File name:

1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245

Full analysis: https://app.any.run/tasks/00eaf57d-ea82-4236-8e93-e2c2cfbb362f
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: May 10, 2025, 01:45:19
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
evasion
auto-startup
ultravnc
rmm-tool
exfiltration
agenttesla
purecrypter
netreactor
smtp
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

01D7AAC1D4DA848E13BC8992B18DFF0B

SHA1:

0C5C43596E3CA97954A5EB3C014AB3FFB5A9974B

SHA256:

1601868B52E7858AADF8F37A26D720FCD2CE0697CDEFEE537BF17C12879D6245

SSDEEP:

49152:R95PcM90MziWtvhy3QP43E68NV/x2NIcWk0Mecz9yhHMle0J5MtXvWw3LjlyoXW+:R9l3ziWqQP5NB2NUFczE6o8MRWw3NyOD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 7492)
      • oiqlere.exe (PID: 8044)
    • PURECRYPTER has been detected (YARA)

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
    • Create files in the Startup directory

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
    • Actions looks like stealing of personal data

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 8044)
    • Steals credentials from Web Browsers

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 8044)
    • AGENTTESLA has been detected (YARA)

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
    • AGENTTESLA has been detected (SURICATA)

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 8044)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
    • Executable content was dropped or overwritten

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 7220)
    • Connects to SMTP port

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 8044)
    • Checks for external IP

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 8044)
  • INFO

    • Checks supported languages

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 7492)
      • oiqlere.exe (PID: 8044)
    • Reads the computer name

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 8044)
      • oiqlere.exe (PID: 7492)
    • Reads the machine GUID from the registry

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 7492)
      • oiqlere.exe (PID: 8044)
    • Creates files or folders in the user directory

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
    • Auto-launch of the file from Startup directory

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
    • Manual execution by a user

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • wscript.exe (PID: 7220)
      • oiqlere.exe (PID: 8044)
    • Disables trace logs

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 8044)
    • Create files in a temporary directory

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
    • Process checks computer location settings

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
    • .NET Reactor protector has been detected

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 1628)
    • Application launched itself

      • Acrobat.exe (PID: 5544)
      • AcroCEF.exe (PID: 5548)
    • Checks proxy server information

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 8044)
    • Reads the software policy settings

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 8044)
      • slui.exe (PID: 2384)
    • ULTRAVNC has been detected

      • 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe (PID: 3140)
      • oiqlere.exe (PID: 8044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AgentTesla

(PID) Process(3140) 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe
Protocolsmtp
Host162.254.34.31
Port587
PasswordABwuRZS5Mjh5
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:28 10:04:51+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 1264128
InitializedDataSize: 18944
UninitializedDataSize: -
EntryPoint: 0x13684e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 135.0.7049.115
ProductVersionNumber: 135.0.7049.115
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: Google Chrome
CompanyName: Google LLC
FileDescription: Google Chrome
FileVersion: 135.0.7049.115
InternalName: MT034413808.exe
LegalCopyright: Copyright 2025 Google LLC. All rights reserved.
LegalTrademarks: -
OriginalFileName: MT034413808.exe
ProductName: Google Chrome
ProductVersion: 135.0.7049.115
AssemblyVersion: 135.0.7049.115
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
20
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #PURECRYPTER 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe sppextcomobj.exe no specs slui.exe acrobat.exe acrobat.exe no specs #AGENTTESLA 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe acrocef.exe no specs acrocef.exe no specs wscript.exe no specs acrocef.exe no specs oiqlere.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs #AGENTTESLA oiqlere.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
900"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --log-severity=disable --user-agent-product="ReaderServices/23.1.20093 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2092 --field-trial-handle=1388,i,8828929869173011043,611613081145679666,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeAcroCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe AcroCEF
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrocef_1\acrocef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1628"C:\Users\admin\AppData\Local\Temp\1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe" C:\Users\admin\AppData\Local\Temp\1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
4294967295
Version:
135.0.7049.115
Modules
Images
c:\users\admin\appdata\local\temp\1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2040"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=gpu-process --log-severity=disable --user-agent-product="ReaderServices/23.1.20093 Chrome/105.0.0.0" --lang=en-US --gpu-preferences=UAAAAAAAAADgACAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=1560 --field-trial-handle=1388,i,8828929869173011043,611613081145679666,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:2C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeAcroCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe AcroCEF
Exit code:
0
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrocef_1\acrocef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2384"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3140"C:\Users\admin\AppData\Local\Temp\1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe"C:\Users\admin\AppData\Local\Temp\1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
135.0.7049.115
Modules
Images
c:\users\admin\appdata\local\temp\1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
AgentTesla
(PID) Process(3140) 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe
Protocolsmtp
Host162.254.34.31
Port587
PasswordABwuRZS5Mjh5
5304C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5400C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5544"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\admin\AppData\Local\Temp\Best_Ways_to_Safeguard_Your_Email.pdf"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrobat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5548"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16514043C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeAcrobat.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe AcroCEF
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrocef_1\acrocef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5772"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" --type=renderer /prefetch:1 "C:\Users\admin\AppData\Local\Temp\Best_Ways_to_Safeguard_Your_Email.pdf"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeAcrobat.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrobat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
18 703
Read events
18 572
Write events
129
Delete events
2

Modification events

(PID) Process:(5544) Acrobat.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-2034283098-2252572593-1072577386-2659511007-3245387615-27016815-3920691934
Operation:writeName:DisplayName
Value:
Adobe Acrobat Reader Protected Mode
(PID) Process:(1628) 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithProgids
Operation:writeName:Acrobat.Document.DC
Value:
(PID) Process:(5772) Acrobat.exeKey:HKEY_CURRENT_USER\SOFTWARE\Adobe\Adobe Acrobat\DC\ExitSection
Operation:writeName:bLastExitNormal
Value:
0
(PID) Process:(3140) 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3140) 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(3140) 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3140) 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3140) 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(3140) 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3140) 1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
1
Suspicious files
178
Text files
10
Unknown types
2

Dropped files

PID
Process
Filename
Type
16281601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exeC:\Users\admin\AppData\Local\Temp\Best_Ways_to_Safeguard_Your_Email.pdfpdf
MD5:F220908566ECF72B1A18A14D8B32A10E
SHA256:F3D17A5A93DC3A62B97F14A38ACB1521F8A5BC5927AF32A0F157CBF8B1032790
5544Acrobat.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lstbinary
MD5:366B140BAFC863B7E366AA1E51604759
SHA256:CBC8B288DBD2C72432081CF33CEF431572A94C7FB89DBCD59973B99E3871814E
5548AcroCEF.exeC:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old~RF10f80e.TMPtext
MD5:D012E5B4EB91B61F6E8AE2F8EC3C623E
SHA256:1BDA750084F20306722008016420E1912BA608CA8EFB9C661F7E7EFCF5E89673
5548AcroCEF.exeC:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.oldtext
MD5:2EF1F7C0782D1A46974286420D24F629
SHA256:D3A9BB7E09E1F4B0C41FF7808E930DDACF5DB3BACD98ECCF5BC7DB4863D1FCF5
5772Acrobat.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.5772ps
MD5:366B140BAFC863B7E366AA1E51604759
SHA256:CBC8B288DBD2C72432081CF33CEF431572A94C7FB89DBCD59973B99E3871814E
5548AcroCEF.exeC:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old~RF10fabd.TMPtext
MD5:7383516745DEC1E86152192435F92D1F
SHA256:E22D34BBD915EEB277D4F4138D176EACE5577CF035EF7C2C80A4BC4D9B6C0E1D
5772Acrobat.exeC:\Users\admin\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.1.20093.6 2025-05-10 01-45-43-085.logtext
MD5:460C6041966002D8384A18C895A65EB0
SHA256:C83EC6E8FB3EC62481289C033238C1D9B08DB8076EAAD304099FD7A7F594F1B9
5548AcroCEF.exeC:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0binary
MD5:45020A9B140EEFD446291BC2AD407558
SHA256:A9D3B48760FFF0BDFBA444C3A9442421ABAB7DA96D5BE25B7B579748E7B0F8BC
5548AcroCEF.exeC:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old~RF10fa50.TMPtext
MD5:ED7D8AAE48211E2BFAF557130572C62A
SHA256:A5CF8D8ADC86DCA357396AF7E3A24A116072D5C1E5552EEB76601AE2673DED6E
5772Acrobat.exeC:\Users\admin\AppData\Local\Adobe\Acrobat\DC\SharedDataEventssqlite
MD5:DDCA557B3EC20084FC622B365A2B148E
SHA256:555ABA4F5F5BDCFA5780C4B8F5726992582AB4C2CC5B51EAC51853E1F37A17A4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
28
DNS requests
21
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2104
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7888
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7888
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5544
Acrobat.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAfy81yHqHeveu%2FpR5k1Jb0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2104
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
3140
1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe
104.26.13.205:443
api.ipify.org
CLOUDFLARENET
US
shared
3140
1601868b52e7858aadf8f37a26d720fcd2ce0697cdefee537bf17c12879d6245.exe
162.254.34.31:587
NAMECHEAP-NET
US
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
login.live.com
  • 40.126.32.138
  • 20.190.160.67
  • 40.126.32.140
  • 20.190.160.22
  • 40.126.32.136
  • 20.190.160.2
  • 20.190.160.5
  • 40.126.32.76
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
api.ipify.org
  • 104.26.13.205
  • 172.67.74.152
  • 104.26.12.205
shared
geo2.adobe.com
  • 2.19.104.203
whitelisted
p13n.adobe.io
  • 107.22.247.231
  • 54.144.73.197
  • 18.207.85.246
  • 34.193.227.236
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
A Network Trojan was detected
STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP)
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
A Network Trojan was detected
STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP)
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
A Network Trojan was detected
ET MALWARE AgentTesla Exfil Via SMTP
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
A Network Trojan was detected
ET MALWARE AgentTesla Exfil Via SMTP
No debug info