Antiy-AVL_Adguard-4.0.79-Nightly-Mod-www.ReXdl.com.apk
This report is generated from a file or URL submitted to this webservice on September 29th 2022 22:29:51 (UTC)
Report generated by
Falcon Sandbox v9.4.0 © Hybrid Analysis
Incident Response
Risk Assessment
- Remote Access
- Contains a remote desktop related string
- Fingerprint
- Has the ability to identify network operator related data
- Evasive
- Has the ability to execute code after reboot
MITRE ATT&CK™ Techniques Detection
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Malicious Indicators 1
-
Installation/Persistence
-
Has the ability to execute code after reboot
- details
- Permission request for "android.permission.RECEIVE_BOOT_COMPLETED"
- source
- Static Parser
- relevance
- 10/10
- ATT&CK ID
- T1402 (Show technique in the MITRE ATT&CK™ matrix)
-
Has the ability to execute code after reboot
-
Suspicious Indicators 11
-
External Systems
-
Sample was identified as malicious by at least one Antivirus engine
- details
- 1/65 Antivirus vendors marked sample as malicious (1% detection rate)
- source
- External System
-
Sample was identified as malicious by at least one Antivirus engine
-
General
-
Found a potential E-Mail address in binary/memory
- details
-
Pattern match: "g.iv@.evd.mvb.cvf.kva.gve.o"
Pattern match: "paymc.tbs.h69@bkha.a"
Pattern match: "5a1199281ca343cbb08b41fce8ee6120@s10.adtidy.org"
Pattern match: "this@preview.parent" - source
- File/Memory
- relevance
- 3/10
- ATT&CK ID
- T1114 (Show technique in the MITRE ATT&CK™ matrix)
-
Has the ability to invoke native commands
- details
-
Found invoke in "com.adguard.android.filtering.commons.b.a.smali" to "java.lang.ProcessBuilder.start"
Found invoke in "com.adguard.android.filtering.commons.b.b.smali" to "java.lang.Runtime.exec" - source
- Static Parser
- relevance
- 3/10
-
Uses java reflection classes
- details
-
Found invoke in "kotlin.reflect.jvm.internal.t.smali" to "java.lang.reflect.Field.get"
Found invoke in "kotlin.reflect.jvm.internal.h$a$m.smali" to "java.lang.reflect.Field.get"
Found invoke in "kotlin.reflect.jvm.internal.calls.f.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "kotlin.reflect.jvm.internal.calls.g.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "kotlin.reflect.jvm.internal.calls.d$f$a.smali" to "java.lang.reflect.Field.get"
Found invoke in "kotlin.reflect.jvm.internal.calls.d$f.smali" to "java.lang.reflect.Field.get"
Found invoke in "kotlin.reflect.jvm.internal.calls.h.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "kotlin.reflect.jvm.internal.calls.d$h.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "kotlin.reflect.jvm.internal.calls.a$a.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "kotlin.coroutines.a.a.f.smali" to "java.lang.reflect.Field.get"
Found invoke in "kotlin.coroutines.a.a.a.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "kotlin.internal.a.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.adguard.corelibs.network.CoreNetworkUtils.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.adguard.kit.concurrent.b.a$1.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.adguard.android.ui.fragments.OutboundProxyListFragment.smali" to "java.lang.reflect.Field.get"
Found invoke in "com.adguard.android.filtering.commons.d.smali" to "java.lang.reflect.Method.invoke" - source
- Static Parser
- relevance
- 3/10
-
Found a potential E-Mail address in binary/memory
-
Installation/Persistence
-
Has the ability to access external storage
- details
-
Found invoke in "com.adguard.android.a.f.smali" to "android.os.Environment.getExternalStorageState"
Found invoke in "com.adguard.android.ui.utils.l.smali" to "android.os.Environment.getExternalStorageDirectory"
Found invoke in "com.adguard.android.ui.picker.FilePickerActivity.smali" to "android.os.Environment.getExternalStorageDirectory" - source
- Static Parser
- relevance
- 3/10
- ATT&CK ID
- T1420 (Show technique in the MITRE ATT&CK™ matrix)
-
Has the ability to access external storage
-
Network Related
-
Found potential IP address in binary/memory
- details
-
"94.140.14.140"
"94.140.14.141"
"198.18.53.53"
"8.8.8.8"
"3.1.26.1"
"176.103.130.130"
"94.140.14.14"
"176.103.130.131"
"94.140.15.15"
"176.103.130.132"
"94.140.14.15"
"176.103.130.134"
"94.140.15.16"
"176.103.130.136"
"176.103.130.137"
"127.0.0.1" - source
- File/Memory
- relevance
- 3/10
-
Has the ability to open an internet connection
- details
-
Found invoke in "com.adguard.kit.net.http.c$c.smali" to "java.net.URL.openConnection"
Found invoke in "com.adguard.kit.net.http.a.smali" to "java.net.URL.openConnection"
Found invoke in "com.adguard.kit.net.http.j$a.smali" to "java.net.URL.openConnection"
Found invoke in "com.adguard.android.a.u.smali" to "java.net.URL.openConnection"
Found invoke in "com.adguard.android.events.b.a.smali" to "java.net.URL.openConnection"
Found invoke in "com.adguard.android.filtering.commons.d.smali" to "java.net.Socket.connect" - source
- Static Parser
- relevance
- 3/10
-
Found potential IP address in binary/memory
-
Remote Access Related
-
Contains a remote desktop related string
- details
- "tosiStt)aic.aveeocevncc(yIasengLttir" (Indicator for product: Generic VNC)
- source
- File/Memory
- relevance
- 10/10
- ATT&CK ID
- T1021.001 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains a remote desktop related string
-
Hiding 3 Suspicious Indicators
- All indicators are available only in the private webservice or standalone version
-
Informative 8
-
General
-
Contains SQL queries
- details
-
"SELECT report_date FROM traffic_stats ORDER BY report_date LIMIT 1;"
"SELECT url, source_path, meta_path, enabled, last_update_time FROM userscripts;"
"INSERT OR REPLACE INTO userscripts (name, url, source_path, meta_path, enabled, last_update_time) VALUES (?, ?, ?, ?, ?, ?);"
"SELECT package_name, traffic_filtering, ad_blocking, https_filtering, firewall_notifications, mobile_data, wifi, mobile_data_screen_off, wifi_screen_off FROM app_rules WHERE package_name = ?;"
"SELECT package_name, traffic_filtering, ad_blocking, https_filtering, firewall_notifications, mobile_data, wifi, mobile_data_screen_off, wifi_screen_off FROM app_rules;"
"INSERT OR REPLACE INTO app_rules (package_name, traffic_filtering, ad_blocking, https_filtering, firewall_notifications, mobile_data, wifi, mobile_data_screen_off, wifi_screen_off) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?);"
"DELETE FROM app_rules;" - source
- File/Memory
- relevance
- 2/10
- ATT&CK ID
- T1213 (Show technique in the MITRE ATT&CK™ matrix)
-
Found API related strings
- details
-
"Beveiligingsinstellingen openen" (Indicator: "open")
"tres de suivi des URL. Vous devrez vous reconnecter de temps en temps" (Indicator: "connect")
"kk%1$s does not accept our certificate for HTTPS connection. You can ignore such errors for this application." (Indicator: "connect")
"bbAdGuard cannot create a VPN connection. It is possible that VPN is not supported by your firmware." (Indicator: "connect")
"__AdGuard will pause protection when you open the Samsung Pay application. Requires usage access." (Indicator: "open")
"..Allow AdGuard to send automatic crash reports." (Indicator: "send")
"55Allow AdGuard to send technical and interaction data." (Indicator: "send")
"<<Allow AdGuard to set up a VPN connection to start protection" (Indicator: "connect")
"TTAllow us to send you infrequent updates about AdGuard? You can unsubscribe any time." (Indicator: "send")
"^^Blocks Google Chrome from sending its version and modifications information to Google domains." (Indicator: "send")
"Check connection" (Indicator: "connect")
"Current selection: %1$s" (Indicator: "select")
"MMDecrypt secure (SSL/TLS) connections in order to block encrypted ad requests." (Indicator: "connect")
"PPDisable AdGuard automatic VPN reconfiguration when network connectivity changes." (Indicator: "connect")
"YYDisable AdGuard automatic restart functions when disconnecting/connecting to the network." (Indicator: "connect")
"WWDisable AdGuard automatic root proxy reconfiguration when network connectivity changes." (Indicator: "connect")
"Disconnect" (Indicator: "connect")
"Disconnected from %s" (Indicator: "connect")
"Error sending message" (Indicator: "send")
"]]Failed to open user settings. Please remove restricted user manually or select another option" (Indicator: "open") - source
- File/Memory
- relevance
- 1/10
-
Requires permissions only available to signed APKs
- details
- Found permission request for "android.permission.PACKAGE_USAGE_STATS"
- source
- Static Parser
- relevance
- 7/10
-
Tests the internet connectivity
- details
-
Found invoke in "com.adguard.corelibs.CoreLibs$NetworkReceiver$1.smali" to "android.net.NetworkInfo.isConnected"
Found invoke in "com.adguard.corelibs.network.CoreNetworkUtils$1.smali" to "android.net.ConnectivityManager.getNetworkInfo"
Found invoke in "com.adguard.corelibs.network.CoreNetworkUtils.smali" to "android.net.ConnectivityManager.getNetworkInfo"
Found invoke in "com.adguard.corelibs.network.CoreNetworkUtils.smali" to "android.net.NetworkInfo.isConnectedOrConnecting"
Found invoke in "com.adguard.corelibs.network.CoreNetworkUtils.smali" to "android.net.ConnectivityManager.getActiveNetworkInfo"
Found invoke in "com.adguard.android.receivers.a.smali" to "android.net.NetworkInfo.isConnectedOrConnecting"
Found invoke in "com.adguard.android.receivers.a.smali" to "android.net.NetworkInfo.isConnected"
Found invoke in "com.adguard.android.a.p.smali" to "android.net.ConnectivityManager.getActiveNetworkInfo"
Found invoke in "com.adguard.android.a.p.smali" to "android.net.NetworkInfo.isConnected"
Found invoke in "com.adguard.android.filtering.commons.b.smali" to "android.net.NetworkInfo.isConnectedOrConnecting"
Found invoke in "com.adguard.android.filtering.commons.b.smali" to "android.net.wifi.WifiManager.getConnectionInfo"
Found invoke in "com.adguard.android.filtering.commons.d.smali" to "android.net.NetworkInfo.isConnectedOrConnecting"
Found invoke in "com.adguard.android.filtering.commons.d.smali" to "android.net.NetworkInfo.isConnected"
Found invoke in "com.adguard.android.filtering.commons.d.smali" to "android.net.ConnectivityManager.getActiveNetworkInfo" - source
- Static Parser
- relevance
- 3/10
- ATT&CK ID
- T1421 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains SQL queries
-
Installation/Persistence
-
Dropped files
- details
-
"AndroidManifest.xml" has type "Android binary XML"- [targetUID: N/A]
"BALA.RSA" has type "data"- [targetUID: N/A]
"BALA.SF" has type "ASCII text with CRLF line terminators"- [targetUID: N/A]
"MANIFEST.MF" has type "ASCII text with CRLF line terminators"- [targetUID: N/A]
"androidsupportmultidexversion.txt" has type "ASCII text"- [targetUID: N/A]
"browsers.txt" has type "ASCII text"- [targetUID: N/A]
"default_tracking_params.txt" has type "ASCII text"- [targetUID: N/A]
"enforce_https_filtering_apps.txt" has type "ASCII text"- [targetUID: N/A]
"enforce_https_filtering_apps_problematic_devices.txt" has type "ASCII text"- [targetUID: N/A]
"java-header-style.xml" has type "XML 1.0 document ASCII text"- [targetUID: N/A]
"kotlin.reflect.jvm.internal.impl.builtins.BuiltInsLoader" has type "ASCII text with no line terminators"- [targetUID: N/A]
"kotlin.reflect.jvm.internal.impl.resolve.ExternalOverridabilityCondition" has type "ASCII text"- [targetUID: N/A]
"kotlinx.coroutines.CoroutineExceptionHandler" has type "ASCII text with no line terminators"- [targetUID: N/A]
"kotlinx.coroutines.internal.MainDispatcherFactory" has type "ASCII text with no line terminators"- [targetUID: N/A]
"libadguard-core.so" has type "ELF 32-bit LSB shared object Intel 80386 version 1 (SYSV) dynamically linked BuildID[sha1]=1355f3cfbd76a45f7f025592c22b5626848392a0 stripped"- [targetUID: N/A]
"libadguard-core.so_1664490639880" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked BuildID[sha1]=14b5cfe1ebc9c0bc561555c5415d68b269800e3b stripped"- [targetUID: N/A]
"libadguard-core.so_1664490639881" has type "ELF 64-bit LSB shared object x86-64 version 1 (SYSV) dynamically linked BuildID[sha1]=ac3e35831a7058e88f21f74fc23cf792802f5416 stripped"- [targetUID: N/A]
"libadguard-core.so_1664490639883" has type "ELF 64-bit LSB shared object ARM aarch64 version 1 (SYSV) dynamically linked BuildID[sha1]=bdffd5974ec566e5301a661f6615ccc255830f2a stripped"- [targetUID: N/A]
"libadguard-dns.so" has type "ELF 32-bit LSB shared object Intel 80386 version 1 (SYSV) dynamically linked BuildID[sha1]=3f547c483e5be9cf29803121f393f3efb4715378 stripped"- [targetUID: N/A]
"libadguard-dns.so_1664490639880" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked BuildID[sha1]=dcb00fe3b3543d9f93c349779467df785b9a2809 stripped"- [targetUID: N/A] - source
- Binary File
- relevance
- 3/10
-
Dropped files
-
Network Related
-
Found potential URL in binary/memory
- details
-
Heuristic match: "+0aPo6.mR"
Heuristic match: "assets/install.id"
Heuristic match: ")]^Lnn.FJ"
Heuristic match: "lib/arm64-v8a/libadguard-core.so"
Heuristic match: "lib/arm64-v8a/libadguard-dns.so"
Heuristic match: "lib/arm64-v8a/libio_utils.so"
Heuristic match: "lib/x86/libadguard-core.so"
Heuristic match: "lib/x86/libadguard-dns.so"
Heuristic match: "lib/x86/libio_utils.so"
Heuristic match: "lib/x86_64/libadguard-core.so"
Heuristic match: "6w<~U$.tt"
Heuristic match: "6FhpJ5I.Vi"
Heuristic match: "lib/x86_64/libadguard-dns.so"
Heuristic match: "MZ;;.nf"
Heuristic match: "lib/x86_64/libio_utils.so"
Heuristic match: "kotlin.reflect.jvm.internal.ad"
Heuristic match: "kotlin.Int"
Heuristic match: "valueParameter.name"
Heuristic match: "it.name"
Heuristic match: "java.io"
Heuristic match: "functionDescriptor.name"
Heuristic match: "descriptor.name"
Pattern match: "https://link.adtidy.org/forward.html?action=faq&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=kb_automation&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=background_work&app=android"
Heuristic match: "d=dsoodnhair/:kpdrnntcysar=aaibiho.rrestigvnto&kp/po_.r_tpldiddlaftw/.mo"
Pattern match: "https://link.adtidy.org/forward.html?action=kb_dns_providers&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=kb_samsung_pay_ko&app=android"
Pattern match: "ircttr.nis/_wpi.notlnrcorpotlrtyed.dm&t"
Pattern match: "https://link.adtidy.org/forward.html?action=kb_restricted_account&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=kb_firefox_certificates&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=stealth_mode&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=create_your_own_filters&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=dns_filtering_syntax&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=outbound_proxy&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=userscripts&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=eula&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=privacy&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=adguard_vpn&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=adguard_cert_module&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=discuss&app=android"
Pattern match: "https://mobile-api.adguard.org"
Pattern match: "fa.dc/tkoi.tpbm"
Pattern match: "https://link.adtidy.org/forward.html?action=report&app=android&from=feedback"
Pattern match: "https://filters.adtidy.org/android/filters_i18n.js"
Pattern match: "https://filters.adtidy.org/android/filters/{0}_optimized.txt"
Pattern match: "https://filters.adtidy.org/android/filters.js"
Pattern match: "https://link.adtidy.org/forward.html?action=purchase&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=renew&app=android&key={0"
Pattern match: "https://mobile-api.adguard.org/api/1.0/requesttrial.html?app_name=adguard_android&key=4DDBE80A3DA94D819A00523252FB6380"
Pattern match: "https://auth.adguard.org/oauth/authorize?client_id={0}&response_type={1}&state={2}&scope={3}&redirect_uri={4}&social_provider={5"
Pattern match: "https://api.adguard.org/account/api/1.0/account/info"
Pattern match: "https://mobile-api.adguard.org/api/1.0/status.html?key=4DDBE80A3DA94D819A00523252FB6380&app_name=adguard_android"
Pattern match: "ba.jsi/ti0/oafnp"
Pattern match: "https://link.adtidy.org/forward.html?action=account&app=android"
Pattern match: "https://auth.adguard.org/oauth/token"
Pattern match: "https://api.adguard.org/account/api/1.0/products/licenses/application.json?app_name=adguard_android"
Pattern match: "https://4ad379578f284b35843cc02b06e369b0:5a1199281ca343cbb08b41fce8ee6120@s10.adtidy.org/40?uncaught.handler.enabled=false&stacktrace.app.packages=com.adguard&maxmessagelength=500000"
Pattern match: "emdchn..mea/st/utpsaapirdbto/./:g1"
Pattern match: "https://events.adguard.com/api/1.0/submit"
Pattern match: "https://link.adtidy.org/forward.html?action=dns_filtering&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=faq_apps_conflicts&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=kb_https_filtering&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=acknowledgments&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=versionhistory&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=home&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=battery_info&app=android"
Pattern match: "ctisr.ad/kral?p=ydt/"
Pattern match: "https://link.adtidy.org/forward.html?action=faq_firewall&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=faq_conflict_tethering&app=android"
Pattern match: "https://link.adtidy.org/forward.html?action=faq_not_support_browsers&app=android"
Heuristic match: "lib/build/libs/adguard-core/shared/libadguard-core.so"
Heuristic match: "lib/libs/libadguard-core.so"
Heuristic match: "build/libs/adguard-core/shared/libadguard-core.so"
Heuristic match: "libs/libadguard-core.so"
Heuristic match: "subscriber::class.java.name"
Heuristic match: "subscriberClass.name"
Heuristic match: "method.name"
Heuristic match: "ie.midczo..tIgeonMmaatdrnegurgeiodtrkacar.vi"
Heuristic match: "dcDAooKCinGDrdotinetaEAPt_n.Eni..AD"
Pattern match: "uedjdpls..it/tr-e1"
Pattern match: "https://userscripts.adtidy.org/release/adguard-extra/1.0/adguard-extra.user.js"
Pattern match: "https://userscripts.adtidy.org/release/disable-amp/1.0/disable-amp.user.js"
Heuristic match: "uCcoli(tpg)neitirlo.ufneasBndrisl.eg"
Heuristic match: "install.id"
Pattern match: "https://www.youtube.com/watch?v="
Pattern match: "n.s6eer.xe/neScreitLtfruev20catenveInpaSroig"
Heuristic match: "^(?:http|https)://subscribe\\.adblockplus\\.org/([^&]+).*"
Heuristic match: "android.intent.extra.shortcut.NAME"
Heuristic match: "ia.goBtntAEnPdoLyirtOnorNeEac.de"
Heuristic match: "Rini_(rteBwpd.ae)flewIvyyVi.id"
Pattern match: "https://youtu.be/"
Pattern match: "https://f-droid.org/repository/browse/?fdid=org.torproject.android"
Heuristic match: "/e.id"
Heuristic match: "com.adguard.android.filtering.io"
Pattern match: "www.google.com"
Pattern match: "http://www.apache.org/licenses/LICENSE-2.0"
Heuristic match: "Name: assets/install.id"
Heuristic match: "Name: lib/arm64-v8a/libadguard-core.so"
Heuristic match: "Name: lib/arm64-v8a/libadguard-dns.so"
Heuristic match: "Name: lib/arm64-v8a/libio_utils.so"
Heuristic match: "Name: lib/x86/libadguard-core.so"
Heuristic match: "Name: lib/x86/libadguard-dns.so"
Heuristic match: "Name: lib/x86/libio_utils.so"
Heuristic match: "Name: lib/x86_64/libadguard-core.so"
Heuristic match: "Name: lib/x86_64/libadguard-dns.so"
Heuristic match: "Name: lib/x86_64/libio_utils.so"
Heuristic match: "Name: res/drawable-hdpi/abc_textfield_search_activated_mtrl_alpha.9.pn"
Heuristic match: "Name: res/drawable-mdpi/abc_textfield_search_activated_mtrl_alpha.9.pn"
Heuristic match: "Name: res/drawable-xxhdpi/abc_textfield_search_default_mtrl_alpha.9.pn"
Heuristic match: "Name: res/drawable-xxxhdpi/abc_scrubber_control_to_pressed_mtrl_000.pn"
Heuristic match: "Name: res/drawable-xxxhdpi/abc_scrubber_control_to_pressed_mtrl_005.pn"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/187"
Heuristic match: "com.dolphin.browser.id"
Heuristic match: "com.mmbox.xbrowser.pro"
Heuristic match: "com.boatbrowser.free.addon.th"
Heuristic match: "com.boatbrowser.free.addon.pm"
Heuristic match: "com.boatbrowser.free.addon.us"
Heuristic match: "mark.via.gp"
Pattern match: "https://play.google.com/store/apps/details?id=com.rtsw.easydownloader"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/316"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/449"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/488"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/537"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/708"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/757"
Pattern match: "http://4pda.ru/forum/index.php?s=&showtopic=601691&view=findpost&p=58805939"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/808"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/862"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/922"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/3401"
Pattern match: "https://jira.adguard.com/browse/AG-2265"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/1285"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/1303"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/1426"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/1530"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/1660"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/1821"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/2067"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/2416"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/2585"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/2680"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/3061"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/3400"
Pattern match: "https://github.com/AdguardTeam/AdguardForAndroid/issues/3175"
Pattern match: "https://jira.adguard.com/browse/AG-1402"
Pattern match: "https://jira.adguard.com/browse/AG-1865"
Pattern match: "https://jira.adguard.com/browse/AG-2199"
Pattern match: "https://jira.adguard.com/browse/AG-1947"
Pattern match: "https://jira.adguard.com/browse/AG-2716"
Pattern match: "https://jira.adguard.com/browse/AG-3245" - source
- File/Memory
- relevance
- 10/10
-
Possibly tries to communicate over SSL connection (HTTPS)
- details
- "IP, sdns://, https:// or tls://" (Indicator: "https://")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1573 (Show technique in the MITRE ATT&CK™ matrix)
-
Found potential URL in binary/memory
-
Spyware/Information Retrieval
-
Found a reference to a known community page
- details
-
"QQAdGuard will clear YouTube app data on booting. Required for YouTube ad blocking." (Indicator: "youtube")
";;Enforces safe search for popular search engines and YouTube" (Indicator: "youtube")
"33Notifications that let you manage YouTube playback." (Indicator: "youtube")
"Open video in YouTube" (Indicator: "youtube")
"TWITTER" (Indicator: "twitter")
"twitter" (Indicator: "twitter")
"https://www.youtube.com/watch?v=" (Indicator: "youtube")
"PayPal" (Indicator: "paypal")
"youTubePlayer" (Indicator: "youtube")
"onboarding_youtube" (Indicator: "youtube")
"ServiceLocator.getInstance(this@YoutubeActivity)" (Indicator: "youtube")
"com.adguard.youtube.TOGGLE_PLAYBACK" (Indicator: "youtube")
"com.adguard.youtube.STOP_PLAYBACK" (Indicator: "youtube")
"youTubePlayerView" (Indicator: "youtube")
"Enforces safe search for popular search engines and YouTube" (Indicator: "youtube")
"Name: res/drawable-anydpi/ayp_ic_youtube_24dp.xml" (Indicator: "youtube")
"Name: res/drawable-hdpi/ayp_ic_youtube_24dp.png" (Indicator: "youtube")
"Name: res/drawable-ldpi/ayp_ic_youtube_24dp.png" (Indicator: "youtube")
"Name: res/drawable-mdpi/ayp_ic_youtube_24dp.png" (Indicator: "youtube")
"Name: res/drawable-xhdpi/ayp_ic_youtube_24dp.png" (Indicator: "youtube") - source
- File/Memory
- relevance
- 7/10
-
Found a reference to a known community page
File Details
Antiy-AVL_Adguard-4.0.79-Nightly-Mod-www.ReXdl.com.apk
- Filename
- Antiy-AVL_Adguard-4.0.79-Nightly-Mod-www.ReXdl.com.apk
- Size
- 36MiB (37675420 bytes)
- Type
- android
- Description
- Zip archive data, at least v2.0 to extract
- Architecture
- SHA256
- 4b62c1a7e18ab3ab774737cb701c4f20b7221ffdbb7d714e3a0369d979fa9e4d
- MD5
- cef01202edb4bd5872763b17ba94090b
- SHA1
- f4b9888232fc72567c43682664c4ef2b94dfa558
- ssdeep
-
786432:1TSpN1reeihEJ4WRBbDn7GJHPXgJ26Nntmz5DH2Oit018d7U:E1ihEJjnCG20gb2lt018+
Version Info
- Minimum SDK
- 21 (Lollipop)
- Target SDK
- 29 ()
- Version Code
- 10000589
- Version Name
- 4.0.79
- Package Name
- com.adguard.android
- Entrypoint
- com.adguard.androidcom.adguard.android.ui.MainActivity
File Permissions
| Permission | Description |
|---|---|
| android.permission.WAKE_LOCK | Allows using PowerManager WakeLocks to keep processor from sleeping or screen from dimming. |
| android.permission.INTERNET | Allows applications to open network sockets. |
| android.permission.ACCESS_NETWORK_STATE | Allows applications to access information about networks. |
| android.permission.ACCESS_WIFI_STATE | Allows applications to access information about Wi-Fi networks. |
| android.permission.RECEIVE_BOOT_COMPLETED | Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting. |
| android.permission.READ_EXTERNAL_STORAGE | Allows an application to read from external storage. |
| android.permission.WRITE_EXTERNAL_STORAGE | Allows an application to write to external storage. |
| android.permission.GET_TASKS | This constant was deprecated in API level 21. No longer enforced. |
| android.permission.FOREGROUND_SERVICE | - |
| android.permission.VIBRATE | Allows access to the vibrator. |
| android.permission.BLUETOOTH | Allows applications to connect to paired bluetooth devices. |
| android.permission.PACKAGE_USAGE_STATS | Allows an application to collect component usage statistics Declaring the permission implies intention to use the API and the user of the device can grant permission through the Settings application. |
| android.permission.REQUEST_INSTALL_PACKAGES | Allows an application to request installing packages. |
| android.permission.INTERACT_ACROSS_USERS | - |
| android.permission.BIND_VPN_SERVICE | Must be required by a VpnService, to ensure that only the system can bind to it. |
| android.permission.BIND_QUICK_SETTINGS_TILE | - |
| android.permission.BIND_JOB_SERVICE | - |
File Activities
| Activity | Description |
|---|---|
| com.adguard.androidcom.adguard.android.ui.MainActivity | Entrypoint |
| com.adguard.androidcom.adguard.android.ui.SettingsActivity | - |
| com.adguard.androidcom.adguard.android.ui.SettingsGroupActivity | - |
| com.adguard.androidcom.adguard.android.ui.FeedbackActivity | - |
| com.adguard.androidcom.adguard.android.ui.LicenseActivity | - |
| com.adguard.androidcom.adguard.android.ui.AboutActivity | - |
| com.adguard.androidcom.adguard.android.ui.FinActivity | - |
| com.adguard.androidcom.adguard.android.ui.FilteringLogActivity | - |
| com.adguard.androidcom.adguard.android.ui.AddRuleActivity | - |
| com.adguard.androidcom.adguard.android.ui.SettingsFiltersActivity | - |
| com.adguard.androidcom.adguard.android.ui.FilterDetailActivity | - |
| com.adguard.androidcom.adguard.android.ui.FiltersCategoryActivity | - |
| com.adguard.androidcom.adguard.android.ui.CustomFiltersActivity | - |
| com.adguard.androidcom.adguard.android.ui.SearchFilterActivity | - |
| com.adguard.androidcom.adguard.android.ui.LogDetailsActivity | - |
| com.adguard.androidcom.adguard.android.ui.OnboardingActivity | - |
| com.adguard.androidcom.adguard.android.ui.AppsManagementMainActivity | - |
| com.adguard.androidcom.adguard.android.ui.AppsManagementPackageActivity | - |
| com.adguard.androidcom.adguard.android.ui.AppsManagementSettingsActivity | - |
| com.adguard.androidcom.adguard.android.ui.CertificateStatusActivity | - |
| com.adguard.androidcom.adguard.android.ui.HttpsFilteringActivity | - |
| com.adguard.androidcom.adguard.android.ui.OutboundProxyActivity | - |
| com.adguard.androidcom.adguard.android.ui.DangerousSettingsActivity | - |
| com.adguard.androidcom.adguard.android.ui.WhitelistActivity | - |
| com.adguard.androidcom.adguard.android.ui.UserFilterActivity | - |
| com.adguard.androidcom.adguard.android.ui.DnsActivity | - |
| com.adguard.androidcom.adguard.android.ui.BatteryActivity | - |
| com.adguard.androidcom.adguard.android.ui.AutomationActivity | - |
| com.adguard.androidcom.adguard.android.ui.UpdatesActivity | - |
| com.adguard.androidcom.adguard.android.ui.AssistantActivity | - |
| com.adguard.androidcom.adguard.android.ui.SslListActivity | - |
| com.adguard.androidcom.adguard.android.ui.StealthModeActivity | - |
| com.adguard.androidcom.adguard.android.ui.ProtectionLevelActivity | - |
| com.adguard.androidcom.adguard.android.ui.SupportActivity | - |
| com.adguard.androidcom.adguard.android.ui.DnsFilterActivity | - |
| com.adguard.androidcom.adguard.android.ui.DnsFilterDetailActivity | - |
| com.adguard.androidcom.adguard.android.ui.CustomDnsActivity | - |
| com.adguard.androidcom.adguard.android.ui.DnsProviderActivity | - |
| com.adguard.androidcom.adguard.android.ui.WidgetSettingsActivity | - |
| com.adguard.androidcom.adguard.android.filtering.api.VpnPrepareActivity | - |
| com.adguard.androidcom.adguard.android.ui.PremiumPromoActivity | - |
| com.adguard.androidcom.adguard.android.ui.AdGuardSchemeSortingActivity | - |
| com.adguard.androidcom.adguard.android.ui.HelperActivity | - |
| com.adguard.androidcom.adguard.android.ui.picker.FilePickerActivity | - |
| com.adguard.androidcom.adguard.android.ui.CustomTabsActivity | - |
| com.adguard.androidcom.adguard.android.ui.TileServicePreferenceActivity | - |
| com.adguard.androidcom.adguard.android.ui.ShortcutActivity | - |
| com.adguard.androidcom.adguard.android.ui.FilteringMethodActivity | - |
| com.adguard.androidcom.adguard.android.ui.ExtensionDetailsActivity | - |
| com.adguard.androidcom.adguard.android.ui.activation.ActivationConfirmationActivity | - |
| com.adguard.androidcom.adguard.android.ui.activation.ActivationTabsActivity | - |
| com.adguard.androidcom.adguard.android.ui.dialog.DialogFactory$Multipage | - |
| com.adguard.androidcom.adguard.android.ui.HttpsCAActivity | - |
| com.adguard.androidcom.adguard.android.ui.YoutubeActivity | - |
| com.adguard.androidcom.adguard.kit.ui.dialog.OnePageDialogImpl | - |
| com.adguard.androidcom.adguard.kit.ui.dialog.MultipageDialogImpl | - |
File Receivers
| Receiver | Intents |
|---|---|
| androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryChargingProxy |
android.intent.action.ACTION_POWER_CONNECTED
android.intent.action.ACTION_POWER_DISCONNECTED |
| androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryNotLowProxy |
android.intent.action.BATTERY_OKAY
android.intent.action.BATTERY_LOW |
| androidx.work.impl.background.systemalarm.ConstraintProxy$NetworkStateProxy | android.net.conn.CONNECTIVITY_CHANGE |
| androidx.work.impl.background.systemalarm.ConstraintProxy$StorageNotLowProxy |
android.intent.action.DEVICE_STORAGE_LOW
android.intent.action.DEVICE_STORAGE_OK |
| androidx.work.impl.background.systemalarm.ConstraintProxyUpdateReceiver | androidx.work.impl.background.systemalarm.UpdateProxies |
| androidx.work.impl.background.systemalarm.RescheduleReceiver |
android.intent.action.BOOT_COMPLETED
android.intent.action.TIME_SET android.intent.action.TIMEZONE_CHANGED |
| androidx.work.impl.diagnostics.DiagnosticsReceiver | androidx.work.diagnostics.REQUEST_DIAGNOSTICS |
| androidx.work.impl.utils.ForceStopRunnable$BroadcastReceiver | - |
| com.adguard.android.WidgetProvider | android.appwidget.action.APPWIDGET_UPDATE |
| com.adguard.android.receivers.AutomationReceiver | - |
| com.adguard.android.receivers.BootUpReceiver |
android.intent.action.BOOT_COMPLETED (Priority: 2000)
android.intent.action.QUICKBOOT_POWERON (Priority: 2000) com.htc.intent.action.QUICKBOOT_POWERON (Priority: 2000) |
| com.adguard.android.receivers.ExclusionsReceiver | - |
| com.adguard.android.receivers.IntegrationReceiver |
com.adguard.integration.enable
com.adguard.integration.disable com.adguard.integration.disable_at_all |
| com.adguard.android.receivers.LicenseKeyBroadcastReceiver | com.adguard.android.LICENSE_KEY |
| com.adguard.android.receivers.NetworkStateReceiver |
android.net.conn.CONNECTIVITY_CHANGE
android.net.wifi.WIFI_STATE_CHANGED android.net.wifi.LINK_CONFIGURATION_CHANGED android.hardware.usb.action.USB_STATE android.net.wifi.WIFI_AP_STATE_CHANGED android.bluetooth.device.action.ACL_CONNECTED android.bluetooth.device.action.ACL_DISCONNECTED |
| com.adguard.android.receivers.UpdateReceiver | android.intent.action.MY_PACKAGE_REPLACED |
| com.adguard.android.receivers.VpnAlwaysOnReceiver | com.adguard.android.filtering.ALWAYS_ON_REQUESTED |
| com.adguard.android.receivers.WatchDogReceiver | com.adguard.android.action.WATCHDOG |
File Certificates
| Owner | Issuer | Validity | Hashes (MD5, SHA1) |
|---|---|---|---|
| CN="rockz5555 OU=Droid Freedom Unit O=Droid Freedom Inc L=Unknown S=Unknown C=LK" | CN="rockz5555 OU=Droid Freedom Unit O=Droid Freedom Inc L=Unknown S=Unknown C=LK" Serial: 638fbad3 |
12/05/2014 00:45:57 11/27/2044 00:45:57 |
A8:37:8D:B5:C5:89:A9:A7:EA:AC:97:E2:27:9E:8A:8A 60:C2:CA:51:52:29:DA:14:CA:A5:52:7A:7B:8A:A8:6D:E3:BE:E7:3C |
Extracted Strings
Extracted Files
Displaying 20 extracted file(s). The remaining 15 file(s) are available in the full version and XML/JSON reports.
-
Informative 20
-
-
AndroidManifest.xml
- Size
- 35KiB (35376 bytes)
- Type
- unknown
- Description
- Android binary XML
- MD5
-
45bbbea87d0c38c98fe830565e19d249
- SHA1
-
4312c2fa25fdbf9c361690302567c58dac359060
- SHA256
-
29010a71ba8493cc9045ec3b0458f611f52a5bbd3957d3ed8645fe4668afd4fc
-
BALA.RSA
- Size
- 1.3KiB (1307 bytes)
- Type
- data
- MD5
-
c6bf82c4b80930c9c36fc36c62e8cfc1
- SHA1
-
328e525c5c591cee526af98b270ea7a8a4a778e3
- SHA256
-
694a4d9baaca132c0f7b54791870e043ef544666b2e6e0fce607e37ead54ecb0
-
BALA.SF
- Size
- 196KiB (200532 bytes)
- Type
- text
- Description
- ASCII text, with CRLF line terminators
- MD5
-
57739f03482848afb82147eb281fe919
- SHA1
-
32b86ded295a5c8d3c0f1de4a4b15b2d7dfb98eb
- SHA256
-
202344b0831200c6e56864da804da65570e2c541ef169b3f7464fe489d239212
-
MANIFEST.MF
- Size
- 196KiB (200405 bytes)
- Type
- text
- Description
- ASCII text, with CRLF line terminators
- MD5
-
7cb898b9a9a2f948cb6c431f7e4501ed
- SHA1
-
4ea3b15c12e4d64ea4f3317b87bec8ce716c810a
- SHA256
-
3d00d01ac5b1631ad1d6c7e614188d91e0e64276ed721761638d6cc688866620
-
androidsupportmultidexversion.txt
- Size
- 53B (53 bytes)
- Type
- text
- Description
- ASCII text
- MD5
-
b0eca0d32e7a86c1656b10aa54aca274
- SHA1
-
805f3f4af2e9d5ea24add8b1501ba969036a2b21
- SHA256
-
a1c3b0007bcaecc29cb7b7fa4a2ace25036988d66a354c0fd6bdea6eb51568fa
-
browsers.txt
- Size
- 6KiB (6099 bytes)
- Type
- text
- Description
- ASCII text
- MD5
-
65f86ba4148eca9cadae4faf5c1313bc
- SHA1
-
33603780caafc3e032f4d86e84768419ae4aeae4
- SHA256
-
d7c819f2b88d20ac969c5abb3e00eb037eaeaa212877b956c2062da1d9f9efa2
-
default_tracking_params.txt
- Size
- 207B (207 bytes)
- Type
- text
- Description
- ASCII text
- MD5
-
bc68eac8da0c1a57a483585907189b7a
- SHA1
-
39ddeaa89aff31473fdb9ee26ebdbe9c7c01fb50
- SHA256
-
a4962839ebc29250014b5eb69acb108df3d4d1f44ca7e1d355f2afc93de88fbd
-
enforce_https_filtering_apps.txt
- Size
- 1.2KiB (1223 bytes)
- Type
- text
- Description
- ASCII text
- MD5
-
9e240a4381b000c5205b5e7702e9ef4b
- SHA1
-
d858a30d1cb586b2e35892fd8d8c6e0395a0ffec
- SHA256
-
a22bb6716738926aec5be8e6958db440050f3888b50ecbd7675e9aae6b383fcd
-
enforce_https_filtering_apps_problematic_devices.txt
- Size
- 1.2KiB (1203 bytes)
- Type
- text
- Description
- ASCII text
- MD5
-
e549b890ebeeaeed4e443c8a65d73582
- SHA1
-
8b7f67aae410558aee3ba602e98c5060677b1d2a
- SHA256
-
7b01df6ab643eed5f958b279fe736ad482e2ab4294dfee11fd363bb8a5c5ca99
-
java-header-style.xml
- Size
- 712B (712 bytes)
- Type
- text
- Description
- XML 1.0 document, ASCII text
- MD5
-
5448dadb38d7ebaedf24fb9d3263d27d
- SHA1
-
1d30bc39bdcf1efeb00d268512403793bc0e7535
- SHA256
-
17a17f10b885bfbee5b97228c9dcf711252b96e316a61512b19ec0481bb95008
-
kotlin.reflect.jvm.internal.impl.builtins.BuiltInsLoader
- Size
- 90B (90 bytes)
- Type
- text
- Description
- ASCII text, with no line terminators
- MD5
-
4268d61582a7f9e252d3145759e560e6
- SHA1
-
85c8e3c7e172848faa95867723a450f60c21a77c
- SHA256
-
4d68a8097263fcde72d0a9aec5c1343ec3b20202b4678a8a548317fdba0afc9b
-
kotlin.reflect.jvm.internal.impl.resolve.ExternalOverridabilityCondition
- Size
- 235B (235 bytes)
- Type
- text
- Description
- ASCII text
- MD5
-
82c0c5eb597c70ce360d6d303266232e
- SHA1
-
ef4c8126a287b65c65178eac3ee2ec23fa5af834
- SHA256
-
6730196e2039ec378b9a553d59f6b0346c99b9d48b8fce1d16761fa6da64c5d0
-
kotlinx.coroutines.CoroutineExceptionHandler
- Size
- 53B (53 bytes)
- Type
- text
- Description
- ASCII text, with no line terminators
- MD5
-
d7b190f98979bc611e474b984bc7bed2
- SHA1
-
32f9b2ccf761c8f7a1fd0e8d6ce391371e761129
- SHA256
-
dd738ebf8728997917f202c7ec0d17bc4056e8e9b12ead159b34232c8e909b5e
-
kotlinx.coroutines.internal.MainDispatcherFactory
- Size
- 51B (51 bytes)
- Type
- text
- Description
- ASCII text, with no line terminators
- MD5
-
f17f1739ecf969f3352571f252de562b
- SHA1
-
cc461440a36d671a2c51ce97d1f84a9d6e48111b
- SHA256
-
5c4105af7d462e4327ff14d7f8d0335447a37b39852d056ec2f08aa51df025c1
-
libadguard-core.so
- Size
- 10MiB (10471220 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=1355f3cfbd76a45f7f025592c22b5626848392a0, stripped
- MD5
-
bf28c94c274bcbd07b8ad9d7ef309bdb
- SHA1
-
3610bc164122c11dbccd5b2a244b634d75c4a45a
- SHA256
-
61dcfb2add92724bab2b088f99ba25b7b793f94a55dd072c6f3c78b17282c34f
-
libadguard-core.so_1664490639880
- Size
- 6.7MiB (7047692 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, BuildID[sha1]=14b5cfe1ebc9c0bc561555c5415d68b269800e3b, stripped
- MD5
-
ca2254c9ea632239fc362dd57e2b4be0
- SHA1
-
6b6fdd70f5ae419b9e7ef950bf46ef3e9f2db874
- SHA256
-
37e262e6864c3322a5fd7edcf07ef547c052d73afb1d3a47db3a5e081f2ef99f
-
libadguard-core.so_1664490639881
- Size
- 10MiB (10808472 bytes)
- Type
- elf 64bits executable
- Description
- ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=ac3e35831a7058e88f21f74fc23cf792802f5416, stripped
- MD5
-
f67403d6b4287fefe2c6a365685bf7cc
- SHA1
-
356393a7b4f2d1ebc8b9ef5a580e6bcececdc1fd
- SHA256
-
a03f8a49108da1017911b5766c7acb7e42db28a7e621b5d887853eb6b221883a
-
libadguard-core.so_1664490639883
- Size
- 9.3MiB (9709248 bytes)
- Type
- elf 64bits executable
- Description
- ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=bdffd5974ec566e5301a661f6615ccc255830f2a, stripped
- MD5
-
8cd5f50b2903df8925b65e8758558971
- SHA1
-
c3964367829d130cc01fe10b5034f82fa41c3513
- SHA256
-
982adb6c3b1845fd0787097677c288ce0813a8ee2aa61616d63c956d1cfb0aad
-
libadguard-dns.so
- Size
- 4.9MiB (5188832 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=3f547c483e5be9cf29803121f393f3efb4715378, stripped
- MD5
-
9c767bee4daf21805f1933bee5c636e2
- SHA1
-
7963e31790150d63ffd3254d33ea9b94d505c0fc
- SHA256
-
455ea7c096df8e105b0fc91de174afacaeecd5b0650fd8199c1adb9ca30d895e
-
libadguard-dns.so_1664490639880
- Size
- 3.1MiB (3256372 bytes)
- Type
- elf executable
- Description
- ELF 32-bit LSB shared object, ARM, EABI5 version 1 (SYSV), dynamically linked, BuildID[sha1]=dcb00fe3b3543d9f93c349779467df785b9a2809, stripped
- MD5
-
25a3739d9ddf4ed44a770392a7b3db61
- SHA1
-
9dc70bc6c9de76520ad9f709303f5ee4e43cc63e
- SHA256
-
b51d9082ca1d0d4757ace1998855ca39b6be2b10d15433fc8beccffb437340b3
-
Notifications
-
Runtime
- Not all Falcon MalQuery lookups completed in time
- Not all IP/URL string resources were checked online
- Not all sources for indicator ID "binary-0" are available in the report
- Not all sources for indicator ID "string-10" are available in the report
- Not all sources for indicator ID "string-101" are available in the report
- Not all sources for indicator ID "string-98" are available in the report
- Not all strings are visible in the report, because the maximum number of strings was reached (5000)