horsedeal.exe
This report is generated from a file or URL submitted to this webservice on January 14th 2020 16:45:03 (UTC)
Guest System: Windows 7 32 bit, Professional, 6.1 (build 7601), Service Pack 1
Report generated by
Falcon Sandbox v8.30 © Hybrid Analysis
Incident Response
Risk Assessment
- Ransomware
- Detected indicator that file is ransomware
- Fingerprint
-
Queries kernel debugger information
Queries process information
Reads the active computer name
Reads the cryptographic machine GUID - Spreading
- Opens the MountPointManager (often used to detect additional infection locations)
MITRE ATT&CK™ Techniques Detection
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Malicious Indicators 3
-
External Systems
-
Sample was identified as malicious by a large number of Antivirus engines
- details
- 30/69 Antivirus vendors marked sample as malicious (43% detection rate)
- source
- External System
- relevance
- 10/10
-
Sample was identified as malicious by at least one Antivirus engine
- details
- 30/69 Antivirus vendors marked sample as malicious (43% detection rate)
- source
- External System
- relevance
- 8/10
-
Sample was identified as malicious by a large number of Antivirus engines
-
Hiding 1 Malicious Indicators
- All indicators are available only in the private webservice or standalone version
-
Suspicious Indicators 23
-
Anti-Detection/Stealthyness
-
Queries kernel debugger information
- details
- "horsedeal.exe" at 00028587-00001132-00000105-9016619274
- source
- API Call
- relevance
- 6/10
-
Queries process information
- details
- "horsedeal.exe" queried SystemProcessInformation at 00028587-00001132-00000105-8974367876
- source
- API Call
- relevance
- 4/10
- ATT&CK ID
- T1057 (Show technique in the MITRE ATT&CK™ matrix)
-
Queries kernel debugger information
-
Anti-Reverse Engineering
-
PE file has unusual entropy sections
- details
-
UPX1
.rsrc with unusual entropies 7.94055665984
7.40381589448 - source
- Static Parser
- relevance
- 10/10
-
PE file is packed with UPX
- details
-
"f961ded251814ed0cbbc17f7f1594988f49a3e69f678aa7ec6bf197c2832256a.bin" has a section named "UPX0"
"f961ded251814ed0cbbc17f7f1594988f49a3e69f678aa7ec6bf197c2832256a.bin" has a section named "UPX1" - source
- Static Parser
- relevance
- 10/10
- ATT&CK ID
- T1045 (Show technique in the MITRE ATT&CK™ matrix)
-
PE file has unusual entropy sections
-
Environment Awareness
-
Reads the active computer name
- details
- "horsedeal.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME")
- source
- Registry Access
- relevance
- 5/10
- ATT&CK ID
- T1012 (Show technique in the MITRE ATT&CK™ matrix)
-
Reads the cryptographic machine GUID
- details
- "horsedeal.exe" (Path: "HKLM\SOFTWARE\MICROSOFT\CRYPTOGRAPHY"; Key: "MACHINEGUID")
- source
- Registry Access
- relevance
- 10/10
- ATT&CK ID
- T1012 (Show technique in the MITRE ATT&CK™ matrix)
-
Reads the active computer name
-
External Systems
-
Found an IP/URL artifact that was identified as malicious by at least one reputation engine
- details
-
1/72 reputation engines marked "https://pidgin.im" as malicious (1% detection rate)
1/72 reputation engines marked "https://pidgin.im/download/windows/" as malicious (1% detection rate)
1/72 reputation engines marked "https://www.youtube.com" as malicious (1% detection rate) - source
- External System
- relevance
- 10/10
-
Found an IP/URL artifact that was identified as malicious by at least one reputation engine
-
General
-
Reads configuration files
- details
-
"horsedeal.exe" read file "C:\$Recycle.Bin\S-1-5-21-2092356043-4041700817-663127204-1001\desktop.ini"
"horsedeal.exe" read file "%PROGRAMFILES%\Adobe\Acrobat Reader DC\Reader\AGMGPUOptIn.ini"
"horsedeal.exe" read file "%PROGRAMFILES%\Adobe\Acrobat Reader DC\Reader\Legal\ENU\eula.ini" - source
- API Call
- relevance
- 4/10
-
Reads configuration files
-
Installation/Persistance
-
Creates new processes
- details
- "horsedeal.exe" is creating a new process
- source
- API Call
- relevance
- 8/10
-
Monitors specific registry key for changes
- details
- "horsedeal.exe" monitors "\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NetworkProvider\HwOrder" (Filter: 4; Subtree: 0)
- source
- API Call
- relevance
- 4/10
- ATT&CK ID
- T1012 (Show technique in the MITRE ATT&CK™ matrix)
-
Opens the MountPointManager (often used to detect additional infection locations)
- details
- "horsedeal.exe" opened "\Device\MountPointManager"
- source
- API Call
- relevance
- 5/10
-
Creates new processes
-
Network Related
-
Detected increased number of ARP broadcast requests (network device lookup)
- details
- Attempt to find devices in networks: "192.168.240.107/32, ..."
- source
- Network Traffic
- relevance
- 10/10
- ATT&CK ID
- T1046 (Show technique in the MITRE ATT&CK™ matrix)
-
Detected increased number of ARP broadcast requests (network device lookup)
-
Ransomware/Banking
-
Detected indicator that file is ransomware
- details
-
"All your files have been ENCRYPTED!!!" (Source: #Decryption#.txt, Indicator: "files have been encrypted")
"All your files have been ENCRYPTED!!!
Write to our ICQ https://icq.im/bigbosshorse
Or contact us via jabber - bigbosshorse@xmpp.jp
Jabber client installation instructions:
Download the jabber (Pidgin) client from https://pidgin.im/download/windows/
Af" (Source: 00028587-00001132-0000018C-6159158567, Indicator: "files have been encrypted") - source
- File/Memory
- relevance
- 7/10
-
The input sample dropped very many files
- details
- The input sample dropped 2000 files (often an indicator for ransomware)
- source
- Binary File
- relevance
- 5/10
-
Detected indicator that file is ransomware
-
Spyware/Information Retrieval
-
Found an instant messenger related domain
- details
-
"Download the jabber (Pidgin) client from https://pidgin.im/download/windows/" (Indicator: "pidgin.im"; File: "#Decryption#.txt")
"All your files have been ENCRYPTED!!!
Write to our ICQ https://icq.im/bigbosshorse
Or contact us via jabber - bigbosshorse@xmpp.jp
Jabber client installation instructions:
Download the jabber (Pidgin) client from https://pidgin.im/download/windows/
Af" (Indicator: "pidgin.im") - source
- File/Memory
- relevance
- 10/10
-
Found an instant messenger related domain
-
System Destruction
-
Opens file with deletion access rights
- details
-
"horsedeal.exe" opened "C:\$Recycle.Bin\S-1-5-21-2092356043-4041700817-663127204-1001\desktop.ini" with delete access
"horsedeal.exe" opened "C:\autoexec.bat" with delete access
"horsedeal.exe" opened "C:\config.sys" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\ExcelMUI.msi" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Setup.xml" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\PublisherMUI.msi" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\OutlookMUI.msi" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WordMUI.msi" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\Proof.msi" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\Proof.msi" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\Proof.xml" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\Proof.cab" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\OneNoteMUI.xml" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\OnoteLR.cab" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\Setup.xml" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\dwintl20.dll" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE" with delete access
"horsedeal.exe" opened "C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\setup.chm" with delete access
"horsedeal.exe" opened "%SAMPLEDIR%\1579020316362$MAPFAILURE" with delete access
"horsedeal.exe" opened "%SAMPLEDIR%\1579020316362$OK" with delete access - source
- API Call
- relevance
- 7/10
-
Opens file with deletion access rights
-
Unusual Characteristics
-
Entrypoint in PE header is within an uncommon section
- details
- "f961ded251814ed0cbbc17f7f1594988f49a3e69f678aa7ec6bf197c2832256a.bin" has an entrypoint in section "UPX1"
- source
- Static Parser
- relevance
- 10/10
-
Imports suspicious APIs
- details
-
VirtualProtect
GetProcAddress
LoadLibraryA
ShellExecuteW - source
- Static Parser
- relevance
- 1/10
-
Entrypoint in PE header is within an uncommon section
-
Hiding 5 Suspicious Indicators
- All indicators are available only in the private webservice or standalone version
-
Informative 9
-
Anti-Reverse Engineering
-
PE file contains zero-size sections
- details
- Raw size of "UPX0" is zero
- source
- Static Parser
- relevance
- 10/10
-
PE file contains zero-size sections
-
General
-
Overview of unique CLSIDs touched in registry
- details
- "horsedeal.exe" touched "Computer" (Path: "HKCU\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\SHELLFOLDER")
- source
- Registry Access
- relevance
- 3/10
-
Overview of unique CLSIDs touched in registry
-
Installation/Persistance
-
Connects to LPC ports
- details
- "horsedeal.exe" connecting to "\ThemeApiPort"
- source
- API Call
- relevance
- 1/10
-
Dropped files
- details
- "#Decryption#.txt" has type "ASCII text with very long lines with CRLF line terminators"
- source
- Binary File
- relevance
- 3/10
-
Touches files in the Windows directory
- details
-
"horsedeal.exe" touched file "%WINDIR%\Globalization\Sorting\SortDefault.nls"
"horsedeal.exe" touched file "%WINDIR%\sysnative\cmd.exe"
"horsedeal.exe" touched file "%WINDIR%\System32\rsaenh.dll"
"horsedeal.exe" touched file "%WINDIR%\System32\crypt32.dll" - source
- API Call
- relevance
- 7/10
-
Connects to LPC ports
-
Network Related
-
Found potential URL in binary/memory
- details
-
Pattern match: "icq.im/bigbosshors"
Heuristic match: "GoodFon.ru"
Heuristic match: "*%5 .tp"
Pattern match: "https://icq.im/bigbosshorse"
Heuristic match: "Or contact us via jabber - bigbosshorse@xmpp.jp"
Pattern match: "https://pidgin.im/download/windows/"
Heuristic match: "In the field -domain - enter any jabber-server, there are a lot of them, for example - exploit.im"
Pattern match: "https://www.youtube.com/results?search_query=pidgin+jabber+install" - source
- File/Memory
- relevance
- 10/10
-
Found potential URL in binary/memory
-
Spyware/Information Retrieval
-
Found a reference to a known community page
- details
- "If you don't understand our Pidgin client installation instructions, you can find many installation tutorials on youtube - https://www.youtube.com/results?search_query=pidgin+jabber+install" (Indicator: "youtube")
- source
- File/Memory
- relevance
- 7/10
-
Found a reference to a known community page
-
System Security
-
Opens the Kernel Security Device Driver (KsecDD) of Windows
- details
- "horsedeal.exe" opened "\Device\KsecDD"
- source
- API Call
- relevance
- 10/10
- ATT&CK ID
- T1215 (Show technique in the MITRE ATT&CK™ matrix)
-
Opens the Kernel Security Device Driver (KsecDD) of Windows
-
Unusual Characteristics
-
Matched Compiler/Packer signature
- details
- "f961ded251814ed0cbbc17f7f1594988f49a3e69f678aa7ec6bf197c2832256a.bin" was detected as "Netopsystems FEAD Optimizer 1"
- source
- Static Parser
- relevance
- 10/10
- ATT&CK ID
- T1045 (Show technique in the MITRE ATT&CK™ matrix)
-
Matched Compiler/Packer signature
File Details
horsedeal.exe
- Filename
- horsedeal.exe
- Size
- 1.6MiB (1723392 bytes)
- Type
- peexe executable
- Description
- PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
- Architecture
- WINDOWS
- SHA256
- f961ded251814ed0cbbc17f7f1594988f49a3e69f678aa7ec6bf197c2832256a
- MD5
- e2fc5651081ca53ebb208202fa4d733a
- SHA1
- 5a37fd94e215a8c70c2ca7f890b373136afcb537
- ssdeep
-
49152:huyCquB+EnabTH9Gey7Wm5iPc0dZSIycIMHZRaEXJJI94:hY+EnMH2rQPcPQRaIjI
- imphash
-
42a4b12d2880145c3c3f8926eca4cd26
- authentihash
-
3155c7eced78881fe901855ffc344dc37490a1b4474f3b6c8befe65ff7f8d557
- Compiler/Packer
- Netopsystems FEAD Optimizer 1
Version Info
- LegalCopyright
- Copyright (C) 2012
- InternalName
- avgdiagex.exe
- FileVersion
- 14.0.1001.380
- CompanyName
- AVG Technologies, sro
- Comments
- Local Build
- ProductName
- AVG Diagnostics
- ProductVersion
- 14.0.1001.380
- FileDescription
- AVG Diagnostics
- OriginalFilename
- avgdiagex.exe
- Translation
- 0x0405 0x04b0
Classification (TrID)
- 61.2% (.EXE) UPX compressed Win32 Executable
- 14.8% (.DLL) Win32 Dynamic Link Library (generic)
- 10.2% (.EXE) Win32 Executable (generic)
- 4.5% (.EXE) OS/2 Executable (generic)
- 4.5% (.EXE) Generic Win/DOS Executable
File Metadata
- 1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 28314)
- 2 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 28314)
- 4 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 28314)
- 13 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)
- File contains Visual Basic code
- File appears to contain raw COFF/OMF content
- File is the product of a small codebase (4 files)
File Sections
| Details | ||||||
|---|---|---|---|---|---|---|
File Resources
| Details | ||||
|---|---|---|---|---|
File Imports
Screenshots
Loading content, please wait...
Hybrid Analysis
Tip: Click an analysed process below to view more details.
Analysed 1 process in total (System Resource Monitor).
-
horsedeal.exe
(PID: 1132)
30/69
Network Analysis
DNS Requests
No relevant DNS requests were made.
Contacted Hosts
No relevant hosts were contacted.
HTTP Traffic
No relevant HTTP requests were made.
Extracted Strings
Extracted Files
Displaying 19 extracted file(s). The remaining 1981 file(s) are available in the full version and XML/JSON reports.
-
Informative Selection 1
-
-
#Decryption#.txt
- Size
- 2.8KiB (2893 bytes)
- Type
- text
- Description
- ASCII text, with very long lines, with CRLF line terminators
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
f568ed952c5d4b887762ea024030aaf0
- SHA1
-
b28c863f0117f2ff6a73577666e45f91d679d9c5
- SHA256
-
1d0cb7be06326402f13ec710852f21bd0d2345d77b55792bb303e69f8c01fc6a
-
-
Informative 18
-
-
001.png
- Size
- 5.3KiB (5392 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
a179f182dbc885200893034a45ed60b6
- SHA1
-
826768a615bb7e3411e4f9373c32d62f2b7f7da1
- SHA256
-
67debf6638cc8884df01b77f40b15e5c7a78a55939ef95be244e09581ade5ef3
-
007.png
- Size
- 3.1KiB (3154 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
2acea92a32d18a21a76708d0d65c47f2
- SHA1
-
46a9c338a9c9df885484cb84e76e2b9ac23df797
- SHA256
-
0f88f3a3c663ac9c6616bb6a75b85ff086fa39b24c2e5dce59647142d356974d
-
013.png
- Size
- 6.5KiB (6610 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
c16091ad37117742ee40c17c513bcbbf
- SHA1
-
95af015b5d81cbf3ca262715dd1c185c0fb3de84
- SHA256
-
941dd27beee9f7430bac8214acea1a5deae6f4477d6943bb28cbed9efd9d6a44
-
011.png
- Size
- 4.8KiB (4959 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
15dd6d6b28b0b2d0d5b58110786973f1
- SHA1
-
62d9179acda71b12a8055ecb86a06cbdfdf88318
- SHA256
-
9089ef22388605fed784726fc6cd2d9202b7d80bfe295f4df73f0084267704cb
-
002.png
- Size
- 5KiB (5136 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
94398287b9f1a4c5693f46e13f967e3f
- SHA1
-
ddc356d7e6eea59312eea6d98b22427cc99f0fe1
- SHA256
-
1cb2f9b6ef96e4e9f4f802588d73c3d91db156c16b13175b475aa48816b10d56
-
004.png
- Size
- 3.3KiB (3428 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
f405611e8593fa25271a88614b75e866
- SHA1
-
e5a50d1b4259540a8263132037f76decd9f96eae
- SHA256
-
7f40f2ba476ee6488b46dbe47b13d2a59a84e9c344c419a286959a9eb9d21b18
-
.lock
- Size
- 132B (132 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
2b59e532f360b28645aa32eefeade512
- SHA1
-
fc23ed39d3ad86634aee381124e15c1ff0b2c376
- SHA256
-
f06bbe40f49f48b0e940723923b7441b168f2552d5c12f45843bcd9950a4ff7f
-
012.png
- Size
- 6.3KiB (6499 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
aabc11f48b1b5391c8a9fb39e3649eaa
- SHA1
-
c777dab45fea0ffe4fa67b6af8996164e19adad7
- SHA256
-
654ce9088bce476f0cbea435b120e708c28c7a13a10015832ffe3fa3281a3c9f
-
010.png
- Size
- 4.2KiB (4280 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
a40e084475118a4fbfe4b29137f652d6
- SHA1
-
1d36b37f0024e36094fb3cabaf42038c0631750c
- SHA256
-
e230cdf8e3dcf5ce3ed45e9d9cac13abb5b22cb1a507f3d7f0f98da68dc89efb
-
005.png
- Size
- 4.8KiB (4873 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
c4b7832b8643b99db6f3cba49fc79f8a
- SHA1
-
bcdba7f2ffd28f1dfe1cade8f2f6e6874e6e598a
- SHA256
-
4754b7035a2bbbc2c4e8c54a584dcfc163d17b06c74b668e683a3cfb98618811
-
003.png
- Size
- 4.5KiB (4563 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
960c6addf2fb18bc006719decf4b00ba
- SHA1
-
ebe555c9bee7a306038bcbcb7cbe1d77c6058696
- SHA256
-
f1b3a0fe90c84bb0fa3826d135ebad8bbbc3952d883a9623a8db8ebb6d1d3f2d
-
008.png
- Size
- 3.9KiB (3985 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
256bfce566d9d2b33a1a0e4c481def8c
- SHA1
-
cf0a2c739ca3996fdded2e50aa884bb6a0be284f
- SHA256
-
57a0c6c9228e83f00395ef6003f8651e9b8987c716434a375e08ee32e56c681e
-
017.png
- Size
- 3KiB (3050 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
5c7290f24859b12d28fd80b86b6b2fdf
- SHA1
-
a26f003a16c7d509ed38580eedcc135dc94f7a91
- SHA256
-
cfc51e31b8729b2cfa0165628973ef81e33e9a6d661b74b80370512bb546fa08
-
015.png
- Size
- 2.3KiB (2404 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
518e402822e5abbd496cdbfdfb61b9af
- SHA1
-
f097379ee85ad398de641260e9ba8b552bea81cc
- SHA256
-
59ddd33d08ded8e00eed2fadbd163d6158827f5e2401668cdd49eaa868d56920
-
006.png
- Size
- 6.3KiB (6434 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
5c61e53d492fe2dec38f58ffea6b7ab0
- SHA1
-
af335c0a8db888f0b7b4b8a85d1e411b833ebd2c
- SHA256
-
644e3b5de5d2e9691b81b03d216588f6e4c9dbf9f68e40014ade153b96453fd2
-
016.png
- Size
- 4.4KiB (4541 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
450589db6209c14d59adbb8a06851dbd
- SHA1
-
9c8f419141d8fc1e23d5ee0488fa0f8cdc4258ce
- SHA256
-
de51652521bf4330bcb05dc6e495d4e5902ca61a28b33abfbf026b1f889c111f
-
009.png
- Size
- 6.4KiB (6524 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
ffdf3ed9393e3e64f579ba04b8b3b2ea
- SHA1
-
7fa9496027b20f8c2240af8dab0d9356a0d4c808
- SHA256
-
a307b16bbc31521c82f397b69abe12545e608f7a175de4241ef777a6cb67a968
-
014.png
- Size
- 4.3KiB (4399 bytes)
- Runtime Process
- horsedeal.exe (PID: 1132)
- MD5
-
f591e42b1f6e030571838de8f932243b
- SHA1
-
a3cd6244e6ea6a55d5f176b37c895ff476e58d95
- SHA256
-
cf6b309e7b24280677b5ef66e3d68ed013c3c5e5604dd42fd5f9e4af914dba3d
-
Notifications
-
Runtime
- Not all IP/URL string resources were checked online
- Not all sources for indicator ID "api-25" are available in the report
- Not all sources for indicator ID "binary-0" are available in the report
- Not all sources for indicator ID "binary-10" are available in the report
- Some low-level data is hidden, as this is only a slim report
- Touched the maximum number of extracted files (2000), report might not contain information about some extracted files
BleepingComputer commented 4 years ago updated