924 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJM3g98kUwPeUkwRe9:YvXKXB6NtrvR/ZwHA9GMbLUkee9 |
MD5: | C4FBC91E02D378DD0779D4CAEA8B8428 |
SHA1: | E2358871D71054AEE8118E35E638DD5AEAFC59F8 |
SHA-256: | A0FB4BD68503EB1B8E8F0599781703BEE7653D57B46FA0D90C360537300B149C |
SHA-512: | B54B41D0BCA5AD2FDE5E48E35C1807B3A72B89EC2160D9D0EA8A7D516B4C99F3482AD74C9BFD5A996A9D698BFBAC6B27C5012A8AE58C050BE5D12C9233C40C1C |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 294 |
Entropy (8bit): | 5.2829858545003265 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfBoTfXpnrPeUkwRe9:YvXKXB6NtrvR/ZwHA9GWTfXcUkee9 |
MD5: | 291EFFE75A3EB17F1A007E0F81F1A386 |
SHA1: | BEC135FCF4067891E248F2B72D687758F6F84756 |
SHA-256: | 139AD204B7413A9C97F0E73521E73A5C1D15C007FAE8A2AB021B7445F7623D63 |
SHA-512: | 82C14C1D1B76B5DF9F5155C1838475D8B74F5D625BA537029D2F4F0137AF80BB6541B54070D610F75AA7B7179408F2DABFC81DA7C53F2323CFFFB0684B60A6D4 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 294 |
Entropy (8bit): | 5.261980889895403 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfBD2G6UpnrPeUkwRe9:YvXKXB6NtrvR/ZwHA9GR22cUkee9 |
MD5: | CBDC4D5C5E2B5D99CE02086DE4633B8B |
SHA1: | B4750B0FD6875A16EB7C863746193C064AC1E1C7 |
SHA-256: | C24D801AEED112D8E8C511C81F323CFF018604BBCBC296257528063CE698AE83 |
SHA-512: | D865E7D5678C51646A4C58956AA2591CA2101DFA5FEC6FDC1B0C3178D7CE903F5A073164417BD69BC70929A22687CB487639BF8EFAB0A863A2B6BFE2D59A22D0 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 285 |
Entropy (8bit): | 5.32497646180779 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfPmwrPeUkwRe9:YvXKXB6NtrvR/ZwHA9GH56Ukee9 |
MD5: | DF8645BF7705EB54C016D2AE409EA1C6 |
SHA1: | ABF6A2CDCC21BDD48D7075C392243B26F0317057 |
SHA-256: | A0D43E4DE3580B31DCA1099FA4C1FD7EA6ED53468181CC7093CA3F50EC7AE5FA |
SHA-512: | E4A0108AFC15D10221DA4C27FB5ECEBD40BF2E25D1330DC7B601F7BB8D4A9CACE795D1C637F49248B1FA3D8E60E7FCFFE9102FE4B11EB10CBF81F3F99C7D3E1E |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1123 |
Entropy (8bit): | 5.687973456763737 |
Encrypted: | false |
SSDEEP: | 24:Yv6XBcrJhWpLgE9cQx8LennAvzBvkn0RCmK8czOCCSIEWBY:YvE4JhWhgy6SAFv5Ah8cv/P |
MD5: | C92F759C6A38E4462A58BA98AD59EE7E |
SHA1: | 57671DC78E19DF1ACD96258F0BD0D407284E3AE5 |
SHA-256: | 1CF080EB56BA291F19CA24BB2594BBBE2DDA48ED3DEFFFE5D5E16695C80FC149 |
SHA-512: | 706E8CFCE7545404CE5346D9AD3CBB98E60E52E70C4B6155B323278AD0222C0FC8CAEBD57DAEF03A4CAD24B2756EC1900A49328A472F44CA0BC88E65EA93A618 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 289 |
Entropy (8bit): | 5.2742875246627 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJf8dPeUkwRe9:YvXKXB6NtrvR/ZwHA9GU8Ukee9 |
MD5: | 623426352B66E68B3116F3954933EF89 |
SHA1: | 8E73651C26F3F00E67F766667B0A655A4DB3DB95 |
SHA-256: | 7786976FEE17312F18A902482029CF4B9BB1DB2C0634A361AA0D224E43EDCB95 |
SHA-512: | 587317FC17D8BB0AD360FFE0ABC2540DEF8A78A370493EEC872CDE2D5AFAB0776508A760E12AA8876031AA61EFA64F230D194403F57533C57FB7C15A1AA0F1FE |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 292 |
Entropy (8bit): | 5.272939862175992 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfQ1rPeUkwRe9:YvXKXB6NtrvR/ZwHA9GY16Ukee9 |
MD5: | EB671D13F0E73730AAE3F8278E6ACEAE |
SHA1: | 81D2D60684C5D0D53BDB706E2404DF2E1FA962AC |
SHA-256: | 48AE363F6168ADB2DBD95DEAC79E0F46476D6FB4DC1A38E169DE2719394EBF02 |
SHA-512: | 21B52C4A6C221BF22B2A6518676997701FB3E5FC94EBE8AC9AF7997CDA85B4D5B260843906424011EE484D36A26339BD446587A4C331EAB791B3855789D4311F |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 289 |
Entropy (8bit): | 5.289260233007157 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfFldPeUkwRe9:YvXKXB6NtrvR/ZwHA9Gz8Ukee9 |
MD5: | C792D4B7EB58A8BEB548260E401FC645 |
SHA1: | 06B3066B81474135A9E0522634E0B54C3D663852 |
SHA-256: | 120C6D34EF466BAA914FF8753E753DE3C4E66599E57A580CD5DE7BA1488C3EA9 |
SHA-512: | C3FF9DB3F9164CA884856D3F9FA0C2CD01245E7906C25976E7815017B42C246CB65B7DBFC4D69D35C607DD689F967C5DF87998FB49AFE9112CA99BB87E2C6719 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 295 |
Entropy (8bit): | 5.302340275679065 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfzdPeUkwRe9:YvXKXB6NtrvR/ZwHA9Gb8Ukee9 |
MD5: | 775EACD1A9BF92ABD17504BB3D585A17 |
SHA1: | 05BDBB59DA4ED4DE80E70A9A84A8BB214E7F3F7F |
SHA-256: | 4FFE0058D0EA33493853468F6DB29520795DBB408FEDA9253A9308652787808F |
SHA-512: | A73EEBB606479562B6A6D44FC88B5759AA0582CAB0253DB8A0F1B80B5713F13080DFB39F3EB10D6239964AD3B75440AC064F63440EF23AA5040532A679D10DDF |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 289 |
Entropy (8bit): | 5.282630592600029 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfYdPeUkwRe9:YvXKXB6NtrvR/ZwHA9Gg8Ukee9 |
MD5: | 1311BC1B2F855897BB4CCBEB0895635F |
SHA1: | 9FE8B1758A451F1DA0963D768E0F2E407642EB4B |
SHA-256: | 0508BFC61A233DBC9EBA3A50F315D4314E748BE2E541A56116BEF08238A33FEF |
SHA-512: | 622C29729D422732B61E0753E76AE1E6C2DEF11015298F79EAE88AB2446DDEAB504CA6101A044864C40B81CA12EC537F3BC9B9460C20847E01FE68E6418C9652 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 284 |
Entropy (8bit): | 5.268674156924488 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJf+dPeUkwRe9:YvXKXB6NtrvR/ZwHA9G28Ukee9 |
MD5: | 0643FE178031959A78AEF12EA607DCAB |
SHA1: | 6C2AF77B276E27BAC2D08027B3E1787AD1F0DA63 |
SHA-256: | DF5638D897D31A2A43C9F8E23CEFB522D2D7D48D8CA08DA3152336203EE8AACE |
SHA-512: | 5432FDDF93444D3CA8147D31C020519A4FD6B72C096F1D3232D3D1E0D4EDFA9E06CA91F7EB1707BC5CC2077CCCD439192572E002399D855785EBCD43692738EE |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 291 |
Entropy (8bit): | 5.26629706764434 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfbPtdPeUkwRe9:YvXKXB6NtrvR/ZwHA9GDV8Ukee9 |
MD5: | BE1622DCEBC68EF1A11A3851168A6EE1 |
SHA1: | 75C4B0063EFE368FABE6A1F7B9F4CF0FEC19BE03 |
SHA-256: | 8026B87E84F9E94C421B51DE90F6FA4DB4C7269625F93D845ED5E3E52A3B06AB |
SHA-512: | AFE87E2034FCD51E79696EC7EAFD7D0856F39481B278652DC5F038EC88ACBFF5C5C9A3534064A530BBC1ACF7EE7448195C8177A13E47AFCCD62A5902B2F7BD85 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 287 |
Entropy (8bit): | 5.265099598348317 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJf21rPeUkwRe9:YvXKXB6NtrvR/ZwHA9G+16Ukee9 |
MD5: | D524845EF8BD02C6F2E341B88DB45A9C |
SHA1: | C4E19865A918F1F13DA050E1CC962E97DC1FAB54 |
SHA-256: | 49A6555CBA895EF1EBCFF16BD9BF91098B8172665BD7AF53475591AF89EB1FC0 |
SHA-512: | 0CDB623002F16DA4DCC38AE5805F727E897A19FA2D571283DF5DCAE860383F3583A329CDAA390B657A50D4E8DE200C218085873A0179E5FEC959B0846960C845 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1090 |
Entropy (8bit): | 5.6655891293675085 |
Encrypted: | false |
SSDEEP: | 24:Yv6XBcrJhKamXayLgE+cNDxeNaqnAvz7xHn0RCmK8czOC/BSIEWBY:YvE4JhEBgkDMUJUAh8cvMP |
MD5: | 251E1C3A028D62BFC2DE5F10588BBA39 |
SHA1: | D8E158528470F5C1434B048B56DD37B0B402BC3E |
SHA-256: | 8EE722174945EDBA4047D8089458191D4E181AB0805E3D2D31F10A69DCAFC147 |
SHA-512: | AA2D5D861610D3253A435799B6CC78FD8E9B582A4BE37227C81733D136BA683325967556897AA20F7EE416D573006E6CC5B84118D2A5A682D59A962DBA23C258 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 286 |
Entropy (8bit): | 5.240660178762542 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJfshHHrPeUkwRe9:YvXKXB6NtrvR/ZwHA9GUUUkee9 |
MD5: | 180DA0D97ACE13070A4FE115244F3773 |
SHA1: | F0A2C5A030571E0B47EF9CCDE8243E1DDD56B0BE |
SHA-256: | 3DFB39B14A0129BA243E76EF170225F8850BAF014E85BBBA861CDF22246B8FB7 |
SHA-512: | C008BB761C182A55091CBA7ED45086E4DFB2F4ABDCFC3BDA08E820502B76598C76182D6641F93CC5F77818CED4F392C5D2F5BB0FECAA64EFF6553A0BE9F76FEF |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 282 |
Entropy (8bit): | 5.264768921613848 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HXBqtNdrrvB3/dVlPIHAR0YioAvJTqgFCrPeUkwRe9:YvXKXB6NtrvR/ZwHA9GTq16Ukee9 |
MD5: | C5615BBC5A71C44D85153AA414E52C5B |
SHA1: | DD6DCCF69DE8B80342787DAD7900F43C1DE3999B |
SHA-256: | 036DEB2BD9043CF457E11903DB90B90F7B092B8676743F2240B0F2B8F52BCED3 |
SHA-512: | 7D72346A60A050A35DCAEF6462BE97B31AEF6256F925105BAF2B02494CB4B3B275305D489F39695F11A0B803B358232E4660F2A51791A8CA4210471CC02A29CD |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4 |
Entropy (8bit): | 0.8112781244591328 |
Encrypted: | false |
SSDEEP: | 3:e:e |
MD5: | DC84B0D741E5BEAE8070013ADDCC8C28 |
SHA1: | 802F4A6A20CBF157AAF6C4E07E4301578D5936A2 |
SHA-256: | 81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06 |
SHA-512: | 65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2814 |
Entropy (8bit): | 5.135659202090742 |
Encrypted: | false |
SSDEEP: | 24:YPWE4aaayTEt45ZSEZTwrEzdSWnEJgBWEgWE0DHPfEVj4Fj0S5ENbOxaEY2Z2LSj:YUF8W59ce2Fc23l16PvTodng9Lt |
MD5: | BC8CD05D25350DD41C392AED011364E8 |
SHA1: | ED8D0B4B2B12DFDFD2358B0409657F91761CE1EA |
SHA-256: | 5D259153634470CC34EF200C88802D4581FFEAB08478757B5B3F240878BE17A1 |
SHA-512: | AD0A35AA90E8E10A62528F521FA18AEFF90A2C073D53BE29956A85CC6DCE00F6D671D256485C1B7231D9774AB638371D014F77755D71DEA66570ED76725E8AE4 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12288 |
Entropy (8bit): | 1.318804102521374 |
Encrypted: | false |
SSDEEP: | 48:TGufl2GL7ms9WR1CPmPbPahkPQypilIuP2:lNVms9WfMwbPahkoFu |
MD5: | 9EC83D4183770AC74ED8D467C1740BA0 |
SHA1: | BD9330E2AB7A0FF34B12D61DAABA7D21F70338F0 |
SHA-256: | 4786909CE8C255848832352DB21BBF6E8BB72D3AC86644A87D28645F8A7EB57C |
SHA-512: | C971027958E0A27FF372BE8F6CF094CF55F7AAC180E1675C3A51B69883B7337D46D3C1ADAC6512274783FCD2C93290DBFA6CD70FD05D74D068641376392CF010 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8720 |
Entropy (8bit): | 1.7811406316776563 |
Encrypted: | false |
SSDEEP: | 48:7M7WR1CPmPbPahkPVypilItqFl2GL7msg:7KWfMwbPahkd4KVmsg |
MD5: | 55908BEACC59A0FDAF6F6CABF83B5A89 |
SHA1: | A7DF929871E32262F414FAE6818EF9BBC293AED5 |
SHA-256: | D6A468528CB4550612CECE921F3D75B7A01CCDC7EFC06D0C3D6B1690112EA145 |
SHA-512: | C1CB5D70BCD4ADA269E25AC10B456EAC421FAA1714DA3B0DEC4D7A8A264584C50E14F8309A1E4A3B81C2F1F73C3888FFA62BC359F7BB11C2885B7233D26AD86B |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 66726 |
Entropy (8bit): | 5.392739213842091 |
Encrypted: | false |
SSDEEP: | 768:RNOpblrU6TBH44ADKZEggwuA3VB65WcR9QwvEy7wr2jpzZiYyu:6a6TZ44ADERuA3Vo9Tnwr2jpzgK |
MD5: | 0664CDE7FF7B0BE15CE2028C8DCE5BD3 |
SHA1: | 62256E0EC89B6D0CCEFA34B0EF1E0A0B9401D164 |
SHA-256: | C5B5DA5CF010597513C40DAD021845C4164D1A445E7FC9E63FA8BB1DDB133147 |
SHA-512: | A0F1FF0C073A493B7F4124AA076599F64A0127D1FA1CE54A5F5BFBF3C2973C15D9B5EE7EFD4A7D8273BD8D6550D6870B088FBC263CC476C87D2B8555C208E2FD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 617 |
Entropy (8bit): | 5.3554278163807965 |
Encrypted: | false |
SSDEEP: | 12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKharkvoDLI4MWuCt92n4M6:ML9E4KlKDE4KhKiKhIE4Ko84j |
MD5: | A47392ECAB97B1AD6350E5445F07F3FD |
SHA1: | C9AE28B3118306868E7AE54B212C853C7ED9705E |
SHA-256: | 925EBF33DCB86A12A8CA3195D01B72FAC0840B408C07D079A612E40646BF03F2 |
SHA-512: | 681B8D60FCFDAB4067DC6EEC62D9841B33F8EA6319C38CBAC1544BBEF5B9F14AB37129DBEFB1F1FF6F119B33792A37C415B1D88E292B3D9907F0AFBDD07E721D |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 246 |
Entropy (8bit): | 3.486646639490294 |
Encrypted: | false |
SSDEEP: | 6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8qKDgalYH:Qw946cPbiOxDlbYnuRKtKEuYH |
MD5: | 4BAD71A236E70F7F2B628423969F8352 |
SHA1: | 211E950ACF2C3DC5971C86F26DF147BC279A3802 |
SHA-256: | 91E3D7CEA29B1B8255424E779ECF087D57FA5E675667F51640A91090D02D49D5 |
SHA-512: | EEE9FF8F28B2F2FFDAA0389882963CE188D7AB5DA9B101D3F2F8057C720B046AD19F88FB6607D8564869538B1EDFB5734622FBB97B3B5B50702F5AEB6043B663 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 477184 |
Entropy (8bit): | 7.049584533826611 |
Encrypted: | false |
SSDEEP: | 6144:BDD86eavzyToezlwxtESyz0nixBOaKAZToI+XFAXJP7nVEPUefKbd+hQ+W3F5gy:FDXeavzyToea5yzOq+XOXJP7nes2UL |
MD5: | F072A1E438C9D2453EE1B74027D07DD2 |
SHA1: | 32EB35774177A028851E314C333E51355674DA37 |
SHA-256: | 54ADF0A0FF5F28C4284F20DADF8B5EE4D5D43D93296690DF95951F202467A423 |
SHA-512: | E64176BA5894056BA9BCA488C32E7218DB9C4F14DF7DA97BD65EF1BC0C563C690D549643B12FC6862F9634B70E7FE9EACFB37F0CCC16855C6F36C5B73094B661 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 41950 |
Entropy (8bit): | 7.990999767126439 |
Encrypted: | true |
SSDEEP: | 768:/Iv9D+uwNaqaOD5SeA6DZDL4gZsSzygZ/D5sqJo3IBWrquzSfeXxLEYF:/IYaqacL4Wy4/1y3X4OpF |
MD5: | E6BDF42550DA919F083B74F06E629703 |
SHA1: | 6278393C436E4C40E625EC9BF812E1685391D09F |
SHA-256: | 82FA4F3CE03D99D100B1D55E731A44A1EF34CEFC6363095F086439F100FBBCA8 |
SHA-512: | 70F530AC6F2DAB07ABCD6D4D1F92717D6161524CAB670A29EA2A39357543E1564F25F3C9B5F34CD09DAB21E27AA2D9723A178EED7E7FC8BECC8AD9F4CA6B3B65 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-12-12 03-02-14-204.log
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16525 |
Entropy (8bit): | 5.33860678500249 |
Encrypted: | false |
SSDEEP: | 384:IC2heaVGJMUPhP80d0Wc+9eG/CCihFomva7RVRkfKhZmWWyC7rjgNgXo6ge5iaW0:X8B |
MD5: | C3FEDB046D1699616E22C50131AAF109 |
SHA1: | C9EEA5A1A16BD2CD8154E8C308C8A336E990CA8D |
SHA-256: | EA948BAC75D609B74084113392C9F0615D447B7F4AACA78D818205503EACC3FD |
SHA-512: | 845CDB5166B35B39215A051144452BEF9161FFD735B3F8BD232FB9A7588BA016F7939D91B62E27D6728686DFA181EFC3F3CC9954B2EDAB7FC73FCCE850915185 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15114 |
Entropy (8bit): | 5.346332701893433 |
Encrypted: | false |
SSDEEP: | 384:lzRSFSKSdSx9O9Oq9q9D9T9I9i9x/Q/S/Q/6uUPuUuBuJupugudumYAtAlAXhxh5:llKfiIwUqcRh6czYKoSPPnsKebYKCSgP |
MD5: | B190B6EC9926B731241EB278BAED07F5 |
SHA1: | A1AFB2BFAA0863789DA10931A2B486CA0D874392 |
SHA-256: | 9AAE0180D23B544B460D118885E20C79F392437777C582DFBEDF63E7A931CE83 |
SHA-512: | 24D4E3680C6B90DCE2B0101C3FD53BE5144CB1070B84D01659A7019D55C297EB30CC77A14D72B6A21AB7694AAA49106C7347F1420841DBCDF154FB405FD85B01 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 29752 |
Entropy (8bit): | 5.404805252988832 |
Encrypted: | false |
SSDEEP: | 192:TcbeIewcbVcbqI4ucbrcbQIrJcb6cbCIC4cb3cbuIVNcbx:ceo4+rsC2Vq |
MD5: | 9A90DEBB385BFDB86E895588DD40B43C |
SHA1: | 3FE87F43262FC739B09CBBE552B76AEFA795E355 |
SHA-256: | B14E14A0CF78643423C5ADDAA367D04D0B721C3CB7B6D02D9DE01756F62F7FBA |
SHA-512: | 99794656CCC1A23BECCF2278CCE368C43441DBB472E534969174B6E8C8830DF2B4C15E017FBB223F9BB035FDEB308656E60094A89418A2B40B2DF9E8E428A489 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 386528 |
Entropy (8bit): | 7.9736851559892425 |
Encrypted: | false |
SSDEEP: | 6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m |
MD5: | 5C48B0AD2FEF800949466AE872E1F1E2 |
SHA1: | 337D617AE142815EDDACB48484628C1F16692A2F |
SHA-256: | F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE |
SHA-512: | 44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1407294 |
Entropy (8bit): | 7.97605879016224 |
Encrypted: | false |
SSDEEP: | 24576:/xA7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07/WLaGZDwYIGNPJe:JVB3mlind9i4ufFXpAXkrfUs0jWLaGZo |
MD5: | A0CFC77914D9BFBDD8BC1B1154A7B364 |
SHA1: | 54962BFDF3797C95DC2A4C8B29E873743811AD30 |
SHA-256: | 81E45F94FE27B1D7D61DBC0DAFC005A1816D238D594B443BF4F0EE3241FB9685 |
SHA-512: | 74A8F6D96E004B8AFB4B635C0150355CEF5D7127972EA90683900B60560AA9C7F8DE780D1D5A4A944AF92B63C69F80DCDE09249AB99696932F1955F9EED443BE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 758601 |
Entropy (8bit): | 7.98639316555857 |
Encrypted: | false |
SSDEEP: | 12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg |
MD5: | 3A49135134665364308390AC398006F1 |
SHA1: | 28EF4CE5690BF8A9E048AF7D30688120DAC6F126 |
SHA-256: | D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B |
SHA-512: | BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1419751 |
Entropy (8bit): | 7.976496077007677 |
Encrypted: | false |
SSDEEP: | 24576:uwYIGNPHD9WL07oXGZf1dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:uwZG99WLxXGZV3mlind9i4ufFXpAXkru |
MD5: | EEA0B822B1F85710138D30EEEC4048D7 |
SHA1: | EFD1465E991ECDE6E21F0CF95450841B5A99A971 |
SHA-256: | ADC3F12372CBE7C64A2F7F7DB3D1AF70AB5D8367A8C809122C74C01233A1A0D0 |
SHA-512: | A8554AA4C4128C83CB275F5CCD260E6F6144A1A931EF7FBB5C4B08010CEA3E6610518E00FB0ED0C93B08EB794220B67C4EB1D1FB642316062357F2B6EE8C3490 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.244233360215043 |
TrID: |
|
File name: | Request for Quotations and specifications.pdf.exe |
File size: | 666'699 bytes |
MD5: | a27b87004e36c99c5ae138960f632287 |
SHA1: | b85c27e89d6eaf68a8cbc0d683546d46b8d270f6 |
SHA256: | 31ee50c565b3d2bc907ce74e87ed30d9a282bcdd99995fce3924adb7d7028cb8 |
SHA512: | 3c04870f94706737c0ec1019f6154047fd753cac84a19f9ed6313e0fb0a63d6a33e7d9923e7dfb5c0f1d353adfb6613e17e6abf5102701beab02c4828466201d |
SSDEEP: | 12288:PyveQB/fTHIGaPkKEYzURNAwbAg34GzrYkemklmWgq5Smn2sDMMt1l:PuDXTIGaPhEYzUzA0KaYP3l/7b2St7 |
TLSH: | 1BE4AE19E3F40CF8E0B7E538D9524902E7763D490B70969F2BA1156A1F3B3D0AD3AB21 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$.2.`.\.`.\.`.\..y..h.\..y....\..y..m.\.....b.\...X.r.\..._.j.\...Y.Y.\.i...i.\.i...b.\.i...g.\.`.].C.\...Y.R.\...\.a.\.....a.\ |
Icon Hash: | d292c2c2949c9888 |
Entrypoint: | 0x140032ee0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66409723 [Sun May 12 10:17:07 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 2 |
File Version Major: | 5 |
File Version Minor: | 2 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 2 |
Import Hash: | b1c5b1beabd90d9fdabd1df0779ea832 |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007FC5A8F2B368h |
dec eax |
add esp, 28h |
jmp 00007FC5A8F2ACFFh |
int3 |
int3 |
dec eax |
mov eax, esp |
dec eax |
mov dword ptr [eax+08h], ebx |
dec eax |
mov dword ptr [eax+10h], ebp |
dec eax |
mov dword ptr [eax+18h], esi |
dec eax |
mov dword ptr [eax+20h], edi |
inc ecx |
push esi |
dec eax |
sub esp, 20h |
dec ebp |
mov edx, dword ptr [ecx+38h] |
dec eax |
mov esi, edx |
dec ebp |
mov esi, eax |
dec eax |
mov ebp, ecx |
dec ecx |
mov edx, ecx |
dec eax |
mov ecx, esi |
dec ecx |
mov edi, ecx |
inc ecx |
mov ebx, dword ptr [edx] |
dec eax |
shl ebx, 04h |
dec ecx |
add ebx, edx |
dec esp |
lea eax, dword ptr [ebx+04h] |
call 00007FC5A8F2A183h |
mov eax, dword ptr [ebp+04h] |
and al, 66h |
neg al |
mov eax, 00000001h |
sbb edx, edx |
neg edx |
add edx, eax |
test dword ptr [ebx+04h], edx |
je 00007FC5A8F2AE93h |
dec esp |
mov ecx, edi |
dec ebp |
mov eax, esi |
dec eax |
mov edx, esi |
dec eax |
mov ecx, ebp |
call 00007FC5A8F2CEA7h |
dec eax |
mov ebx, dword ptr [esp+30h] |
dec eax |
mov ebp, dword ptr [esp+38h] |
dec eax |
mov esi, dword ptr [esp+40h] |
dec eax |
mov edi, dword ptr [esp+48h] |
dec eax |
add esp, 20h |
inc ecx |
pop esi |
ret |
int3 |
int3 |
int3 |
dec eax |
sub esp, 48h |
dec eax |
lea ecx, dword ptr [esp+20h] |
call 00007FC5A8F19713h |
dec eax |
lea edx, dword ptr [00025747h] |
dec eax |
lea ecx, dword ptr [esp+20h] |
call 00007FC5A8F2BF62h |
int3 |
jmp 00007FC5A8F32144h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x597a0 | 0x34 | .rdata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x597d4 | 0x50 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x70000 | 0x8940 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x6a000 | 0x306c | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x79000 | 0x970 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x536c0 | 0x54 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x53780 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x4b3f0 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x48000 | 0x508 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x588bc | 0x120 | .rdata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x4676e | 0x46800 | f06bb06e02377ae8b223122e53be35c2 | False | 0.5372340425531915 | data | 6.47079645411382 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x48000 | 0x128c4 | 0x12a00 | 2de06d4a6920a6911e64ff20000ea72f | False | 0.4499003775167785 | data | 5.273999097784603 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x5b000 | 0xe75c | 0x1a00 | 0dbdb901a7d477980097e42e511a94fb | False | 0.28275240384615385 | data | 3.2571023907881185 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x6a000 | 0x306c | 0x3200 | b0ce0f057741ad2a4ef4717079fa34e9 | False | 0.483359375 | data | 5.501810413666288 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.didat | 0x6e000 | 0x360 | 0x400 | 1fcc7b1d7a02443319f8fcc2be4ca936 | False | 0.2578125 | data | 3.0459938492946015 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
_RDATA | 0x6f000 | 0x15c | 0x200 | 3f331ec50f09ba861beaf955b33712d5 | False | 0.408203125 | data | 3.3356393424384843 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x70000 | 0x8940 | 0x8a00 | af5b25015032fb043c0ce3790246cb92 | False | 0.4205163043478261 | data | 6.177360157668852 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x79000 | 0x970 | 0xa00 | 77a9ddfc47a5650d6eebbcc823e39532 | False | 0.52421875 | data | 5.336289720085303 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
PNG | 0x705b4 | 0xb45 | PNG image data, 93 x 302, 8-bit/color RGB, non-interlaced | English | United States | 1.0027729636048528 |
PNG | 0x710fc | 0x15a9 | PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced | English | United States | 0.9363390441839495 |
RT_ICON | 0x726a8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | 0.40602836879432624 | ||
RT_ICON | 0x72b10 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | 0.20013661202185792 | ||
RT_ICON | 0x73c38 | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | 0.15581773799837267 | ||
RT_DIALOG | 0x762a0 | 0x286 | data | English | United States | 0.5092879256965944 |
RT_DIALOG | 0x76528 | 0x13a | data | English | United States | 0.60828025477707 |
RT_DIALOG | 0x76664 | 0xec | data | English | United States | 0.6991525423728814 |
RT_DIALOG | 0x76750 | 0x12e | data | English | United States | 0.5927152317880795 |
RT_DIALOG | 0x76880 | 0x338 | data | English | United States | 0.45145631067961167 |
RT_DIALOG | 0x76bb8 | 0x252 | data | English | United States | 0.5757575757575758 |
RT_STRING | 0x76e0c | 0x1e2 | data | English | United States | 0.3900414937759336 |
RT_STRING | 0x76ff0 | 0x1cc | data | English | United States | 0.4282608695652174 |
RT_STRING | 0x771bc | 0x1b8 | data | English | United States | 0.45681818181818185 |
RT_STRING | 0x77374 | 0x146 | data | English | United States | 0.5153374233128835 |
RT_STRING | 0x774bc | 0x46c | data | English | United States | 0.3454063604240283 |
RT_STRING | 0x77928 | 0x166 | data | English | United States | 0.49162011173184356 |
RT_STRING | 0x77a90 | 0x152 | data | English | United States | 0.5059171597633136 |
RT_STRING | 0x77be4 | 0x10a | data | English | United States | 0.49624060150375937 |
RT_STRING | 0x77cf0 | 0xbc | data | English | United States | 0.6329787234042553 |
RT_STRING | 0x77dac | 0x1c0 | data | English | United States | 0.5178571428571429 |
RT_STRING | 0x77f6c | 0x250 | data | English | United States | 0.44256756756756754 |
RT_GROUP_ICON | 0x781bc | 0x30 | data | 0.8541666666666666 | ||
RT_MANIFEST | 0x781ec | 0x753 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.3957333333333333 |
DLL | Import |
---|---|
KERNEL32.dll | LocalFree, GetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, GetCurrentProcessId, CreateDirectoryW, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, GlobalMemoryStatusEx, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindNextFileA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, HeapReAlloc, LCMapStringW, FindFirstFileExA |
OLEAUT32.dll | SysAllocString, SysFreeString, VariantClear |
gdiplus.dll | GdipCloneImage, GdipFree, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipAlloc |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-12T09:02:13.293315+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.8 | 49704 | 193.122.6.168 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 12, 2024 09:02:11.439990997 CET | 49704 | 80 | 192.168.2.8 | 193.122.6.168 |
Dec 12, 2024 09:02:11.559408903 CET | 80 | 49704 | 193.122.6.168 | 192.168.2.8 |
Dec 12, 2024 09:02:11.559504032 CET | 49704 | 80 | 192.168.2.8 | 193.122.6.168 |
Dec 12, 2024 09:02:11.561352015 CET | 49704 | 80 | 192.168.2.8 | 193.122.6.168 |
Dec 12, 2024 09:02:11.680558920 CET | 80 | 49704 | 193.122.6.168 | 192.168.2.8 |
Dec 12, 2024 09:02:12.825721025 CET | 80 | 49704 | 193.122.6.168 | 192.168.2.8 |
Dec 12, 2024 09:02:12.839361906 CET | 49704 | 80 | 192.168.2.8 | 193.122.6.168 |
Dec 12, 2024 09:02:12.959678888 CET | 80 | 49704 | 193.122.6.168 | 192.168.2.8 |
Dec 12, 2024 09:02:13.245096922 CET | 80 | 49704 | 193.122.6.168 | 192.168.2.8 |
Dec 12, 2024 09:02:13.293314934 CET | 49704 | 80 | 192.168.2.8 | 193.122.6.168 |
Dec 12, 2024 09:02:13.473485947 CET | 49705 | 443 | 192.168.2.8 | 104.21.67.152 |
Dec 12, 2024 09:02:13.473530054 CET | 443 | 49705 | 104.21.67.152 | 192.168.2.8 |
Dec 12, 2024 09:02:13.473953962 CET | 49705 | 443 | 192.168.2.8 | 104.21.67.152 |
Dec 12, 2024 09:02:13.527964115 CET | 49705 | 443 | 192.168.2.8 | 104.21.67.152 |
Dec 12, 2024 09:02:13.527983904 CET | 443 | 49705 | 104.21.67.152 | 192.168.2.8 |
Dec 12, 2024 09:02:14.745136976 CET | 443 | 49705 | 104.21.67.152 | 192.168.2.8 |
Dec 12, 2024 09:02:14.745218039 CET | 49705 | 443 | 192.168.2.8 | 104.21.67.152 |
Dec 12, 2024 09:02:14.758723021 CET | 49705 | 443 | 192.168.2.8 | 104.21.67.152 |
Dec 12, 2024 09:02:14.758744001 CET | 443 | 49705 | 104.21.67.152 | 192.168.2.8 |
Dec 12, 2024 09:02:14.759012938 CET | 443 | 49705 | 104.21.67.152 | 192.168.2.8 |
Dec 12, 2024 09:02:14.799218893 CET | 49705 | 443 | 192.168.2.8 | 104.21.67.152 |
Dec 12, 2024 09:02:15.213589907 CET | 49705 | 443 | 192.168.2.8 | 104.21.67.152 |
Dec 12, 2024 09:02:15.259337902 CET | 443 | 49705 | 104.21.67.152 | 192.168.2.8 |
Dec 12, 2024 09:02:15.541296959 CET | 443 | 49705 | 104.21.67.152 | 192.168.2.8 |
Dec 12, 2024 09:02:15.541357040 CET | 443 | 49705 | 104.21.67.152 | 192.168.2.8 |
Dec 12, 2024 09:02:15.541608095 CET | 49705 | 443 | 192.168.2.8 | 104.21.67.152 |
Dec 12, 2024 09:02:15.549985886 CET | 49705 | 443 | 192.168.2.8 | 104.21.67.152 |
Dec 12, 2024 09:03:18.244684935 CET | 80 | 49704 | 193.122.6.168 | 192.168.2.8 |
Dec 12, 2024 09:03:18.244796038 CET | 49704 | 80 | 192.168.2.8 | 193.122.6.168 |
Dec 12, 2024 09:03:53.250685930 CET | 49704 | 80 | 192.168.2.8 | 193.122.6.168 |
Dec 12, 2024 09:03:53.370122910 CET | 80 | 49704 | 193.122.6.168 | 192.168.2.8 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 12, 2024 09:02:11.121803045 CET | 57975 | 53 | 192.168.2.8 | 1.1.1.1 |
Dec 12, 2024 09:02:11.259747982 CET | 53 | 57975 | 1.1.1.1 | 192.168.2.8 |
Dec 12, 2024 09:02:13.323178053 CET | 60753 | 53 | 192.168.2.8 | 1.1.1.1 |
Dec 12, 2024 09:02:13.467442036 CET | 53 | 60753 | 1.1.1.1 | 192.168.2.8 |
Dec 12, 2024 09:02:21.828501940 CET | 64790 | 53 | 192.168.2.8 | 1.1.1.1 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 12, 2024 09:02:11.121803045 CET | 192.168.2.8 | 1.1.1.1 | 0xe0af | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 12, 2024 09:02:13.323178053 CET | 192.168.2.8 | 1.1.1.1 | 0x956e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 12, 2024 09:02:21.828501940 CET | 192.168.2.8 | 1.1.1.1 | 0xac0a | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 12, 2024 09:02:11.259747982 CET | 1.1.1.1 | 192.168.2.8 | 0xe0af | No error (0) | checkip.dyndns.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:11.259747982 CET | 1.1.1.1 | 192.168.2.8 | 0xe0af | No error (0) | 193.122.6.168 | A (IP address) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:11.259747982 CET | 1.1.1.1 | 192.168.2.8 | 0xe0af | No error (0) | 193.122.130.0 | A (IP address) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:11.259747982 CET | 1.1.1.1 | 192.168.2.8 | 0xe0af | No error (0) | 158.101.44.242 | A (IP address) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:11.259747982 CET | 1.1.1.1 | 192.168.2.8 | 0xe0af | No error (0) | 132.226.8.169 | A (IP address) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:11.259747982 CET | 1.1.1.1 | 192.168.2.8 | 0xe0af | No error (0) | 132.226.247.73 | A (IP address) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:13.467442036 CET | 1.1.1.1 | 192.168.2.8 | 0x956e | No error (0) | 104.21.67.152 | A (IP address) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:13.467442036 CET | 1.1.1.1 | 192.168.2.8 | 0x956e | No error (0) | 172.67.177.134 | A (IP address) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:22.044291019 CET | 1.1.1.1 | 192.168.2.8 | 0xac0a | No error (0) | crl.root-x1.letsencrypt.org.edgekey.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:23.961770058 CET | 1.1.1.1 | 192.168.2.8 | 0xa58b | No error (0) | default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:23.961770058 CET | 1.1.1.1 | 192.168.2.8 | 0xa58b | No error (0) | 217.20.58.98 | A (IP address) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:23.961770058 CET | 1.1.1.1 | 192.168.2.8 | 0xa58b | No error (0) | 217.20.58.100 | A (IP address) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:23.961770058 CET | 1.1.1.1 | 192.168.2.8 | 0xa58b | No error (0) | 217.20.58.101 | A (IP address) | IN (0x0001) | false | ||
Dec 12, 2024 09:02:23.961770058 CET | 1.1.1.1 | 192.168.2.8 | 0xa58b | No error (0) | 217.20.58.99 | A (IP address) | IN (0x0001) | false | ||
Dec 12, 2024 09:03:32.635379076 CET | 1.1.1.1 | 192.168.2.8 | 0x7c98 | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false | ||
Dec 12, 2024 09:03:32.635379076 CET | 1.1.1.1 | 192.168.2.8 | 0x7c98 | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.8 | 49704 | 193.122.6.168 | 80 | 2156 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 12, 2024 09:02:11.561352015 CET | 151 | OUT | |
Dec 12, 2024 09:02:12.825721025 CET | 321 | IN | |
Dec 12, 2024 09:02:12.839361906 CET | 127 | OUT | |
Dec 12, 2024 09:02:13.245096922 CET | 321 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.8 | 49705 | 104.21.67.152 | 443 | 2156 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-12 08:02:15 UTC | 85 | OUT | |
2024-12-12 08:02:15 UTC | 880 | IN | |
2024-12-12 08:02:15 UTC | 362 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 03:02:08 |
Start date: | 12/12/2024 |
Path: | C:\Users\user\Desktop\Request for Quotations and specifications.pdf.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff663c40000 |
File size: | 666'699 bytes |
MD5 hash: | A27B87004E36C99C5AE138960F632287 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 03:02:08 |
Start date: | 12/12/2024 |
Path: | C:\Users\user\AppData\Local\Temp\RarSFX0\holy.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x990000 |
File size: | 477'184 bytes |
MD5 hash: | F072A1E438C9D2453EE1B74027D07DD2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 03:02:09 |
Start date: | 12/12/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfa0000 |
File size: | 65'440 bytes |
MD5 hash: | 0D5DF43AF2916F47D00C1573797C1A13 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | false |
Target ID: | 4 |
Start time: | 03:02:10 |
Start date: | 12/12/2024 |
Path: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6e8200000 |
File size: | 5'641'176 bytes |
MD5 hash: | 24EAD1C46A47022347DC0F05F6EFBB8C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 5 |
Start time: | 03:02:11 |
Start date: | 12/12/2024 |
Path: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff79c940000 |
File size: | 3'581'912 bytes |
MD5 hash: | 9B38E8E8B6DD9622D24B53E095C5D9BE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 7 |
Start time: | 03:02:11 |
Start date: | 12/12/2024 |
Path: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff79c940000 |
File size: | 3'581'912 bytes |
MD5 hash: | 9B38E8E8B6DD9622D24B53E095C5D9BE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Analysis Process: Request for Quotations and specifications.pdf.exePID: 6764, Parent PID: 4084COMMON
Execution Graph
Execution Coverage: | 11.9% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 28.1% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 30 |
Graph
Function 00007FF663C6B190 Relevance: 118.7, APIs: 57, Strings: 10, Instructions: 1421windowfilesleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C6CE88 Relevance: 63.2, APIs: 25, Strings: 10, Instructions: 1963windowfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C70754 Relevance: 42.4, APIs: 19, Strings: 5, Instructions: 380filesleeptimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C5A4AC Relevance: 23.0, APIs: 11, Strings: 2, Instructions: 250COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C68624 Relevance: 21.1, APIs: 11, Strings: 1, Instructions: 101memorywindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C4F930 Relevance: 17.2, APIs: 8, Strings: 1, Instructions: 1417COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C44840 Relevance: 12.1, APIs: 5, Strings: 1, Instructions: 1624COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C45E24 Relevance: 7.6, APIs: 3, Strings: 1, Instructions: 586COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C61F20 Relevance: .3, Instructions: 337COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C63484 Relevance: .3, Instructions: 302COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C54928 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C5DFD0 Relevance: 143.9, APIs: 16, Strings: 66, Instructions: 440libraryfileloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C598DC Relevance: 25.2, APIs: 3, Strings: 11, Instructions: 702COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C71900 Relevance: 22.9, APIs: 12, Strings: 1, Instructions: 195libraryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C6F4E0 Relevance: 21.3, APIs: 8, Strings: 4, Instructions: 285windowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C6F0A4 Relevance: 16.6, APIs: 11, Instructions: 102windowCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C524C0 Relevance: 9.2, APIs: 6, Instructions: 164filetimeCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C6FE24 Relevance: 7.5, APIs: 5, Instructions: 29windowsynchronizationCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C691E8 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 33COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C6B014 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 54windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C5EAA4 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 42threadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C6946C Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 26comCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7D90C Relevance: 3.0, APIs: 2, Instructions: 19memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C71558 Relevance: 1.5, APIs: 1, Instructions: 38COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C57FC4 Relevance: 1.5, APIs: 1, Instructions: 9COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7FA04 Relevance: 1.3, APIs: 1, Instructions: 36memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7D94C Relevance: 1.3, APIs: 1, Instructions: 29memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C4C2F0 Relevance: 49.8, APIs: 24, Strings: 4, Instructions: 754fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C5F180 Relevance: 43.2, APIs: 22, Strings: 2, Instructions: 1205COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C82550 Relevance: 22.3, APIs: 8, Strings: 4, Instructions: 1310COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C51A48 Relevance: 17.9, APIs: 9, Strings: 1, Instructions: 375fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C776D8 Relevance: 9.1, APIs: 6, Instructions: 83COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7FA94 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 164COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C82080 Relevance: 4.8, APIs: 3, Instructions: 340COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7FCA0 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 97COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C85AF8 Relevance: 3.2, APIs: 2, Instructions: 227COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C78C1C Relevance: 1.5, Strings: 1, Instructions: 219COMMONLIBRARYCODE
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C789A0 Relevance: 1.4, Strings: 1, Instructions: 199COMMONLIBRARYCODE
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C63964 Relevance: .9, Instructions: 931COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C476C0 Relevance: .9, Instructions: 893COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C653F0 Relevance: .9, Instructions: 891COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C5BB90 Relevance: .6, Instructions: 587COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C64B98 Relevance: .6, Instructions: 578COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C47288 Relevance: .3, Instructions: 294COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C62D58 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C5AF18 Relevance: .2, Instructions: 244COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C4A310 Relevance: .2, Instructions: 230COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C5B534 Relevance: .2, Instructions: 181COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C621D0 Relevance: .1, Instructions: 137COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C62AB0 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C858E0 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C73354 Relevance: .0, Instructions: 2COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C4D7D0 Relevance: 26.3, APIs: 1, Strings: 14, Instructions: 98COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C72A10 Relevance: 21.1, APIs: 8, Strings: 4, Instructions: 61libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C56A0C Relevance: 16.2, APIs: 6, Strings: 3, Instructions: 444COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C66E80 Relevance: 16.0, APIs: 5, Strings: 4, Instructions: 204memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7E650 Relevance: 15.9, APIs: 1, Strings: 8, Instructions: 117COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C6A440 Relevance: 14.3, APIs: 6, Strings: 2, Instructions: 257COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C6F390 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 85windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C5B9B4 Relevance: 14.1, APIs: 3, Strings: 5, Instructions: 84libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C687D8 Relevance: 12.7, APIs: 5, Strings: 2, Instructions: 415COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C757EC Relevance: 10.8, APIs: 3, Strings: 3, Instructions: 317COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C54F38 Relevance: 10.7, APIs: 1, Strings: 5, Instructions: 158COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C6AE90 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 94COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C772EC Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 88libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C71604 Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 43libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C57918 Relevance: 9.0, APIs: 1, Strings: 4, Instructions: 233COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C75CE8 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 191COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C74F80 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 144COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C4CEE0 Relevance: 8.9, APIs: 3, Strings: 2, Instructions: 139COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C67B28 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 122COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C6FD0C Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 76COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C6FED4 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 52COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7BFB0 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 29libraryloaderCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C53AF8 Relevance: 7.7, APIs: 5, Instructions: 164filetimeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7F414 Relevance: 7.6, APIs: 5, Instructions: 114libraryloaderCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C856D8 Relevance: 7.6, APIs: 5, Instructions: 56COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7625C Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 163COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C780F4 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 145COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C81758 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 126COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C766A0 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 117COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C84360 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 100fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C690B0 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 83COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C5E870 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 53COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C685E0 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 19COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7DB5C Relevance: 6.1, APIs: 4, Instructions: 104COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7D440 Relevance: 6.0, APIs: 4, Instructions: 43COMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C4E34C Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 176COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7E1F4 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 138COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C59408 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 108COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7C2C0 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 107COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C59638 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 84COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C70204 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 75windowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C7EB04 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 70COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C74078 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 42COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C5EA5C Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 16synchronizationCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF663C5A43C Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 15COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 36.7% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 40 |
Total number of Limit Nodes: | 2 |
Graph
Function 02B50B98 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02B52B68 Relevance: 1.6, APIs: 1, Instructions: 109COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02B52B70 Relevance: 1.6, APIs: 1, Instructions: 106COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02B528F0 Relevance: 1.6, APIs: 1, Instructions: 104memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02B528F8 Relevance: 1.6, APIs: 1, Instructions: 101memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02B527C8 Relevance: 1.6, APIs: 1, Instructions: 97threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02B527D0 Relevance: 1.6, APIs: 1, Instructions: 94threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02B526D8 Relevance: 1.6, APIs: 1, Instructions: 76threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02B526E0 Relevance: 1.6, APIs: 1, Instructions: 73threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 15.9% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 14.3% |
Total number of Nodes: | 28 |
Total number of Limit Nodes: | 3 |
Graph
Function 0173C168 Relevance: 2.0, APIs: 1, Instructions: 533COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0173C76C Relevance: 1.6, APIs: 1, Instructions: 62libraryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0155D030 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0155D02B Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|