flash

Preview.exe

Status: finished
Submission Time: 24.09.2020 18:02:18
Malicious
Trojan
Evader
Bazar

Comments

Tags

  • exe

Details

  • Analysis ID:
    289653
  • API (Web) ID:
    474412
  • Analysis Started:
    24.09.2020 18:02:18
  • Analysis Finished:
    24.09.2020 18:15:41
  • MD5:
    8e7b76532c0bb541c727861f74a0b618
  • SHA1:
    ef0d327aa5969f8ad65ddb7f605d645e3270e64a
  • SHA256:
    9f7e4c52af1b8afcb06ca88cc726d1e4681b0f87683b04d175bb70be4363d345
  • Technologies:
Full Report Management Report Engine Info Verdict Score Reports

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211

malicious
64/100

System: Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run Condition: Run with higher sleep bypass

malicious
64/100

IPs

IP Country Detection
45.143.136.209
Russian Federation

URLs

Name Detection
https://45.143.136.209/api/v202X
https://45.143.136.209/api/v204;
https://45.143.136.209/api/v202
Click to see the 8 hidden entries
https://45.143.136.209/api/v204
https://45.143.136.209/api/v2040
https://45.143.136.209/
https://45.143.136.209/api/v2021
https://45.143.136.209/api/v204exe
https://45.143.136.209:443/api/v204
https://45.143.136.209/api/v2044
https://45.143.136.209:443/api/v202

Dropped files

Name File Type Hashes Detection
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Preview.exe_95c92d9d94e99c7af1ccecea2dce3ed315ad50_20972ef0_17bdec14\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD85D.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Sep 25 01:04:07 2020, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD9E.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
Click to see the 3 hidden entries
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDE99.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58446 bytes, 1 file
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#