Analysis Report reflective_practice_template_nhs[1].pdf

Overview

General Information

Sample Name: reflective_practice_template_nhs[1].pdf
Analysis ID: 404286
MD5: bd93c6b39cf6fbfb5f2009a320f70ab2
SHA1: bc2b60452dbe4994d0d1d8ab2a769b278a5cd58d
SHA256: 834c0a2229054d27ad6ce7ff422a332cd18694bd828c4a4b3a4745b0086fe144
Infos:

Most interesting Screenshot:

Detection

Score: 22
Range: 0 - 100
Whitelisted: false
Confidence: 60%

Signatures

Machine Learning detection for sample
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
IP address seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)

Classification

AV Detection:

barindex
Machine Learning detection for sample
Source: reflective_practice_template_nhs[1].pdf Joe Sandbox ML: detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior

Software Vulnerabilities:

barindex
Potential document exploit detected (performs DNS queries)
Source: global traffic DNS query: name: traffking.ru
Potential document exploit detected (performs HTTP gets)
Source: global traffic TCP traffic: 192.168.2.5:49720 -> 172.67.171.190:443
Potential document exploit detected (unknown TCP traffic)
Source: global traffic TCP traffic: 192.168.2.5:49720 -> 172.67.171.190:443

Networking:

barindex
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox View IP Address: 80.0.0.0 80.0.0.0
Source: unknown DNS traffic detected: queries for: traffking.ru
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: AcroRd32.exe, 00000002.00000002.410868252.0000000009340000.00000004.00000001.sdmp String found in binary or memory: http://cipa.jp/exif/1.0/
Source: AcroRd32.exe, 00000002.00000002.410868252.0000000009340000.00000004.00000001.sdmp String found in binary or memory: http://cipa.jp/exif/1.0/(15)8
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: AcroRd32.exe, 00000002.00000002.427413592.000000000D56B000.00000004.00000001.sdmp String found in binary or memory: http://iptc.org/std/Iptc4xmpCore/1.0/xmlns/
Source: AcroRd32.exe, 00000002.00000002.427413592.000000000D56B000.00000004.00000001.sdmp String found in binary or memory: http://iptc.org/std/Iptc4xmpCore/1.0/xmlns/Pk
Source: AcroRd32.exe, 00000002.00000002.427413592.000000000D56B000.00000004.00000001.sdmp String found in binary or memory: http://iptc.org/std/Iptc4xmpExt/2008-02-29/
Source: AcroRd32.exe, 00000002.00000002.427413592.000000000D56B000.00000004.00000001.sdmp String found in binary or memory: http://iptc.org/std/Iptc4xmpExt/2008-02-29/ik
Source: AcroRd32.exe, 00000002.00000002.427413592.000000000D56B000.00000004.00000001.sdmp String found in binary or memory: http://ns.useplus.org/ldf/xmp/1.0/
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://ocsp.digicert.com0C
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://ocsp.digicert.com0H
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://ocsp.digicert.com0I
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://ocsp.digicert.com0O
Source: AcroRd32.exe, 00000002.00000002.423732062.000000000B4B1000.00000004.00000001.sdmp String found in binary or memory: http://scripts.sil.org/OFL
Source: AcroRd32.exe, 00000002.00000002.423732062.000000000B4B1000.00000004.00000001.sdmp String found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFL
Source: AcroRd32.exe, 00000002.00000002.431313305.000000000E686000.00000004.00000001.sdmp String found in binary or memory: http://www.adobe.
Source: AcroRd32.exe, 00000002.00000002.431160906.000000000E27C000.00000004.00000001.sdmp String found in binary or memory: http://www.adobe.9
Source: AcroRd32.exe, 00000002.00000002.427413592.000000000D56B000.00000004.00000001.sdmp String found in binary or memory: http://www.aiim.org/pdfa/ns/extension/
Source: AcroRd32.exe, 00000002.00000002.427413592.000000000D56B000.00000004.00000001.sdmp String found in binary or memory: http://www.aiim.org/pdfa/ns/field#
Source: AcroRd32.exe, 00000002.00000002.427413592.000000000D56B000.00000004.00000001.sdmp String found in binary or memory: http://www.aiim.org/pdfa/ns/field#Id
Source: AcroRd32.exe, 00000002.00000002.431160906.000000000E27C000.00000004.00000001.sdmp String found in binary or memory: http://www.aiim.org/pdfa/ns/id/
Source: AcroRd32.exe, 00000002.00000002.431160906.000000000E27C000.00000004.00000001.sdmp String found in binary or memory: http://www.aiim.org/pdfa/ns/id/-
Source: AcroRd32.exe, 00000002.00000002.431160906.000000000E27C000.00000004.00000001.sdmp String found in binary or memory: http://www.aiim.org/pdfa/ns/id/c
Source: AcroRd32.exe, 00000002.00000002.427413592.000000000D56B000.00000004.00000001.sdmp String found in binary or memory: http://www.aiim.org/pdfa/ns/property#
Source: AcroRd32.exe, 00000002.00000002.427413592.000000000D56B000.00000004.00000001.sdmp String found in binary or memory: http://www.aiim.org/pdfa/ns/schema#
Source: AcroRd32.exe, 00000002.00000002.427413592.000000000D56B000.00000004.00000001.sdmp String found in binary or memory: http://www.aiim.org/pdfa/ns/type#
Source: AcroRd32.exe, 00000002.00000002.431160906.000000000E27C000.00000004.00000001.sdmp String found in binary or memory: http://www.aiim.org/pdfe/ns/id/
Source: AcroRd32.exe, 00000002.00000002.423732062.000000000B4B1000.00000004.00000001.sdmp String found in binary or memory: http://www.ascendercorp.com/
Source: AcroRd32.exe, 00000002.00000002.423732062.000000000B4B1000.00000004.00000001.sdmp String found in binary or memory: http://www.ascendercorp.com/http://www.ascendercorp.com/http://www.ascendercorp.com/typedesigners.ht
Source: AcroRd32.exe, 00000002.00000002.423732062.000000000B4B1000.00000004.00000001.sdmp String found in binary or memory: http://www.ascendercorp.com/typedesigners.html
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: AcroRd32.exe, 00000002.00000002.423999541.000000000B5DB000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.comhttp://www.fontbureau.com/designersNegritaAgency
Source: AcroRd32.exe, 00000002.00000002.431160906.000000000E27C000.00000004.00000001.sdmp String found in binary or memory: http://www.npes.org/pdfx/ns/id/
Source: AcroRd32.exe, 00000002.00000002.431160906.000000000E27C000.00000004.00000001.sdmp String found in binary or memory: http://www.npes.org/pdfx/ns/id/R
Source: AcroRd32.exe, 00000002.00000002.431160906.000000000E27C000.00000004.00000001.sdmp String found in binary or memory: http://www.npes.org/pdfx/ns/id/l
Source: AcroRd32.exe, 00000002.00000002.405944190.0000000007C70000.00000002.00000001.sdmp String found in binary or memory: http://www.osmf.org/default/1.0%http://www.osmf.org/mediatype/default
Source: AcroRd32.exe, 00000002.00000002.405944190.0000000007C70000.00000002.00000001.sdmp String found in binary or memory: http://www.osmf.org/drm/default
Source: AcroRd32.exe, 00000002.00000002.405944190.0000000007C70000.00000002.00000001.sdmp String found in binary or memory: http://www.osmf.org/elementId%http://www.osmf.org/temporal/embedded$http://www.osmf.org/temporal/dyn
Source: AcroRd32.exe, 00000002.00000002.405944190.0000000007C70000.00000002.00000001.sdmp String found in binary or memory: http://www.osmf.org/layout/anchor
Source: AcroRd32.exe, 00000002.00000002.405944190.0000000007C70000.00000002.00000001.sdmp String found in binary or memory: http://www.osmf.org/layout/padding%http://www.osmf.org/layout/attributes
Source: AcroRd32.exe, 00000002.00000002.405944190.0000000007C70000.00000002.00000001.sdmp String found in binary or memory: http://www.osmf.org/region/target#http://www.osmf.org/layout/renderer#http://www.osmf.org/layout/abs
Source: AcroRd32.exe, 00000002.00000002.405944190.0000000007C70000.00000002.00000001.sdmp String found in binary or memory: http://www.osmf.org/subclip/1.0
Source: AcroRd32.exe, 00000002.00000002.405944190.0000000007C70000.00000002.00000001.sdmp String found in binary or memory: http://www.quicktime.com.Acrobat
Source: AcroRd32.exe, 00000002.00000002.431436814.000000000E777000.00000004.00000001.sdmp String found in binary or memory: https://.OKCancelEdit
Source: AcroRd32.exe, 00000002.00000002.431313305.000000000E686000.00000004.00000001.sdmp String found in binary or memory: https://PrefSyncJob/com.adobe.acrobat.ADotCom/Resource/Sync/
Source: AcroRd32.exe, 00000002.00000002.431313305.000000000E686000.00000004.00000001.sdmp String found in binary or memory: https://PrefSyncJob/com.adobe.acrobat.ADotCom/Resource/Sync/$
Source: AcroRd32.exe, 00000002.00000002.423999541.000000000B5DB000.00000004.00000001.sdmp String found in binary or memory: https://PrefSyncJob/com.adobe.acrobat.ADotCom/Resource/Sync/Upload/
Source: AcroRd32.exe, 00000002.00000002.423999541.000000000B5DB000.00000004.00000001.sdmp String found in binary or memory: https://PrefSyncJob/com.adobe.acrobat.ADotCom/Resource/Sync/Upload/4
Source: AcroRd32.exe, 00000002.00000002.423999541.000000000B5DB000.00000004.00000001.sdmp String found in binary or memory: https://PrefSyncJob/com.adobe.acrobat.ADotCom/Resource/Sync/Upload/We9
Source: AcroRd32.exe, 00000002.00000002.423999541.000000000B5DB000.00000004.00000001.sdmp String found in binary or memory: https://PrefSyncJob/com.adobe.acrobat.ADotCom/Resource/Sync/Upload/i
Source: AcroRd32.exe, 00000002.00000002.423999541.000000000B5DB000.00000004.00000001.sdmp String found in binary or memory: https://PrefSyncJob/com.adobe.acrobat.ADotCom/Resource/Sync/Upload/ma
Source: AcroRd32.exe, 00000002.00000002.423999541.000000000B5DB000.00000004.00000001.sdmp String found in binary or memory: https://PrefSyncJob/com.adobe.acrobat.ADotCom/Resource/Sync/Upload/rlA
Source: AcroRd32.exe, 00000002.00000002.431313305.000000000E686000.00000004.00000001.sdmp String found in binary or memory: https://PrefSyncJob/com.adobe.acrobat.ADotCom/Resource/Sync/dfo
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr String found in binary or memory: https://a.nel.cloudflare.com
Source: Reporting and NEL.22.dr String found in binary or memory: https://a.nel.cloudflare.com/report?s=XgDtas6rxmQXi1NtYYQGGtjvlm1lLbMIYjkQIprM4iwF0ZZj3tp0ISGyKdYPkd
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr, manifest.json0.21.dr, 1704ca54-9349-4cf0-ac97-9bff9f5ae3ef.tmp.22.dr String found in binary or memory: https://accounts.google.com
Source: AcroRd32.exe, 00000002.00000002.431160906.000000000E27C000.00000004.00000001.sdmp String found in binary or memory: https://api.echosign.com
Source: AcroRd32.exe, 00000002.00000002.431160906.000000000E27C000.00000004.00000001.sdmp String found in binary or memory: https://api.echosign.com7
Source: AcroRd32.exe, 00000002.00000002.431160906.000000000E27C000.00000004.00000001.sdmp String found in binary or memory: https://api.echosign.comRL
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr, manifest.json0.21.dr, 1704ca54-9349-4cf0-ac97-9bff9f5ae3ef.tmp.22.dr String found in binary or memory: https://apis.google.com
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://cdn.sqhk.co/kapopajij/WiinigQ/protozoa_vs_bacteria_vs_virus_size.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://cdn.sqhk.co/kapopajij/WiinigQ/protozoa_vs_bacteria_vs_virus_size.pdf)
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://cdn.sqhk.co/kapopajij/WiinigQ/protozoa_vs_bacteria_vs_virus_size.pdfg-
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://cdn.sqhk.co/kilatelazobe/jetdOgd/retro_fridge_with_water_dispenser.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://cdn.sqhk.co/kilatelazobe/jetdOgd/retro_fridge_with_water_dispenser.pdf)
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://cdn.sqhk.co/ludibipimilu/DhcRxOb/movie_software_for_windows_10.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://cdn.sqhk.co/ludibipimilu/DhcRxOb/movie_software_for_windows_10.pdf)
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://cdn.sqhk.co/potexunajo/Qjajchj/hitman_2_silent_assassin_cheats.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://cdn.sqhk.co/potexunajo/Qjajchj/hitman_2_silent_assassin_cheats.pdf)
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr, 1704ca54-9349-4cf0-ac97-9bff9f5ae3ef.tmp.22.dr String found in binary or memory: https://clients2.google.com
Source: manifest.json0.21.dr String found in binary or memory: https://clients2.google.com/service/update2/crx
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr, 1704ca54-9349-4cf0-ac97-9bff9f5ae3ef.tmp.22.dr String found in binary or memory: https://clients2.googleusercontent.com
Source: manifest.json0.21.dr String found in binary or memory: https://content.googleapis.com
Source: Reporting and NEL.22.dr String found in binary or memory: https://csp.withgoogle.com/csp/report-to/IdentityListAccountsHttp/external
Source: ed8954d8-3f2b-4e1b-b29d-f26f5a04eaca.tmp.22.dr, 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr, 10b9cad4-7dff-4d1c-b1c2-32538d1f314b.tmp.22.dr, 1704ca54-9349-4cf0-ac97-9bff9f5ae3ef.tmp.22.dr String found in binary or memory: https://dns.google
Source: manifest.json0.21.dr String found in binary or memory: https://feedback.googleusercontent.com
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr, 1704ca54-9349-4cf0-ac97-9bff9f5ae3ef.tmp.22.dr String found in binary or memory: https://fonts.googleapis.com
Source: manifest.json0.21.dr String found in binary or memory: https://fonts.googleapis.com;
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr, 1704ca54-9349-4cf0-ac97-9bff9f5ae3ef.tmp.22.dr String found in binary or memory: https://fonts.gstatic.com
Source: manifest.json0.21.dr String found in binary or memory: https://fonts.gstatic.com;
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://genigudepa.weebly.com/uploads/1/3/1/0/131070712/kasodopizafazakoxuk.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://genigudepa.weebly.com/uploads/1/3/1/0/131070712/kasodopizafazakoxuk.pdf)
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://gofolepoxi.weebly.com/uploads/1/3/4/8/134882907/7674727.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://gofolepoxi.weebly.com/uploads/1/3/4/8/134882907/7674727.pdf)
Source: manifest.json0.21.dr String found in binary or memory: https://hangouts.google.com/
Source: AcroRd32.exe, 00000002.00000002.410868252.0000000009340000.00000004.00000001.sdmp String found in binary or memory: https://ims-na1.adobelogin.com
Source: AcroRd32.exe, 00000002.00000002.423954231.000000000B595000.00000004.00000001.sdmp String found in binary or memory: https://najijufo.weebly.com/uploads/1/3/4/7/134714833/peguloxufera_kudulavigiwub.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://najijufo.weebly.com/uploads/1/3/4/7/134714833/peguloxufera_kudulavigiwub.pdf)
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://nalabusapigo.weebly.com/uploads/1/3/2/7/132740218/4175162.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://nalabusapigo.weebly.com/uploads/1/3/2/7/132740218/4175162.pdf)
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://nalabusapigo.weebly.com/uploads/1/3/2/7/132740218/4175162.pdfp-
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr, 1704ca54-9349-4cf0-ac97-9bff9f5ae3ef.tmp.22.dr String found in binary or memory: https://ogs.google.com
Source: manifest.json.21.dr String found in binary or memory: https://payments.google.com/payments/v4/js/integrator.js
Source: AcroRd32.exe, 00000002.00000002.411079859.0000000009425000.00000004.00000001.sdmp String found in binary or memory: https://pumoguviponurin.weebly.com/uploads/1/3/4/7/134773216/miretigegurugi.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://pumoguviponurin.weebly.com/uploads/1/3/4/7/134773216/miretigegurugi.pdf)
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr String found in binary or memory: https://r7---sn-n02xgoxufvg3-2gbs.gvt1.com
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr String found in binary or memory: https://redirector.gvt1.com
Source: manifest.json.21.dr String found in binary or memory: https://sandbox.google.com/payments/v4/js/integrator.js
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr, 1704ca54-9349-4cf0-ac97-9bff9f5ae3ef.tmp.22.dr String found in binary or memory: https://ssl.gstatic.com
Source: messages.json56.21.dr String found in binary or memory: https://support.google.com/chromecast/answer/2998456
Source: messages.json56.21.dr String found in binary or memory: https://support.google.com/chromecast/troubleshooter/2995236
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://tipefejiri.weebly.com/uploads/1/3/0/9/130969755/buwobu.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://tipefejiri.weebly.com/uploads/1/3/0/9/130969755/buwobu.pdf)
Source: AcroRd32.exe, 00000002.00000002.431313305.000000000E686000.00000004.00000001.sdmp, 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr String found in binary or memory: https://traffking.ru
Source: Current Session.21.dr String found in binary or memory: https://traffking.ru/square?utm_term=reflective
Source: AcroRd32.exe, 00000002.00000002.423954231.000000000B595000.00000004.00000001.sdmp String found in binary or memory: https://uploads.strikinglycdn.com/files/4371836f-f017-4f30-9831-11554ca34703/botunuxojok.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://uploads.strikinglycdn.com/files/4371836f-f017-4f30-9831-11554ca34703/botunuxojok.pdf)
Source: AcroRd32.exe, 00000002.00000002.423954231.000000000B595000.00000004.00000001.sdmp String found in binary or memory: https://uploads.strikinglycdn.com/files/4371836f-f017-4f30-9831-11554ca34703/botunuxojok.pdfN
Source: AcroRd32.exe, 00000002.00000002.424135864.000000000B685000.00000004.00000001.sdmp, reflective_practice_template_nhs[1].pdf String found in binary or memory: https://uploads.strikinglycdn.com/files/8c547329-0d1e-4dfa-b95f-2dc323cb86d4/world_war_one_weapons_c
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://wixotavu.weebly.com/uploads/1/3/4/7/134764887/2953325.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://wixotavu.weebly.com/uploads/1/3/4/7/134764887/2953325.pdf)
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://wixotavu.weebly.com/uploads/1/3/4/7/134764887/2953325.pdfb.
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://wosufixojiniki.weebly.com/uploads/1/3/4/7/134720754/4081785.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://wosufixojiniki.weebly.com/uploads/1/3/4/7/134720754/4081785.pdf)
Source: AcroRd32.exe, 00000002.00000002.410704532.0000000008B2D000.00000002.00000001.sdmp String found in binary or memory: https://www.digicert.com/CPS0
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr, manifest.json0.21.dr, 1704ca54-9349-4cf0-ac97-9bff9f5ae3ef.tmp.22.dr String found in binary or memory: https://www.google.com
Source: manifest.json.21.dr String found in binary or memory: https://www.google.com/
Source: manifest.json0.21.dr String found in binary or memory: https://www.google.com;
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr, 1704ca54-9349-4cf0-ac97-9bff9f5ae3ef.tmp.22.dr String found in binary or memory: https://www.googleapis.com
Source: manifest.json.21.dr String found in binary or memory: https://www.googleapis.com/
Source: manifest.json0.21.dr String found in binary or memory: https://www.googleapis.com/auth/calendar.readonly
Source: manifest.json0.21.dr String found in binary or memory: https://www.googleapis.com/auth/cast-edu-messaging
Source: manifest.json.21.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore
Source: manifest.json.21.dr String found in binary or memory: https://www.googleapis.com/auth/chromewebstore.readonly
Source: manifest.json0.21.dr String found in binary or memory: https://www.googleapis.com/auth/clouddevices
Source: manifest.json0.21.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts
Source: manifest.json0.21.dr String found in binary or memory: https://www.googleapis.com/auth/hangouts.readonly
Source: manifest.json0.21.dr String found in binary or memory: https://www.googleapis.com/auth/meetings
Source: manifest.json0.21.dr String found in binary or memory: https://www.googleapis.com/auth/plus.peopleapi.readwrite
Source: manifest.json.21.dr String found in binary or memory: https://www.googleapis.com/auth/sierra
Source: manifest.json.21.dr String found in binary or memory: https://www.googleapis.com/auth/sierrasandbox
Source: manifest.json0.21.dr String found in binary or memory: https://www.googleapis.com/auth/userinfo.email
Source: 4a93eb66-30ba-4de3-8ea0-312ddb38039b.tmp.22.dr, 1704ca54-9349-4cf0-ac97-9bff9f5ae3ef.tmp.22.dr String found in binary or memory: https://www.gstatic.com
Source: manifest.json0.21.dr String found in binary or memory: https://www.gstatic.com;
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://zeginuvo.weebly.com/uploads/1/3/0/7/130775519/vapajukaba.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://zeginuvo.weebly.com/uploads/1/3/0/7/130775519/vapajukaba.pdf)
Source: AcroRd32.exe, 00000002.00000002.424349766.000000000B7AE000.00000004.00000001.sdmp String found in binary or memory: https://zopugazuf.weebly.com/uploads/1/3/4/6/134658021/6123242.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://zopugazuf.weebly.com/uploads/1/3/4/6/134658021/6123242.pdf)
Source: AcroRd32.exe, 00000002.00000002.423954231.000000000B595000.00000004.00000001.sdmp String found in binary or memory: https://zoxiniguve.weebly.com/uploads/1/3/4/5/134584112/lunopamug_wemezuvulezurob.pdf
Source: reflective_practice_template_nhs[1].pdf String found in binary or memory: https://zoxiniguve.weebly.com/uploads/1/3/4/5/134584112/lunopamug_wemezuvulezurob.pdf)
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49742
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49742 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: classification engine Classification label: sus22.winPDF@50/263@4/7
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://genigudepa.weebly.com/uploads/1/3/1/0/131070712/kasodopizafazakoxuk.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://cdn.sqhk.co/kilatelazobe/jetdOgd/retro_fridge_with_water_dispenser.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://cdn.sqhk.co/potexunajo/Qjajchj/hitman_2_silent_assassin_cheats.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://traffking.ru/square?utm_term=reflective+practice+template+nhs
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://pumoguviponurin.weebly.com/uploads/1/3/4/7/134773216/miretigegurugi.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://tipefejiri.weebly.com/uploads/1/3/0/9/130969755/buwobu.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://cdn.sqhk.co/kapopajij/WiinigQ/protozoa_vs_bacteria_vs_virus_size.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://cdn.sqhk.co/ludibipimilu/DhcRxOb/movie_software_for_windows_10.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://cdn.sqhk.co/ludibipimilu/dhcrxob/movie_software_for_windows_10.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://uploads.strikinglycdn.com/files/8c547329-0d1e-4dfa-b95f-2dc323cb86d4/world_war_one_weapons_crossword_answers.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://zopugazuf.weebly.com/uploads/1/3/4/6/134658021/6123242.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://zoxiniguve.weebly.com/uploads/1/3/4/5/134584112/lunopamug_wemezuvulezurob.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://cdn.sqhk.co/potexunajo/qjajchj/hitman_2_silent_assassin_cheats.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://nalabusapigo.weebly.com/uploads/1/3/2/7/132740218/4175162.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://wixotavu.weebly.com/uploads/1/3/4/7/134764887/2953325.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://zeginuvo.weebly.com/uploads/1/3/0/7/130775519/vapajukaba.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://wosufixojiniki.weebly.com/uploads/1/3/4/7/134720754/4081785.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://gofolepoxi.weebly.com/uploads/1/3/4/8/134882907/7674727.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://cdn.sqhk.co/kapopajij/wiinigq/protozoa_vs_bacteria_vs_virus_size.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://cdn.sqhk.co/kilatelazobe/jetdogd/retro_fridge_with_water_dispenser.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://uploads.strikinglycdn.com/files/4371836f-f017-4f30-9831-11554ca34703/botunuxojok.pdf
Source: reflective_practice_template_nhs[1].pdf Initial sample: https://najijufo.weebly.com/uploads/1/3/4/7/134714833/peguloxufera_kudulavigiwub.pdf
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe File created: C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe File created: C:\Users\user\AppData\Local\Temp\acrord32_sbx Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe File read: C:\Program Files (x86)\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' 'C:\Users\user\Desktop\reflective_practice_template_nhs[1].pdf'
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 'C:\Users\user\Desktop\reflective_practice_template_nhs[1].pdf'
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --backgroundcolor=16514043
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --touch-events=enabled --field-trial-handle=1588,5207695692286208694,13668873235774985554,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=4477307787754487931 --lang=en-US --disable-pack-loading --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.12.20035 Chrome/80.0.0.0' --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4477307787754487931 --renderer-client-id=2 --mojo-platform-channel-handle=1716 --allow-no-sandbox-job /prefetch:1
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --field-trial-handle=1588,5207695692286208694,13668873235774985554,131072 --disable-features=VizDisplayCompositor --disable-pack-loading --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.12.20035 Chrome/80.0.0.0' --lang=en-US --gpu-preferences=KAAAAAAAAACAAwABAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --service-request-channel-token=5528301929327232026 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --touch-events=enabled --field-trial-handle=1588,5207695692286208694,13668873235774985554,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=9756364306558423637 --lang=en-US --disable-pack-loading --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.12.20035 Chrome/80.0.0.0' --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9756364306558423637 --renderer-client-id=4 --mojo-platform-channel-handle=1824 --allow-no-sandbox-job /prefetch:1
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --touch-events=enabled --field-trial-handle=1588,5207695692286208694,13668873235774985554,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=7523555841818072242 --lang=en-US --disable-pack-loading --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.12.20035 Chrome/80.0.0.0' --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=7523555841818072242 --renderer-client-id=5 --mojo-platform-channel-handle=2224 --allow-no-sandbox-job /prefetch:1
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized --enable-automation -- 'https://traffking.ru/square?utm_term=reflective+practice+template+nhs'
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1560,17001144406219017590,14380291932932443674,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1824 /prefetch:8
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 'C:\Users\user\Desktop\reflective_practice_template_nhs[1].pdf' Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --backgroundcolor=16514043 Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --start-maximized --enable-automation -- 'https://traffking.ru/square?utm_term=reflective+practice+template+nhs' Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --touch-events=enabled --field-trial-handle=1588,5207695692286208694,13668873235774985554,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=4477307787754487931 --lang=en-US --disable-pack-loading --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.12.20035 Chrome/80.0.0.0' --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4477307787754487931 --renderer-client-id=2 --mojo-platform-channel-handle=1716 --allow-no-sandbox-job /prefetch:1 Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=gpu-process --field-trial-handle=1588,5207695692286208694,13668873235774985554,131072 --disable-features=VizDisplayCompositor --disable-pack-loading --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.12.20035 Chrome/80.0.0.0' --lang=en-US --gpu-preferences=KAAAAAAAAACAAwABAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --service-request-channel-token=5528301929327232026 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=' --type=renderer ' /prefetch:2 Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --touch-events=enabled --field-trial-handle=1588,5207695692286208694,13668873235774985554,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=9756364306558423637 --lang=en-US --disable-pack-loading --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.12.20035 Chrome/80.0.0.0' --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9756364306558423637 --renderer-client-id=4 --mojo-platform-channel-handle=1824 --allow-no-sandbox-job /prefetch:1 Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe' --type=renderer --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --touch-events=enabled --field-trial-handle=1588,5207695692286208694,13668873235774985554,131072 --disable-features=VizDisplayCompositor --disable-gpu-compositing --service-pipe-token=7523555841818072242 --lang=en-US --disable-pack-loading --log-file='C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log' --log-severity=disable --product-version='ReaderServices/19.12.20035 Chrome/80.0.0.0' --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=7523555841818072242 --renderer-client-id=5 --mojo-platform-channel-handle=2224 --allow-no-sandbox-job /prefetch:1 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe 'C:\Program Files\Google\Chrome\Application\chrome.exe' --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1560,17001144406219017590,14380291932932443674,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1824 /prefetch:8 Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe File opened: C:\Windows\SysWOW64\Msftedit.dll Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Directory created: C:\Program Files\Google\Chrome\Application\Dictionaries\en-US-9-0.bdic Jump to behavior
Source: reflective_practice_template_nhs[1].pdf Initial sample: PDF keyword /JS count = 0
Source: reflective_practice_template_nhs[1].pdf Initial sample: PDF keyword /JavaScript count = 0
Source: reflective_practice_template_nhs[1].pdf Initial sample: PDF keyword /EmbeddedFile count = 0
Source: reflective_practice_template_nhs[1].pdf Initial sample: PDF keyword obj count = 59
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX Jump to behavior
Source: AcroRd32.exe, 00000002.00000002.427413592.000000000D56B000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

Anti Debugging:

barindex
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Code function: 2_2_05016003 LdrInitializeThunk, 2_2_05016003
Source: AcroRd32.exe, 00000002.00000002.405093312.0000000005940000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: AcroRd32.exe, 00000002.00000002.405093312.0000000005940000.00000002.00000001.sdmp Binary or memory string: Progman
Source: AcroRd32.exe, 00000002.00000002.405093312.0000000005940000.00000002.00000001.sdmp Binary or memory string: SProgram Managerl
Source: AcroRd32.exe, 00000002.00000002.405093312.0000000005940000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd,
Source: AcroRd32.exe, 00000002.00000002.405093312.0000000005940000.00000002.00000001.sdmp Binary or memory string: Progmanlock
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 404286 Sample: reflective_practice_templat... Startdate: 04/05/2021 Architecture: WINDOWS Score: 22 41 Machine Learning detection for sample 2->41 7 AcroRd32.exe 15 43 2->7         started        process3 process4 9 RdrCEF.exe 55 7->9         started        12 chrome.exe 15 501 7->12         started        14 AcroRd32.exe 10 7 7->14         started        dnsIp5 35 192.168.2.1 unknown unknown 9->35 16 RdrCEF.exe 9->16         started        19 RdrCEF.exe 9->19         started        21 RdrCEF.exe 9->21         started        23 RdrCEF.exe 9->23         started        37 239.255.255.250 unknown Reserved 12->37 25 chrome.exe 17 12->25         started        39 traffking.ru 14->39 process6 dnsIp7 27 80.0.0.0 NTLGB United Kingdom 16->27 29 googlehosted.l.googleusercontent.com 216.58.212.129, 443, 49742 GOOGLEUS United States 25->29 31 a.nel.cloudflare.com 35.190.80.1, 443, 49731 GOOGLEUS United States 25->31 33 3 other IPs or domains 25->33
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
216.58.212.129
googlehosted.l.googleusercontent.com United States
15169 GOOGLEUS false
239.255.255.250
unknown Reserved
unknown unknown false
172.67.171.190
traffking.ru United States
13335 CLOUDFLARENETUS false
35.190.80.1
a.nel.cloudflare.com United States
15169 GOOGLEUS false
80.0.0.0
unknown United Kingdom
5089 NTLGB false

Private

IP
192.168.2.1
127.0.0.1

Contacted Domains

Name IP Active
a.nel.cloudflare.com 35.190.80.1 true
traffking.ru 172.67.171.190 true
googlehosted.l.googleusercontent.com 216.58.212.129 true
clients2.googleusercontent.com unknown unknown